Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Steve Kremer
2010 – today
- 2013
[c38]Steve Kremer, Robert Künnemann, Graham Steel: Universally Composable Key-Management. ESORICS 2013: 327-344
[c37]Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan: Practical Everlasting Privacy. POST 2013: 21-40- 2012
[j15]Steve Kremer, Antoine Mercier, Ralf Treinen: Reducing Equational Theories for the Decision of Static Equivalence. J. Autom. Reasoning 48(2): 197-217 (2012)
[j14]Stefan Ciobaca, Stéphanie Delaune, Steve Kremer: Computing Knowledge in Security Protocols Under Convergent Equational Theories. J. Autom. Reasoning 48(2): 219-262 (2012)
[c36]Stéphanie Delaune, Steve Kremer, Daniel Pasaila: Security Protocols, Constraint Systems, and Group Theories. IJCAR 2012: 164-178
[c35]Rohit Chadha, Stefan Ciobaca, Steve Kremer: Automated Verification of Equivalence Properties of Cryptographic Protocols. ESOP 2012: 108-127
[i4]Steve Kremer, Robert Künnemann, Graham Steel: Universally Composable Key-Management. IACR Cryptology ePrint Archive 2012: 189 (2012)- 2011
[j13]Véronique Cortier, Steve Kremer, Bogdan Warinschi: A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. J. Autom. Reasoning 46(3-4): 225-259 (2011)
[c34]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel: Formal Analysis of Protocols Based on TPM State Registers. CSF 2011: 66-80
[c33]Steve Kremer, Graham Steel, Bogdan Warinschi: Security for Key Management Interfaces. CSF 2011: 266-280
[c32]Céline Chevalier, Stéphanie Delaune, Steve Kremer: Transforming Password Protocols to Compose. FSTTCS 2011: 204-216- 2010
[j12]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan: Symbolic bisimulation for the applied pi calculus. Journal of Computer Security 18(2): 317-377 (2010)
[j11]Steve Kremer, Laurent Mazaré: Computationally sound analysis of protocols using bilinear pairings. Journal of Computer Security 18(6): 999-1033 (2010)
[j10]Stéphanie Delaune, Steve Kremer, Graham Steel: Formal security analysis of PKCS#11 and proprietary extensions. Journal of Computer Security 18(6): 1211-1245 (2010)
[c31]Steve Kremer, Mark Ryan, Ben Smyth: Election Verifiability in Electronic Voting Protocols. ESORICS 2010: 389-404
[c30]Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel: A Formal Analysis of Authentication in the TPM. Formal Aspects in Security and Trust 2010: 111-125
[c29]Ben Smyth, Mark Ryan, Steve Kremer, Mounira Kourjieh: Towards Automatic Analysis of Election Verifiability Properties. ARSPA-WITS 2010: 146-163
[c28]Stéphanie Delaune, Steve Kremer, Mark Ryan: Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. Towards Trustworthy Elections 2010: 289-309
2000 – 2009
- 2009
[j9]
[j8]Mathieu Baudet, Véronique Cortier, Steve Kremer: Computationally sound implementations of equational theories against passive adversaries. Inf. Comput. 207(4): 496-520 (2009)
[j7]Stéphanie Delaune, Steve Kremer, Mark Ryan: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security 17(4): 435-487 (2009)
[c27]Steve Kremer, Antoine Mercier, Ralf Treinen: Reducing Equational Theories for the Decision of Static Equivalence. ASIAN 2009: 94-108
[c26]Stefan Ciobaca, Stéphanie Delaune, Steve Kremer: Computing Knowledge in Security Protocols under Convergent Equational Theories. CADE 2009: 355-370
[c25]Rohit Chadha, Stéphanie Delaune, Steve Kremer: Epistemic Logic for the Applied Pi Calculus. FMOODS/FORTE 2009: 182-197
[c24]Stéphanie Delaune, Steve Kremer, Olivier Pereira: Simulation based security in the applied pi calculus. FSTTCS 2009: 169-180
[e2]Michele Boreale, Steve Kremer (Eds.): Proceedings 7th International Workshop on Security Issues in Concurrency. EPTCS 7, 2009
[i3]Stéphanie Delaune, Steve Kremer, Olivier Pereira: Simulation based security in the applied pi calculus. IACR Cryptology ePrint Archive 2009: 267 (2009)- 2008
[c23]Steve Kremer, Antoine Mercier, Ralf Treinen: Proving Group Protocols Secure Against Eavesdroppers. IJCAR 2008: 116-131
[c22]Stéphanie Delaune, Steve Kremer, Mark Ryan: Composition of Password-Based Protocols. CSF 2008: 239-251
[c21]
[c20]Myrto Arapinis, Stéphanie Delaune, Steve Kremer: From One Session to Many: Dynamic Tags for Security Protocols. LPAR 2008: 128-142
[e1]Liqun Chen, Steve Kremer, Mark Dermot Ryan (Eds.): Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008- 2007
[c19]Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
[c18]Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
[c17]
[c16]Stéphanie Delaune, Steve Kremer, Mark Ryan: Symbolic Bisimulation for the Applied Pi Calculus. FSTTCS 2007: 133-145
[c15]- 2006
[j6]Rohit Chadha, Steve Kremer, Andre Scedrov: Formal Analysis of Multiparty Contract Signing. J. Autom. Reasoning 36(1-2): 39-83 (2006)
[j5]Jean Cardinal, Steve Kremer, Stefan Langerman: Juggling with Pattern Matching. Theory Comput. Syst. 39(3): 425-437 (2006)
[c14]Stéphanie Delaune, Steve Kremer, Mark Ryan: Coercion-Resistance and Receipt-Freeness in Electronic Voting. CSFW 2006: 28-42
[c13]Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi: Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. FSTTCS 2006: 176-187
[i2]Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi: Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. IACR Cryptology ePrint Archive 2006: 218 (2006)- 2005
[j4]Steve Kremer, Mark Ryan: Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. Electr. Notes Theor. Comput. Sci. 128(5): 87-104 (2005)
[c12]
[c11]Aybek Mukhamedov, Steve Kremer, Eike Ritter: Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. Financial Cryptography 2005: 255-269
[c10]Mathieu Baudet, Véronique Cortier, Steve Kremer: Computationally Sound Implementations of Equational Theories Against Passive Adversaries. ICALP 2005: 652-663
[i1]Mathieu Baudet, Véronique Cortier, Steve Kremer: Computationally sound implementations of equational theories against passive adversaries. IACR Cryptology ePrint Archive 2005: 74 (2005)- 2004
[c9]Rohit Chadha, Steve Kremer, Andre Scedrov: Formal Analysis of Multi-Party Contract Signing. CSFW 2004: 266-265- 2003
[j3]Steve Kremer, Olivier Markowitch: Fair multi-party non-repudiation protocols. Int. J. Inf. Sec. 1(4): 223-235 (2003)
[j2]Steve Kremer, Jean-François Raskin: A Game-based Verification of Non-repudiation and Fair Exchange Protocols. Journal of Computer Security 11(3): 399-430 (2003)
[c8]Shahrokh Saeednia, Steve Kremer, Olivier Markowitch: An Efficient Strong Designated Verifier Signature Scheme. ICISC 2003: 40-54- 2002
[j1]Steve Kremer, Olivier Markowitch, Jianying Zhou: An intensive survey of fair non-repudiation protocols. Computer Communications 25(17): 1606-1621 (2002)
[c7]
[c6]Olivier Markowitch, Dieter Gollmann, Steve Kremer: On Fairness in Exchange Protocols. ICISC 2002: 451-464- 2001
[c5]Steve Kremer, Jean-François Raskin: A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. CONCUR 2001: 551-565
[c4]
[c3]Olivier Markowitch, Steve Kremer: An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. ISC 2001: 363-378- 2000
[c2]Olivier Markowitch, Steve Kremer: A Multi-party Optimistic Non-repudiation Protocol. ICISC 2000: 109-122
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:59 CEST by the dblp team



