Search dblp for Publications

export results for "Steve Kremer"

 download as .bib file

@article{DBLP:journals/siglog/Kremer24,
  author       = {Steve Kremer},
  title        = {Security and Privacy Column},
  journal      = {{ACM} {SIGLOG} News},
  volume       = {11},
  number       = {2},
  pages        = {61},
  year         = {2024},
  url          = {https://doi.org/10.1145/3665453.3665460},
  doi          = {10.1145/3665453.3665460},
  timestamp    = {Tue, 11 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siglog/Kremer24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/theoretics/ChevalKR24,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {DeepSec: Deciding Equivalence Properties for Security Protocols -
                  Improved theory and practice},
  journal      = {TheoretiCS},
  volume       = {3},
  year         = {2024},
  url          = {https://doi.org/10.46298/theoretics.24.4},
  doi          = {10.46298/THEORETICS.24.4},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/theoretics/ChevalKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChevalCK23,
  author       = {Vincent Cheval and
                  Rapha{\"{e}}lle Crubill{\'{e}} and
                  Steve Kremer},
  title        = {Symbolic protocol verification with dice},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {501--538},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230037},
  doi          = {10.3233/JCS-230037},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siglog/Kremer23,
  author       = {Steve Kremer},
  title        = {Security and Privacy Column},
  journal      = {{ACM} {SIGLOG} News},
  volume       = {10},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.1145/3584676.3584679},
  doi          = {10.1145/3584676.3584679},
  timestamp    = {Sun, 26 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siglog/Kremer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChevalCDHJK23,
  author       = {Vincent Cheval and
                  Cas Cremers and
                  Alexander Dax and
                  Lucca Hirschi and
                  Charlie Jacomme and
                  Steve Kremer},
  title        = {Hash Gone Bad: Automated discovery of protocol attacks that exploit
                  hash function weaknesses},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5899--5916},
  year         = {2023},
  crossref     = {DBLP:conf/uss/2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheval},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChevalCDHJK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Jacomme0KR23,
  author       = {Charlie Jacomme and
                  Elise Klein and
                  Steve Kremer and
                  Ma{\"{\i}}wenn Racouchot},
  title        = {A comprehensive, formal and automated analysis of the {EDHOC} protocol},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5881--5898},
  year         = {2023},
  crossref     = {DBLP:conf/uss/2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/jacomme},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Jacomme0KR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmmannHK23,
  author       = {Max Ammann and
                  Lucca Hirschi and
                  Steve Kremer},
  title        = {{DY} Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/057},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AmmannHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/BartheJK22,
  author       = {Gilles Barthe and
                  Charlie Jacomme and
                  Steve Kremer},
  title        = {Universal Equivalence and Majority of Probabilistic Programs over
                  Finite Fields},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {23},
  number       = {1},
  pages        = {5:1--5:42},
  year         = {2022},
  url          = {https://doi.org/10.1145/3487063},
  doi          = {10.1145/3487063},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/BartheJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCK22,
  author       = {Vincent Cheval and
                  Rapha{\"{e}}lle Crubill{\'{e}} and
                  Steve Kremer},
  title        = {Symbolic protocol verification with dice: process equivalences in
                  the presence of probabilities},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {319--334},
  year         = {2022},
  crossref     = {DBLP:conf/csfw/2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919644},
  doi          = {10.1109/CSF54842.2022.9919644},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChevalJKK22,
  author       = {Vincent Cheval and
                  Charlie Jacomme and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {{SAPIC+:} protocol verifiers of the world, unite!},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3935--3952},
  year         = {2022},
  crossref     = {DBLP:conf/uss/2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/cheval},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChevalJKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03225,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {DeepSec: Deciding Equivalence Properties for Security Protocols -
                  Improved theory and practice},
  journal      = {CoRR},
  volume       = {abs/2211.03225},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03225},
  doi          = {10.48550/ARXIV.2211.03225},
  eprinttype    = {arXiv},
  eprint       = {2211.03225},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevalCDHJK22,
  author       = {Vincent Cheval and
                  Cas Cremers and
                  Alexander Dax and
                  Lucca Hirschi and
                  Charlie Jacomme and
                  Steve Kremer},
  title        = {Hash Gone Bad: Automated discovery of protocol attacks that exploit
                  hash function weaknesses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1314},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1314},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevalCDHJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevalJKK22,
  author       = {Vincent Cheval and
                  Charlie Jacomme and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Sapic+: protocol verifiers of the world, unite!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {741},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/741},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevalJKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JacommeK21,
  author       = {Charlie Jacomme and
                  Steve Kremer},
  title        = {An Extensive Formal Analysis of Multi-factor Authentication Protocols},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {13:1--13:34},
  year         = {2021},
  url          = {https://doi.org/10.1145/3440712},
  doi          = {10.1145/3440712},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JacommeK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BabelCK20,
  author       = {Kushal Babel and
                  Vincent Cheval and
                  Steve Kremer},
  title        = {On the semantics of communications when verifying equivalence properties},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {71--127},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191366},
  doi          = {10.3233/JCS-191366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BabelCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChevalKR20,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {The Hitchhiker's Guide to Decidability and Complexity of Equivalence
                  Properties in Security Protocols},
  booktitle    = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov
                  on the Occasion of His 65th Birthday},
  pages        = {127--145},
  year         = {2020},
  crossref     = {DBLP:conf/birthday/2020scedrov},
  url          = {https://doi.org/10.1007/978-3-030-62077-6\_10},
  doi          = {10.1007/978-3-030-62077-6\_10},
  timestamp    = {Sun, 12 Feb 2023 18:48:21 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/ChevalKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/BartheJK20,
  author       = {Gilles Barthe and
                  Charlie Jacomme and
                  Steve Kremer},
  title        = {Universal equivalence and majority of probabilistic programs over
                  finite fields},
  booktitle    = {{LICS} '20: 35th Annual {ACM/IEEE} Symposium on Logic in Computer
                  Science, Saarbr{\"{u}}cken, Germany, July 8-11, 2020},
  pages        = {155--166},
  year         = {2020},
  crossref     = {DBLP:conf/lics/2020},
  url          = {https://doi.org/10.1145/3373718.3394746},
  doi          = {10.1145/3373718.3394746},
  timestamp    = {Sat, 30 Sep 2023 09:52:07 +0200},
  biburl       = {https://dblp.org/rec/conf/lics/BartheJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChevalKR19,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {Exploiting Symmetries When Proving Equivalence Properties for Security
                  Protocols},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {905--922},
  year         = {2019},
  crossref     = {DBLP:conf/ccs/2019},
  url          = {https://doi.org/10.1145/3319535.3354260},
  doi          = {10.1145/3319535.3354260},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChevalKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheGJKS19,
  author       = {Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Charlie Jacomme and
                  Steve Kremer and
                  Pierre{-}Yves Strub},
  title        = {Symbolic Methods in Computational Cryptography Proofs},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {136--151},
  year         = {2019},
  crossref     = {DBLP:conf/csfw/2019},
  url          = {https://doi.org/10.1109/CSF.2019.00017},
  doi          = {10.1109/CSF.2019.00017},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheGJKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BursucK19,
  author       = {Sergiu Bursuc and
                  Steve Kremer},
  title        = {Contingent Payments on a Public Ledger: Models and Reductions for
                  Automated Verification},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  pages        = {361--382},
  year         = {2019},
  crossref     = {DBLP:conf/esorics/2019-1},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_18},
  doi          = {10.1007/978-3-030-29959-0\_18},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BursucK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BursucDK19,
  author       = {Sergiu Bursuc and
                  Constantin Catalin Dragan and
                  Steve Kremer},
  title        = {Private Votes on Untrusted Platforms: Models, Attacks and Provable
                  Scheme},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {606--620},
  year         = {2019},
  crossref     = {DBLP:conf/eurosp/2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00050},
  doi          = {10.1109/EUROSP.2019.00050},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BursucDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BursucK19,
  author       = {Sergiu Bursuc and
                  Steve Kremer},
  title        = {Contingent payments on a public ledger: models and reductions for
                  automated verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BursucK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChevalKR18,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {The {DEEPSEC} Prover},
  booktitle    = {Computer Aided Verification - 30th International Conference, {CAV}
                  2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford,
                  UK, July 14-17, 2018, Proceedings, Part {II}},
  pages        = {28--36},
  year         = {2018},
  crossref     = {DBLP:conf/cav/2018-2},
  url          = {https://doi.org/10.1007/978-3-319-96142-2\_4},
  doi          = {10.1007/978-3-319-96142-2\_4},
  timestamp    = {Fri, 09 Apr 2021 18:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ChevalKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JacommeK18,
  author       = {Charlie Jacomme and
                  Steve Kremer},
  title        = {An Extensive Formal Analysis of Multi-factor Authentication Protocols},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {1--15},
  year         = {2018},
  crossref     = {DBLP:conf/csfw/2018},
  url          = {https://doi.org/10.1109/CSF.2018.00008},
  doi          = {10.1109/CSF.2018.00008},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JacommeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChevalKR18,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {{DEEPSEC:} Deciding Equivalence Properties in Security Protocols Theory
                  and Practice},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {529--546},
  year         = {2018},
  crossref     = {DBLP:conf/sp/2018},
  url          = {https://doi.org/10.1109/SP.2018.00033},
  doi          = {10.1109/SP.2018.00033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChevalKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/interfaces/MillerAADKMOT17,
  author       = {Michael R. Miller and
                  Robert J. Alexander and
                  Vincent A. Arbige and
                  Robert F. Dell and
                  Steven R. Kremer and
                  Brian P. McClune and
                  Jane E. Oppenlander and
                  Joshua P. Tomlin},
  title        = {Optimal Allocation of Students to Naval Nuclear-Power Training Units},
  journal      = {Interfaces},
  volume       = {47},
  number       = {4},
  pages        = {320--335},
  year         = {2017},
  url          = {https://doi.org/10.1287/inte.2017.0905},
  doi          = {10.1287/INTE.2017.0905},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/interfaces/MillerAADKMOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BaeldeDGK17,
  author       = {David Baelde and
                  St{\'{e}}phanie Delaune and
                  Ivan Gazeau and
                  Steve Kremer},
  title        = {Symbolic Verification of Privacy-Type Properties for Security Protocols
                  with {XOR}},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {234--248},
  year         = {2017},
  crossref     = {DBLP:conf/csfw/2017},
  url          = {https://doi.org/10.1109/CSF.2017.22},
  doi          = {10.1109/CSF.2017.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BaeldeDGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR17,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Ludovic Robin},
  title        = {Formal Verification of Protocols Based on Short Authenticated Strings},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {130--143},
  year         = {2017},
  crossref     = {DBLP:conf/csfw/2017},
  url          = {https://doi.org/10.1109/CSF.2017.26},
  doi          = {10.1109/CSF.2017.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GazeauK17,
  author       = {Ivan Gazeau and
                  Steve Kremer},
  title        = {Automated Analysis of Equivalence Properties for Security Protocols
                  Using Else Branches},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  pages        = {1--20},
  year         = {2017},
  crossref     = {DBLP:conf/esorics/2017-2},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_1},
  doi          = {10.1007/978-3-319-66399-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GazeauK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BackesDKK17,
  author       = {Michael Backes and
                  Jannik Dreier and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {A Novel Approach for Reasoning about Liveness in Cryptographic Protocols
                  and Its Application to Fair Exchange},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {76--91},
  year         = {2017},
  crossref     = {DBLP:conf/eurosp/2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.12},
  doi          = {10.1109/EUROSP.2017.12},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BackesDKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/JacommeKS17,
  author       = {Charlie Jacomme and
                  Steve Kremer and
                  Guillaume Scerri},
  title        = {Symbolic Models for Isolated Execution Environments},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {530--545},
  year         = {2017},
  crossref     = {DBLP:conf/eurosp/2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.16},
  doi          = {10.1109/EUROSP.2017.16},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/JacommeKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BabelCK17,
  author       = {Kushal Babel and
                  Vincent Cheval and
                  Steve Kremer},
  title        = {On Communication Models When Verifying Equivalence Properties},
  booktitle    = {Principles of Security and Trust - 6th International Conference, {POST}
                  2017, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29,
                  2017, Proceedings},
  pages        = {141--163},
  year         = {2017},
  crossref     = {DBLP:conf/post/2017},
  url          = {https://doi.org/10.1007/978-3-662-54455-6\_7},
  doi          = {10.1007/978-3-662-54455-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BabelCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/DreierDKS17,
  author       = {Jannik Dreier and
                  Charles Dum{\'{e}}nil and
                  Steve Kremer and
                  Ralf Sasse},
  title        = {Beyond Subterm-Convergent Equational Theories in Automated Verification
                  of Stateful Protocols},
  booktitle    = {Principles of Security and Trust - 6th International Conference, {POST}
                  2017, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29,
                  2017, Proceedings},
  pages        = {117--140},
  year         = {2017},
  crossref     = {DBLP:conf/post/2017},
  url          = {https://doi.org/10.1007/978-3-662-54455-6\_6},
  doi          = {10.1007/978-3-662-54455-6\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/DreierDKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacommeKS17,
  author       = {Charlie Jacomme and
                  Steve Kremer and
                  Guillaume Scerri},
  title        = {Symbolic Models for Isolated Execution Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacommeKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KremerK16,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Automated analysis of security protocols with global state},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {583--616},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160556},
  doi          = {10.3233/JCS-160556},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KremerK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ChadhaCCK16,
  author       = {Rohit Chadha and
                  Vincent Cheval and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Steve Kremer},
  title        = {Automated Verification of Equivalence Properties of Cryptographic
                  Protocols},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {17},
  number       = {4},
  pages        = {23},
  year         = {2016},
  url          = {https://doi.org/10.1145/2926715},
  doi          = {10.1145/2926715},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ChadhaCCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArapinisCK16,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {When Are Three Voters Enough for Privacy Properties?},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  pages        = {241--260},
  year         = {2016},
  crossref     = {DBLP:conf/esorics/2016-2},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_13},
  doi          = {10.1007/978-3-319-45741-3\_13},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ArapinisCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KremerR16,
  author       = {Steve Kremer and
                  Peter B. R{\o}nne},
  title        = {To Du or Not to Du: {A} Security Analysis of Du-Vote},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {473--486},
  year         = {2016},
  crossref     = {DBLP:conf/eurosp/2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.42},
  doi          = {10.1109/EUROSP.2016.42},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KremerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/CortierK16,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Formal Models for Analyzing Security Protocols: Some Lecture Notes},
  booktitle    = {Dependable Software Systems Engineering},
  pages        = {33--58},
  year         = {2016},
  crossref     = {DBLP:series/natosec/45},
  url          = {https://doi.org/10.3233/978-1-61499-627-9-33},
  doi          = {10.3233/978-1-61499-627-9-33},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/CortierK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArapinisCK16,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {When Are Three Voters Enough for Privacy Properties?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/690},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArapinisCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/CortierEKMW15,
  author       = {V{\'{e}}ronique Cortier and
                  Fabienne Eigner and
                  Steve Kremer and
                  Matteo Maffei and
                  Cyrille Wiedling},
  title        = {Type-Based Verification of Electronic Voting Protocols},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  pages        = {303--323},
  year         = {2015},
  crossref     = {DBLP:conf/post/2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_16},
  doi          = {10.1007/978-3-662-46666-7\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/CortierEKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierEKMW15,
  author       = {V{\'{e}}ronique Cortier and
                  Fabienne Eigner and
                  Steve Kremer and
                  Matteo Maffei and
                  Cyrille Wiedling},
  title        = {Type-Based Verification of Electronic Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierEKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ArapinisDK14,
  author       = {Myrto Arapinis and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {Dynamic Tags for Security Protocols},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {10},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.2168/LMCS-10(2:11)2014},
  doi          = {10.2168/LMCS-10(2:11)2014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ArapinisDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftpl/CortierK14,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Formal Models and Techniques for Analyzing Security Protocols: {A}
                  Tutorial},
  journal      = {Found. Trends Program. Lang.},
  volume       = {1},
  number       = {3},
  pages        = {151--267},
  year         = {2014},
  url          = {https://doi.org/10.1561/2500000001},
  doi          = {10.1561/2500000001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftpl/CortierK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/KremerN14,
  author       = {Steve Kremer and
                  Paliath Narendran},
  title        = {Foreword to the special issue on security and rewriting techniques},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.002},
  doi          = {10.1016/J.IC.2014.07.002},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/KremerN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcomp/ChanDKGD14,
  author       = {Joel Chan and
                  Steven Dang and
                  P{\'{e}}ter Kr{\'{e}}mer and
                  Lucy Guo and
                  Steven Dow},
  title        = {IdeaGens: {A} Social Ideation System for Guided Crowd Brainstorming},
  booktitle    = {Proceedings of the Seconf {AAAI} Conference on Human Computation and
                  Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania,
                  {USA}},
  pages        = {67--68},
  year         = {2014},
  crossref     = {DBLP:conf/hcomp/2014},
  url          = {https://doi.org/10.1609/hcomp.v2i1.13140},
  doi          = {10.1609/HCOMP.V2I1.13140},
  timestamp    = {Tue, 05 Sep 2023 11:10:11 +0200},
  biburl       = {https://dblp.org/rec/conf/hcomp/ChanDKGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KremerK14,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Automated Analysis of Security Protocols with Global State},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {163--178},
  year         = {2014},
  crossref     = {DBLP:conf/sp/2014},
  url          = {https://doi.org/10.1109/SP.2014.18},
  doi          = {10.1109/SP.2014.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KremerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2014,
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8},
  doi          = {10.1007/978-3-642-54792-8},
  isbn         = {978-3-642-54791-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KremerK14,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Automated analysis of security protocols with global state},
  journal      = {CoRR},
  volume       = {abs/1403.1142},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.1142},
  eprinttype    = {arXiv},
  eprint       = {1403.1142},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KremerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/ChevalierDKR13,
  author       = {C{\'{e}}line Chevalier and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Composition of password-based protocols},
  journal      = {Formal Methods Syst. Des.},
  volume       = {43},
  number       = {3},
  pages        = {369--413},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10703-013-0184-6},
  doi          = {10.1007/S10703-013-0184-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/ChevalierDKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerKS13,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann and
                  Graham Steel},
  title        = {Universally Composable Key-Management},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  pages        = {327--344},
  year         = {2013},
  crossref     = {DBLP:conf/esorics/2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_19},
  doi          = {10.1007/978-3-642-40203-6\_19},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCKR13,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Practical Everlasting Privacy},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  pages        = {21--40},
  year         = {2013},
  crossref     = {DBLP:conf/post/2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_2},
  doi          = {10.1007/978-3-642-36830-1\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/CiobacaDK12,
  author       = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {Computing Knowledge in Security Protocols Under Convergent Equational
                  Theories},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {219--262},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-010-9197-7},
  doi          = {10.1007/S10817-010-9197-7},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/CiobacaDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/KremerMT12,
  author       = {Steve Kremer and
                  Antoine Mercier and
                  Ralf Treinen},
  title        = {Reducing Equational Theories for the Decision of Static Equivalence},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {197--217},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-010-9203-0},
  doi          = {10.1007/S10817-010-9203-0},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/KremerMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/DelauneKP12,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Daniel Pasaila},
  title        = {Security Protocols, Constraint Systems, and Group Theories},
  booktitle    = {Automated Reasoning - 6th International Joint Conference, {IJCAR}
                  2012, Manchester, UK, June 26-29, 2012. Proceedings},
  pages        = {164--178},
  year         = {2012},
  crossref     = {DBLP:conf/cade/2012},
  url          = {https://doi.org/10.1007/978-3-642-31365-3\_15},
  doi          = {10.1007/978-3-642-31365-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/DelauneKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/ChadhaCK12,
  author       = {Rohit Chadha and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Steve Kremer},
  title        = {Automated Verification of Equivalence Properties of Cryptographic
                  Protocols},
  booktitle    = {Programming Languages and Systems - 21st European Symposium on Programming,
                  {ESOP} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012. Proceedings},
  pages        = {108--127},
  year         = {2012},
  crossref     = {DBLP:conf/esop/2012},
  url          = {https://doi.org/10.1007/978-3-642-28869-2\_6},
  doi          = {10.1007/978-3-642-28869-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/ChadhaCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KremerKS12,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann and
                  Graham Steel},
  title        = {Universally Composable Key-Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KremerKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Kremer11,
  author       = {Steve Kremer},
  title        = {Modelling and analyzing security protocols in cryptographic process
                  calculi},
  year         = {2011},
  url          = {https://tel.archives-ouvertes.fr/tel-00636769},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Kremer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/CortierKW11,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Bogdan Warinschi},
  title        = {A Survey of Symbolic Methods in Computational Analysis of Cryptographic
                  Systems},
  journal      = {J. Autom. Reason.},
  volume       = {46},
  number       = {3-4},
  pages        = {225--259},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10817-010-9187-9},
  doi          = {10.1007/S10817-010-9187-9},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/CortierKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKRS11,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan and
                  Graham Steel},
  title        = {Formal Analysis of Protocols Based on {TPM} State Registers},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {66--80},
  year         = {2011},
  crossref     = {DBLP:conf/csfw/2011},
  url          = {https://doi.org/10.1109/CSF.2011.12},
  doi          = {10.1109/CSF.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KremerSW11,
  author       = {Steve Kremer and
                  Graham Steel and
                  Bogdan Warinschi},
  title        = {Security for Key Management Interfaces},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {266--280},
  year         = {2011},
  crossref     = {DBLP:conf/csfw/2011},
  url          = {https://doi.org/10.1109/CSF.2011.25},
  doi          = {10.1109/CSF.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KremerSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ChevalierDK11,
  author       = {C{\'{e}}line Chevalier and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {Transforming Password Protocols to Compose},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011,
                  Mumbai, India},
  pages        = {204--216},
  year         = {2011},
  crossref     = {DBLP:conf/fsttcs/2011},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2011.204},
  doi          = {10.4230/LIPICS.FSTTCS.2011.204},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/ChevalierDK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/CortierK11,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Introduction},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  pages        = {1--12},
  year         = {2011},
  crossref     = {DBLP:books/ios/11/CK2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-1},
  doi          = {10.3233/978-1-60750-714-7-1},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/CortierK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ios/11/CK2011,
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols},
  isbn         = {978-1-60750-713-0},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/CK2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKR10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Symbolic bisimulation for the applied pi calculus},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {317--377},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2010-0363},
  doi          = {10.3233/JCS-2010-0363},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKS10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Graham Steel},
  title        = {Formal security analysis of PKCS{\#}11 and proprietary extensions},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {1211--1245},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0394},
  doi          = {10.3233/JCS-2009-0394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KremerM10,
  author       = {Steve Kremer and
                  Laurent Mazar{\'{e}}},
  title        = {Computationally sound analysis of protocols using bilinear pairings},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {999--1033},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0388},
  doi          = {10.3233/JCS-2009-0388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KremerM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerRS10,
  author       = {Steve Kremer and
                  Mark Ryan and
                  Ben Smyth},
  title        = {Election Verifiability in Electronic Voting Protocols},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  pages        = {389--404},
  year         = {2010},
  crossref     = {DBLP:conf/esorics/2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_24},
  doi          = {10.1007/978-3-642-15497-3\_24},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DelauneKRS10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan and
                  Graham Steel},
  title        = {A Formal Analysis of Authentication in the {TPM}},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  pages        = {111--125},
  year         = {2010},
  crossref     = {DBLP:conf/ifip1-7/2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_8},
  doi          = {10.1007/978-3-642-19751-2\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DelauneKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Steve Kremer and
                  Mounira Kourjieh},
  title        = {Towards Automatic Analysis of Election Verifiability Properties},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  pages        = {146--163},
  year         = {2010},
  crossref     = {DBLP:conf/ifip1-7/2010wits},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_11},
  doi          = {10.1007/978-3-642-16074-5\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/DelauneKR10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Verifying Privacy-Type Properties of Electronic Voting Protocols:
                  {A} Taster},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  pages        = {289--309},
  year         = {2010},
  crossref     = {DBLP:conf/wote/2010lncs},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_18},
  doi          = {10.1007/978-3-642-12980-3\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wote/DelauneKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BaudetCK09,
  author       = {Mathieu Baudet and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Computationally sound implementations of equational theories against
                  passive adversaries},
  journal      = {Inf. Comput.},
  volume       = {207},
  number       = {4},
  pages        = {496--520},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ic.2008.12.005},
  doi          = {10.1016/J.IC.2008.12.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/BaudetCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKR09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Verifying privacy-type properties of electronic voting protocols},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {435--487},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0340},
  doi          = {10.3233/JCS-2009-0340},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/KremerMT09,
  author       = {Steve Kremer and
                  Antoine Mercier and
                  Ralf Treinen},
  title        = {Reducing Equational Theories for the Decision of Static Equivalence},
  booktitle    = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  pages        = {94--108},
  year         = {2009},
  crossref     = {DBLP:conf/asian/2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4\_8},
  doi          = {10.1007/978-3-642-10622-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/KremerMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/CiobacaDK09,
  author       = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {Computing Knowledge in Security Protocols under Convergent Equational
                  Theories},
  booktitle    = {Automated Deduction - CADE-22, 22nd International Conference on Automated
                  Deduction, Montreal, Canada, August 2-7, 2009. Proceedings},
  pages        = {355--370},
  year         = {2009},
  crossref     = {DBLP:conf/cade/2009},
  url          = {https://doi.org/10.1007/978-3-642-02959-2\_27},
  doi          = {10.1007/978-3-642-02959-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/CiobacaDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/ChadhaDK09,
  author       = {Rohit Chadha and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {Epistemic Logic for the Applied Pi Calculus},
  booktitle    = {Formal Techniques for Distributed Systems, Joint 11th {IFIP} {WG}
                  6.1 International Conference {FMOODS} 2009 and 29th {IFIP} {WG} 6.1
                  International Conference {FORTE} 2009, Lisboa, Portugal, June 9-12,
                  2009. Proceedings},
  pages        = {182--197},
  year         = {2009},
  crossref     = {DBLP:conf/forte/2009},
  url          = {https://doi.org/10.1007/978-3-642-02138-1\_12},
  doi          = {10.1007/978-3-642-02138-1\_12},
  timestamp    = {Mon, 15 Jul 2019 16:26:46 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/ChadhaDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/DelauneKP09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Olivier Pereira},
  title        = {Simulation based security in the applied pi calculus},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2009, December 15-17, 2009,
                  {IIT} Kanpur, India},
  pages        = {169--180},
  year         = {2009},
  crossref     = {DBLP:conf/fsttcs/2009},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2009.2316},
  doi          = {10.4230/LIPICS.FSTTCS.2009.2316},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/DelauneKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secco/2008,
  editor       = {Steve Kremer and
                  Prakash Panangaden},
  title        = {Proceedings of the 6th Workshop on Security Issues in Concurrency,
                  SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {242},
  number       = {3},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/242/issue/3},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secco/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/corr/abs-0910-4420,
  editor       = {Michele Boreale and
                  Steve Kremer},
  title        = {Proceedings 7th International Workshop on Security Issues in Concurrency,
                  {SECCO} 2009, Bologna, Italy, 5th September 2009},
  series       = {{EPTCS}},
  volume       = {7},
  year         = {2009},
  url          = {https://doi.org/10.4204/EPTCS.7},
  doi          = {10.4204/EPTCS.7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-4420.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelauneKP09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Olivier Pereira},
  title        = {Simulation based security in the applied pi calculus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelauneKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/KremerMT08,
  author       = {Steve Kremer and
                  Antoine Mercier and
                  Ralf Treinen},
  title        = {Proving Group Protocols Secure Against Eavesdroppers},
  booktitle    = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008,
                  Sydney, Australia, August 12-15, 2008, Proceedings},
  pages        = {116--131},
  year         = {2008},
  crossref     = {DBLP:conf/cade/2008},
  url          = {https://doi.org/10.1007/978-3-540-71070-7\_9},
  doi          = {10.1007/978-3-540-71070-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/KremerMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR08,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Composition of Password-Based Protocols},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {239--251},
  year         = {2008},
  crossref     = {DBLP:conf/csfw/2008},
  url          = {https://doi.org/10.1109/CSF.2008.6},
  doi          = {10.1109/CSF.2008.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKS08,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Graham Steel},
  title        = {Formal Analysis of PKCS{\#}11},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {331--344},
  year         = {2008},
  crossref     = {DBLP:conf/csfw/2008},
  url          = {https://doi.org/10.1109/CSF.2008.16},
  doi          = {10.1109/CSF.2008.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/ArapinisDK08,
  author       = {Myrto Arapinis and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {From One Session to Many: Dynamic Tags for Security Protocols},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th
                  International Conference, {LPAR} 2008, Doha, Qatar, November 22-27,
                  2008. Proceedings},
  pages        = {128--142},
  year         = {2008},
  crossref     = {DBLP:conf/lpar/2008},
  url          = {https://doi.org/10.1007/978-3-540-89439-1\_9},
  doi          = {10.1007/978-3-540-89439-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/ArapinisDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KremerP09,
  author       = {Steve Kremer and
                  Prakash Panangaden},
  title        = {Preface},
  booktitle    = {Proceedings of the 6th Workshop on Security Issues in Concurrency,
                  SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008},
  pages        = {1--2},
  year         = {2008},
  crossref     = {DBLP:conf/secco/2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.077},
  doi          = {10.1016/J.ENTCS.2009.07.077},
  timestamp    = {Fri, 24 Feb 2023 13:42:44 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/KremerP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7421,
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/07421/},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerM07,
  author       = {Steve Kremer and
                  Laurent Mazar{\'{e}}},
  title        = {Adaptive Soundness of Static Equivalence},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  pages        = {610--625},
  year         = {2007},
  crossref     = {DBLP:conf/esorics/2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_40},
  doi          = {10.1007/978-3-540-74835-9\_40},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/DelauneKR07,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Symbolic Bisimulation for the Applied Pi Calculus},
  booktitle    = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
                  Computer Science, 27th International Conference, New Delhi, India,
                  December 12-14, 2007, Proceedings},
  pages        = {133--145},
  year         = {2007},
  crossref     = {DBLP:conf/fsttcs/2007},
  url          = {https://doi.org/10.1007/978-3-540-77050-3\_11},
  doi          = {10.1007/978-3-540-77050-3\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/DelauneKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/Kremer07,
  author       = {Steve Kremer},
  title        = {Computational Soundness of Equational Theories (Tutorial)},
  booktitle    = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis,
                  France, November 5-6, 2007, Revised Selected Papers},
  pages        = {363--382},
  year         = {2007},
  crossref     = {DBLP:conf/tgc/2007},
  url          = {https://doi.org/10.1007/978-3-540-78663-4\_24},
  doi          = {10.1007/978-3-540-78663-4\_24},
  timestamp    = {Sat, 19 Oct 2019 20:09:31 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/Kremer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChenKR07,
  author       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {07421 Executive Summary -- Formal Protocol Verification Applied},
  booktitle    = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  year         = {2007},
  crossref     = {DBLP:conf/dagstuhl/2007P7421},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1418},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChenKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChenKR07a,
  author       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {07421 Abstracts Collection -- Formal Protocol Verification Applied},
  booktitle    = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  year         = {2007},
  crossref     = {DBLP:conf/dagstuhl/2007P7421},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1419},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChenKR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ChadhaKS06,
  author       = {Rohit Chadha and
                  Steve Kremer and
                  Andre Scedrov},
  title        = {Formal Analysis of Multiparty Contract Signing},
  journal      = {J. Autom. Reason.},
  volume       = {36},
  number       = {1-2},
  pages        = {39--83},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10817-005-9019-5},
  doi          = {10.1007/S10817-005-9019-5},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ChadhaKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/CardinalKL06,
  author       = {Jean Cardinal and
                  Steve Kremer and
                  Stefan Langerman},
  title        = {Juggling with Pattern Matching},
  journal      = {Theory Comput. Syst.},
  volume       = {39},
  number       = {3},
  pages        = {425--437},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00224-005-1239-x},
  doi          = {10.1007/S00224-005-1239-X},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mst/CardinalKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR06,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Coercion-Resistance and Receipt-Freeness in Electronic Voting},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {28--42},
  year         = {2006},
  crossref     = {DBLP:conf/csfw/2006},
  url          = {https://doi.org/10.1109/CSFW.2006.8},
  doi          = {10.1109/CSFW.2006.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  booktitle    = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical
                  Computer Science, 26th International Conference, Kolkata, India, December
                  13-15, 2006, Proceedings},
  pages        = {176--187},
  year         = {2006},
  crossref     = {DBLP:conf/fsttcs/2006},
  url          = {https://doi.org/10.1007/11944836\_18},
  doi          = {10.1007/11944836\_18},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/KremerR05,
  author       = {Steve Kremer and
                  Mark Ryan},
  title        = {Analysis of an Electronic Voting Protocol in the Applied Pi Calculus},
  booktitle    = {Programming Languages and Systems, 14th European Symposium on Programming,
                  {ESOP} 2005, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8,
                  2005, Proceedings},
  pages        = {186--200},
  year         = {2005},
  crossref     = {DBLP:conf/esop/2005},
  url          = {https://doi.org/10.1007/978-3-540-31987-0\_14},
  doi          = {10.1007/978-3-540-31987-0\_14},
  timestamp    = {Fri, 27 Jan 2023 15:04:25 +0100},
  biburl       = {https://dblp.org/rec/conf/esop/KremerR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MukhamedovKR05,
  author       = {Aybek Mukhamedov and
                  Steve Kremer and
                  Eike Ritter},
  title        = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof
                  of Correctness in the Strand Space Model},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  pages        = {255--269},
  year         = {2005},
  crossref     = {DBLP:conf/fc/2005},
  url          = {https://doi.org/10.1007/11507840\_23},
  doi          = {10.1007/11507840\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BaudetCK05,
  author       = {Mathieu Baudet and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Computationally Sound Implementations of Equational Theories Against
                  Passive Adversaries},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  pages        = {652--663},
  year         = {2005},
  crossref     = {DBLP:conf/icalp/2005},
  url          = {https://doi.org/10.1007/11523468\_53},
  doi          = {10.1007/11523468\_53},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BaudetCK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaudetCK05,
  author       = {Mathieu Baudet and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Computationally sound implementations of equational theories against
                  passive adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaudetCK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChadhaKS04,
  author       = {Rohit Chadha and
                  Steve Kremer and
                  Andre Scedrov},
  title        = {Formal Analysis of Multi-Party Contract Signing},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {266--265},
  year         = {2004},
  crossref     = {DBLP:conf/csfw/2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.10},
  doi          = {10.1109/CSFW.2004.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChadhaKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KremerR05,
  author       = {Steve Kremer and
                  Mark Ryan},
  title        = {Analysing the Vulnerability of Protocols to Produce Known-pair and
                  Chosen-text Attacks},
  booktitle    = {Proceedings of the 2nd International Workshop on Security Issues in
                  Coordination Models, Languages, and Systems, SecCo 2004, London, UK,
                  August 30, 2004},
  pages        = {87--104},
  year         = {2004},
  crossref     = {DBLP:conf/secco/2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.11.043},
  doi          = {10.1016/J.ENTCS.2004.11.043},
  timestamp    = {Mon, 12 Dec 2022 15:38:22 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/KremerR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KremerM03,
  author       = {Steve Kremer and
                  Olivier Markowitch},
  title        = {Fair multi-party non-repudiation protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {1},
  number       = {4},
  pages        = {223--235},
  year         = {2003},
  url          = {https://doi.org/10.1007/s10207-003-0019-3},
  doi          = {10.1007/S10207-003-0019-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KremerM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KremerR03,
  author       = {Steve Kremer and
                  Jean{-}Fran{\c{c}}ois Raskin},
  title        = {A Game-based Verification of Non-repudiation and Fair Exchange Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {399--430},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11307},
  doi          = {10.3233/JCS-2003-11307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KremerR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SaeedniaKM03,
  author       = {Shahrokh Saeednia and
                  Steve Kremer and
                  Olivier Markowitch},
  title        = {An Efficient Strong Designated Verifier Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  pages        = {40--54},
  year         = {2003},
  crossref     = {DBLP:conf/icisc/2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_4},
  doi          = {10.1007/978-3-540-24691-6\_4},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/SaeedniaKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KremerMZ02,
  author       = {Steve Kremer and
                  Olivier Markowitch and
                  Jianying Zhou},
  title        = {An intensive survey of fair non-repudiation protocols},
  journal      = {Comput. Commun.},
  volume       = {25},
  number       = {17},
  pages        = {1606--1621},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0140-3664(02)00049-X},
  doi          = {10.1016/S0140-3664(02)00049-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KremerMZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KremerR02,
  author       = {Steve Kremer and
                  Jean{-}Fran{\c{c}}ois Raskin},
  title        = {Game Analysis of Abuse-free Contract Signing},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {206},
  year         = {2002},
  crossref     = {DBLP:conf/csfw/2002},
  url          = {https://doi.org/10.1109/CSFW.2002.1021817},
  doi          = {10.1109/CSFW.2002.1021817},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KremerR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MarkowitchGK02,
  author       = {Olivier Markowitch and
                  Dieter Gollmann and
                  Steve Kremer},
  title        = {On Fairness in Exchange Protocols},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  pages        = {451--464},
  year         = {2002},
  crossref     = {DBLP:conf/icisc/2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_31},
  doi          = {10.1007/3-540-36552-4\_31},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MarkowitchGK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/KremerR01,
  author       = {Steve Kremer and
                  Jean{-}Fran{\c{c}}ois Raskin},
  title        = {A Game-Based Verification of Non-repudiation and Fair Exchange Protocols},
  booktitle    = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference,
                  Aalborg, Denmark, August 20-25, 2001, Proceedings},
  pages        = {551--565},
  year         = {2001},
  crossref     = {DBLP:conf/concur/2001},
  url          = {https://doi.org/10.1007/3-540-44685-0\_37},
  doi          = {10.1007/3-540-44685-0\_37},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/KremerR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KremerM01,
  author       = {Steve Kremer and
                  Olivier Markowitch},
  title        = {Selective Receipt in Certified E-mail},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  pages        = {136--148},
  year         = {2001},
  crossref     = {DBLP:conf/indocrypt/2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_14},
  doi          = {10.1007/3-540-45311-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KremerM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MarkowitchK01,
  author       = {Olivier Markowitch and
                  Steve Kremer},
  title        = {An Optimistic Non-repudiation Protocol with Transparent Trusted Third
                  Party},
  booktitle    = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  pages        = {363--378},
  year         = {2001},
  crossref     = {DBLP:conf/isw/2001},
  url          = {https://doi.org/10.1007/3-540-45439-X\_25},
  doi          = {10.1007/3-540-45439-X\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/MarkowitchK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MarkowitchK00,
  author       = {Olivier Markowitch and
                  Steve Kremer},
  title        = {A Multi-party Optimistic Non-repudiation Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2000, Third International
                  Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  pages        = {109--122},
  year         = {2000},
  crossref     = {DBLP:conf/icisc/2000},
  url          = {https://doi.org/10.1007/3-540-45247-8\_9},
  doi          = {10.1007/3-540-45247-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MarkowitchK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KremerM00,
  author       = {Steve Kremer and
                  Olivier Markowitch},
  title        = {A Multi-Party Non-Repudiation Protocol},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  pages        = {271--280},
  year         = {2000},
  crossref     = {DBLP:conf/sec/2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KremerM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2023,
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2022,
  title        = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022},
  doi          = {10.1109/CSF54842.2022},
  isbn         = {978-1-6654-8417-6},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2022,
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22},
  isbn         = {978-1-939133-31-1},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2020scedrov,
  editor       = {Vivek Nigam and
                  Tajana Ban Kirigin and
                  Carolyn L. Talcott and
                  Joshua D. Guttman and
                  Stepan L. Kuznetsov and
                  Boon Thau Loo and
                  Mitsuhiro Okada},
  title        = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov
                  on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {12300},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62077-6},
  doi          = {10.1007/978-3-030-62077-6},
  isbn         = {978-3-030-62076-9},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2020scedrov.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lics/2020,
  editor       = {Holger Hermanns and
                  Lijun Zhang and
                  Naoki Kobayashi and
                  Dale Miller},
  title        = {{LICS} '20: 35th Annual {ACM/IEEE} Symposium on Logic in Computer
                  Science, Saarbr{\"{u}}cken, Germany, July 8-11, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373718},
  doi          = {10.1145/3373718},
  isbn         = {978-1-4503-7104-9},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/lics/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019,
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535},
  doi          = {10.1145/3319535},
  isbn         = {978-1-4503-6747-9},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2019,
  title        = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8804915/proceeding},
  isbn         = {978-1-7281-1407-1},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019-1,
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0},
  doi          = {10.1007/978-3-030-29959-0},
  isbn         = {978-3-030-29958-3},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2019,
  title        = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8790377/proceeding},
  isbn         = {978-1-7281-1148-3},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cav/2018-2,
  editor       = {Hana Chockler and
                  Georg Weissenbacher},
  title        = {Computer Aided Verification - 30th International Conference, {CAV}
                  2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford,
                  UK, July 14-17, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10982},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96142-2},
  doi          = {10.1007/978-3-319-96142-2},
  isbn         = {978-3-319-96141-5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2018,
  title        = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8428826/proceeding},
  isbn         = {978-1-5386-6680-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2018,
  title        = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8418581/proceeding},
  isbn         = {978-1-5386-4353-2},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2017,
  title        = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8048777/proceeding},
  isbn         = {978-1-5386-3217-8},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-2,
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9},
  doi          = {10.1007/978-3-319-66399-9},
  isbn         = {978-3-319-66398-2},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2017,
  title        = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7961955/proceeding},
  isbn         = {978-1-5090-5762-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2017,
  editor       = {Matteo Maffei and
                  Mark Ryan},
  title        = {Principles of Security and Trust - 6th International Conference, {POST}
                  2017, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10204},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54455-6},
  doi          = {10.1007/978-3-662-54455-6},
  isbn         = {978-3-662-54454-9},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-2,
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3},
  doi          = {10.1007/978-3-319-45741-3},
  isbn         = {978-3-319-45740-6},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2016,
  title        = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7467055/proceeding},
  isbn         = {978-1-5090-1751-5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/natosec/45,
  editor       = {Javier Esparza and
                  Orna Grumberg and
                  Salomon Sickert},
  title        = {Dependable Software Systems Engineering},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {45},
  publisher    = {{IOS} Press},
  year         = {2016},
  isbn         = {978-1-61499-626-2},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/45.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2015,
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7},
  doi          = {10.1007/978-3-662-46666-7},
  isbn         = {978-3-662-46665-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hcomp/2014,
  editor       = {Jeffrey P. Bigham and
                  David C. Parkes},
  title        = {Proceedings of the Seconf {AAAI} Conference on Human Computation and
                  Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania,
                  {USA}},
  publisher    = {{AAAI}},
  year         = {2014},
  url          = {https://ojs.aaai.org/index.php/HCOMP/issue/view/314},
  isbn         = {978-1-57735-682-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/hcomp/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2014,
  title        = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6954656/proceeding},
  isbn         = {978-1-4799-4686-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6},
  doi          = {10.1007/978-3-642-40203-6},
  isbn         = {978-3-642-40202-9},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2013,
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1},
  doi          = {10.1007/978-3-642-36830-1},
  isbn         = {978-3-642-36829-5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cade/2012,
  editor       = {Bernhard Gramlich and
                  Dale Miller and
                  Uli Sattler},
  title        = {Automated Reasoning - 6th International Joint Conference, {IJCAR}
                  2012, Manchester, UK, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7364},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31365-3},
  doi          = {10.1007/978-3-642-31365-3},
  isbn         = {978-3-642-31364-6},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esop/2012,
  editor       = {Helmut Seidl},
  title        = {Programming Languages and Systems - 21st European Symposium on Programming,
                  {ESOP} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7211},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28869-2},
  doi          = {10.1007/978-3-642-28869-2},
  isbn         = {978-3-642-28868-5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2011,
  title        = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5991608/proceeding},
  isbn         = {978-1-61284-644-6},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2011,
  editor       = {Supratik Chakraborty and
                  Amit Kumar},
  title        = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011,
                  Mumbai, India},
  series       = {LIPIcs},
  volume       = {13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2011},
  url          = {http://drops.dagstuhl.de/portals/extern/index.php?semnr=110010},
  isbn         = {978-3-939897-34-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ios/11/CK2011,
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols},
  isbn         = {978-1-60750-713-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/CK2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3},
  doi          = {10.1007/978-3-642-15497-3},
  isbn         = {978-3-642-15496-6},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2010,
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19751-2},
  doi          = {10.1007/978-3-642-19751-2},
  isbn         = {978-3-642-19750-5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2010wits,
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16074-5},
  doi          = {10.1007/978-3-642-16074-5},
  isbn         = {978-3-642-16073-8},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wote/2010lncs,
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3},
  doi          = {10.1007/978-3-642-12980-3},
  isbn         = {978-3-642-12979-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/2010lncs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asian/2009,
  editor       = {Anupam Datta},
  title        = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5913},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4},
  doi          = {10.1007/978-3-642-10622-4},
  isbn         = {978-3-642-10621-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cade/2009,
  editor       = {Renate A. Schmidt},
  title        = {Automated Deduction - CADE-22, 22nd International Conference on Automated
                  Deduction, Montreal, Canada, August 2-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5663},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02959-2},
  doi          = {10.1007/978-3-642-02959-2},
  isbn         = {978-3-642-02958-5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/forte/2009,
  editor       = {David Lee and
                  Ant{\'{o}}nia Lopes and
                  Arnd Poetzsch{-}Heffter},
  title        = {Formal Techniques for Distributed Systems, Joint 11th {IFIP} {WG}
                  6.1 International Conference {FMOODS} 2009 and 29th {IFIP} {WG} 6.1
                  International Conference {FORTE} 2009, Lisboa, Portugal, June 9-12,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5522},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02138-1},
  doi          = {10.1007/978-3-642-02138-1},
  isbn         = {978-3-642-02137-4},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2009,
  editor       = {Ravi Kannan and
                  K. Narayan Kumar},
  title        = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2009, December 15-17, 2009,
                  {IIT} Kanpur, India},
  series       = {LIPIcs},
  volume       = {4},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2009},
  isbn         = {978-3-939897-13-2},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cade/2008,
  editor       = {Alessandro Armando and
                  Peter Baumgartner and
                  Gilles Dowek},
  title        = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008,
                  Sydney, Australia, August 12-15, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5195},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71070-7},
  doi          = {10.1007/978-3-540-71070-7},
  isbn         = {978-3-540-71069-1},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2008,
  title        = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4556666/proceeding},
  isbn         = {978-0-7695-3182-3},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lpar/2008,
  editor       = {Iliano Cervesato and
                  Helmut Veith and
                  Andrei Voronkov},
  title        = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th
                  International Conference, {LPAR} 2008, Doha, Qatar, November 22-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5330},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89439-1},
  doi          = {10.1007/978-3-540-89439-1},
  isbn         = {978-3-540-89438-4},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2007,
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9},
  doi          = {10.1007/978-3-540-74835-9},
  isbn         = {978-3-540-74834-2},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2007,
  editor       = {Vikraman Arvind and
                  Sanjiva Prasad},
  title        = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
                  Computer Science, 27th International Conference, New Delhi, India,
                  December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4855},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77050-3},
  doi          = {10.1007/978-3-540-77050-3},
  isbn         = {978-3-540-77049-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tgc/2007,
  editor       = {Gilles Barthe and
                  C{\'{e}}dric Fournet},
  title        = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis,
                  France, November 5-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4912},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78663-4},
  doi          = {10.1007/978-3-540-78663-4},
  isbn         = {978-3-540-78662-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2006,
  title        = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/10965/proceeding},
  isbn         = {0-7695-2615-2},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2006,
  editor       = {S. Arun{-}Kumar and
                  Naveen Garg},
  title        = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical
                  Computer Science, 26th International Conference, Kolkata, India, December
                  13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4337},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11944836},
  doi          = {10.1007/11944836},
  isbn         = {3-540-49994-6},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esop/2005,
  editor       = {Shmuel Sagiv},
  title        = {Programming Languages and Systems, 14th European Symposium on Programming,
                  {ESOP} 2005, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3444},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b107380},
  doi          = {10.1007/B107380},
  isbn         = {3-540-25435-8},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2005,
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137875},
  doi          = {10.1007/B137875},
  isbn         = {3-540-26656-9},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2005,
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468},
  doi          = {10.1007/11523468},
  isbn         = {3-540-27580-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2004,
  title        = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9168/proceeding},
  isbn         = {0-7695-2169-X},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secco/2004,
  editor       = {Riccardo Focardi and
                  Gianluigi Zavattaro},
  title        = {Proceedings of the 2nd International Workshop on Security Issues in
                  Coordination Models, Languages, and Systems, SecCo 2004, London, UK,
                  August 30, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {128},
  number       = {5},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/128/issue/5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/secco/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2003,
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b96249},
  doi          = {10.1007/B96249},
  isbn         = {3-540-21376-7},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2002,
  title        = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7957/proceeding},
  isbn         = {0-7695-1689-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2002,
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36552-4},
  doi          = {10.1007/3-540-36552-4},
  isbn         = {3-540-00716-4},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/concur/2001,
  editor       = {Kim Guldstrand Larsen and
                  Mogens Nielsen},
  title        = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference,
                  Aalborg, Denmark, August 20-25, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2154},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44685-0},
  doi          = {10.1007/3-540-44685-0},
  isbn         = {3-540-42497-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2001,
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3},
  doi          = {10.1007/3-540-45311-3},
  isbn         = {3-540-43010-5},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2001,
  editor       = {George I. Davida and
                  Yair Frankel},
  title        = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2200},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45439-X},
  doi          = {10.1007/3-540-45439-X},
  isbn         = {3-540-42662-0},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2000,
  editor       = {Dongho Won},
  title        = {Information Security and Cryptology - {ICISC} 2000, Third International
                  Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2015},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45247-8},
  doi          = {10.1007/3-540-45247-8},
  isbn         = {3-540-41782-6},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2000,
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  publisher    = {Kluwer},
  year         = {2000},
  isbn         = {0-7923-7914-4},
  timestamp    = {Sat, 07 Sep 2024 16:24:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics