Search dblp for Publications

export results for "Steve Kremer"

 download as .bib file

@article{DBLP:journals/siglog/Kremer24,
  author       = {Steve Kremer},
  title        = {Security and Privacy Column},
  journal      = {{ACM} {SIGLOG} News},
  volume       = {11},
  number       = {2},
  pages        = {61},
  year         = {2024},
  url          = {https://doi.org/10.1145/3665453.3665460},
  doi          = {10.1145/3665453.3665460},
  timestamp    = {Tue, 11 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siglog/Kremer24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/theoretics/ChevalKR24,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {DeepSec: Deciding Equivalence Properties for Security Protocols -
                  Improved theory and practice},
  journal      = {TheoretiCS},
  volume       = {3},
  year         = {2024},
  url          = {https://doi.org/10.46298/theoretics.24.4},
  doi          = {10.46298/THEORETICS.24.4},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/theoretics/ChevalKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChevalCK23,
  author       = {Vincent Cheval and
                  Rapha{\"{e}}lle Crubill{\'{e}} and
                  Steve Kremer},
  title        = {Symbolic protocol verification with dice},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {501--538},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230037},
  doi          = {10.3233/JCS-230037},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siglog/Kremer23,
  author       = {Steve Kremer},
  title        = {Security and Privacy Column},
  journal      = {{ACM} {SIGLOG} News},
  volume       = {10},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.1145/3584676.3584679},
  doi          = {10.1145/3584676.3584679},
  timestamp    = {Sun, 26 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siglog/Kremer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChevalCDHJK23,
  author       = {Vincent Cheval and
                  Cas Cremers and
                  Alexander Dax and
                  Lucca Hirschi and
                  Charlie Jacomme and
                  Steve Kremer},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Hash Gone Bad: Automated discovery of protocol attacks that exploit
                  hash function weaknesses},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5899--5916},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheval},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChevalCDHJK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Jacomme0KR23,
  author       = {Charlie Jacomme and
                  Elise Klein and
                  Steve Kremer and
                  Ma{\"{\i}}wenn Racouchot},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A comprehensive, formal and automated analysis of the {EDHOC} protocol},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5881--5898},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/jacomme},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Jacomme0KR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmmannHK23,
  author       = {Max Ammann and
                  Lucca Hirschi and
                  Steve Kremer},
  title        = {{DY} Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/057},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AmmannHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/BartheJK22,
  author       = {Gilles Barthe and
                  Charlie Jacomme and
                  Steve Kremer},
  title        = {Universal Equivalence and Majority of Probabilistic Programs over
                  Finite Fields},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {23},
  number       = {1},
  pages        = {5:1--5:42},
  year         = {2022},
  url          = {https://doi.org/10.1145/3487063},
  doi          = {10.1145/3487063},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/BartheJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCK22,
  author       = {Vincent Cheval and
                  Rapha{\"{e}}lle Crubill{\'{e}} and
                  Steve Kremer},
  title        = {Symbolic protocol verification with dice: process equivalences in
                  the presence of probabilities},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {319--334},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919644},
  doi          = {10.1109/CSF54842.2022.9919644},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChevalJKK22,
  author       = {Vincent Cheval and
                  Charlie Jacomme and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SAPIC+:} protocol verifiers of the world, unite!},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3935--3952},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/cheval},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChevalJKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03225,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {DeepSec: Deciding Equivalence Properties for Security Protocols -
                  Improved theory and practice},
  journal      = {CoRR},
  volume       = {abs/2211.03225},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03225},
  doi          = {10.48550/ARXIV.2211.03225},
  eprinttype    = {arXiv},
  eprint       = {2211.03225},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevalCDHJK22,
  author       = {Vincent Cheval and
                  Cas Cremers and
                  Alexander Dax and
                  Lucca Hirschi and
                  Charlie Jacomme and
                  Steve Kremer},
  title        = {Hash Gone Bad: Automated discovery of protocol attacks that exploit
                  hash function weaknesses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1314},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1314},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevalCDHJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevalJKK22,
  author       = {Vincent Cheval and
                  Charlie Jacomme and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Sapic+: protocol verifiers of the world, unite!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {741},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/741},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevalJKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JacommeK21,
  author       = {Charlie Jacomme and
                  Steve Kremer},
  title        = {An Extensive Formal Analysis of Multi-factor Authentication Protocols},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {13:1--13:34},
  year         = {2021},
  url          = {https://doi.org/10.1145/3440712},
  doi          = {10.1145/3440712},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JacommeK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BabelCK20,
  author       = {Kushal Babel and
                  Vincent Cheval and
                  Steve Kremer},
  title        = {On the semantics of communications when verifying equivalence properties},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {71--127},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191366},
  doi          = {10.3233/JCS-191366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BabelCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChevalKR20,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  editor       = {Vivek Nigam and
                  Tajana Ban Kirigin and
                  Carolyn L. Talcott and
                  Joshua D. Guttman and
                  Stepan L. Kuznetsov and
                  Boon Thau Loo and
                  Mitsuhiro Okada},
  title        = {The Hitchhiker's Guide to Decidability and Complexity of Equivalence
                  Properties in Security Protocols},
  booktitle    = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov
                  on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {12300},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62077-6\_10},
  doi          = {10.1007/978-3-030-62077-6\_10},
  timestamp    = {Sun, 12 Feb 2023 18:48:21 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/ChevalKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/BartheJK20,
  author       = {Gilles Barthe and
                  Charlie Jacomme and
                  Steve Kremer},
  editor       = {Holger Hermanns and
                  Lijun Zhang and
                  Naoki Kobayashi and
                  Dale Miller},
  title        = {Universal equivalence and majority of probabilistic programs over
                  finite fields},
  booktitle    = {{LICS} '20: 35th Annual {ACM/IEEE} Symposium on Logic in Computer
                  Science, Saarbr{\"{u}}cken, Germany, July 8-11, 2020},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373718.3394746},
  doi          = {10.1145/3373718.3394746},
  timestamp    = {Sat, 30 Sep 2023 09:52:07 +0200},
  biburl       = {https://dblp.org/rec/conf/lics/BartheJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChevalKR19,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Exploiting Symmetries When Proving Equivalence Properties for Security
                  Protocols},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {905--922},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354260},
  doi          = {10.1145/3319535.3354260},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChevalKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheGJKS19,
  author       = {Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Charlie Jacomme and
                  Steve Kremer and
                  Pierre{-}Yves Strub},
  title        = {Symbolic Methods in Computational Cryptography Proofs},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {136--151},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00017},
  doi          = {10.1109/CSF.2019.00017},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheGJKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BursucK19,
  author       = {Sergiu Bursuc and
                  Steve Kremer},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Contingent Payments on a Public Ledger: Models and Reductions for
                  Automated Verification},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {361--382},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_18},
  doi          = {10.1007/978-3-030-29959-0\_18},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BursucK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BursucDK19,
  author       = {Sergiu Bursuc and
                  Constantin Catalin Dragan and
                  Steve Kremer},
  title        = {Private Votes on Untrusted Platforms: Models, Attacks and Provable
                  Scheme},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {606--620},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00050},
  doi          = {10.1109/EUROSP.2019.00050},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BursucDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BursucK19,
  author       = {Sergiu Bursuc and
                  Steve Kremer},
  title        = {Contingent payments on a public ledger: models and reductions for
                  automated verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BursucK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChevalKR18,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  editor       = {Hana Chockler and
                  Georg Weissenbacher},
  title        = {The {DEEPSEC} Prover},
  booktitle    = {Computer Aided Verification - 30th International Conference, {CAV}
                  2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford,
                  UK, July 14-17, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10982},
  pages        = {28--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96142-2\_4},
  doi          = {10.1007/978-3-319-96142-2\_4},
  timestamp    = {Fri, 09 Apr 2021 18:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ChevalKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JacommeK18,
  author       = {Charlie Jacomme and
                  Steve Kremer},
  title        = {An Extensive Formal Analysis of Multi-factor Authentication Protocols},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {1--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00008},
  doi          = {10.1109/CSF.2018.00008},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JacommeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChevalKR18,
  author       = {Vincent Cheval and
                  Steve Kremer and
                  Itsaka Rakotonirina},
  title        = {{DEEPSEC:} Deciding Equivalence Properties in Security Protocols Theory
                  and Practice},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {529--546},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00033},
  doi          = {10.1109/SP.2018.00033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChevalKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/interfaces/MillerAADKMOT17,
  author       = {Michael R. Miller and
                  Robert J. Alexander and
                  Vincent A. Arbige and
                  Robert F. Dell and
                  Steven R. Kremer and
                  Brian P. McClune and
                  Jane E. Oppenlander and
                  Joshua P. Tomlin},
  title        = {Optimal Allocation of Students to Naval Nuclear-Power Training Units},
  journal      = {Interfaces},
  volume       = {47},
  number       = {4},
  pages        = {320--335},
  year         = {2017},
  url          = {https://doi.org/10.1287/inte.2017.0905},
  doi          = {10.1287/INTE.2017.0905},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/interfaces/MillerAADKMOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BaeldeDGK17,
  author       = {David Baelde and
                  St{\'{e}}phanie Delaune and
                  Ivan Gazeau and
                  Steve Kremer},
  title        = {Symbolic Verification of Privacy-Type Properties for Security Protocols
                  with {XOR}},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {234--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.22},
  doi          = {10.1109/CSF.2017.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BaeldeDGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR17,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Ludovic Robin},
  title        = {Formal Verification of Protocols Based on Short Authenticated Strings},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {130--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.26},
  doi          = {10.1109/CSF.2017.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GazeauK17,
  author       = {Ivan Gazeau and
                  Steve Kremer},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Automated Analysis of Equivalence Properties for Security Protocols
                  Using Else Branches},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_1},
  doi          = {10.1007/978-3-319-66399-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GazeauK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BackesDKK17,
  author       = {Michael Backes and
                  Jannik Dreier and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {A Novel Approach for Reasoning about Liveness in Cryptographic Protocols
                  and Its Application to Fair Exchange},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {76--91},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.12},
  doi          = {10.1109/EUROSP.2017.12},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BackesDKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/JacommeKS17,
  author       = {Charlie Jacomme and
                  Steve Kremer and
                  Guillaume Scerri},
  title        = {Symbolic Models for Isolated Execution Environments},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {530--545},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.16},
  doi          = {10.1109/EUROSP.2017.16},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/JacommeKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BabelCK17,
  author       = {Kushal Babel and
                  Vincent Cheval and
                  Steve Kremer},
  editor       = {Matteo Maffei and
                  Mark Ryan},
  title        = {On Communication Models When Verifying Equivalence Properties},
  booktitle    = {Principles of Security and Trust - 6th International Conference, {POST}
                  2017, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10204},
  pages        = {141--163},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54455-6\_7},
  doi          = {10.1007/978-3-662-54455-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BabelCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/DreierDKS17,
  author       = {Jannik Dreier and
                  Charles Dum{\'{e}}nil and
                  Steve Kremer and
                  Ralf Sasse},
  editor       = {Matteo Maffei and
                  Mark Ryan},
  title        = {Beyond Subterm-Convergent Equational Theories in Automated Verification
                  of Stateful Protocols},
  booktitle    = {Principles of Security and Trust - 6th International Conference, {POST}
                  2017, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10204},
  pages        = {117--140},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54455-6\_6},
  doi          = {10.1007/978-3-662-54455-6\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/DreierDKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacommeKS17,
  author       = {Charlie Jacomme and
                  Steve Kremer and
                  Guillaume Scerri},
  title        = {Symbolic Models for Isolated Execution Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacommeKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KremerK16,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Automated analysis of security protocols with global state},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {583--616},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160556},
  doi          = {10.3233/JCS-160556},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KremerK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ChadhaCCK16,
  author       = {Rohit Chadha and
                  Vincent Cheval and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Steve Kremer},
  title        = {Automated Verification of Equivalence Properties of Cryptographic
                  Protocols},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {17},
  number       = {4},
  pages        = {23},
  year         = {2016},
  url          = {https://doi.org/10.1145/2926715},
  doi          = {10.1145/2926715},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ChadhaCCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArapinisCK16,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {When Are Three Voters Enough for Privacy Properties?},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {241--260},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_13},
  doi          = {10.1007/978-3-319-45741-3\_13},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ArapinisCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KremerR16,
  author       = {Steve Kremer and
                  Peter B. R{\o}nne},
  title        = {To Du or Not to Du: {A} Security Analysis of Du-Vote},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {473--486},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.42},
  doi          = {10.1109/EUROSP.2016.42},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KremerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/CortierK16,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  editor       = {Javier Esparza and
                  Orna Grumberg and
                  Salomon Sickert},
  title        = {Formal Models for Analyzing Security Protocols: Some Lecture Notes},
  booktitle    = {Dependable Software Systems Engineering},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {45},
  pages        = {33--58},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-627-9-33},
  doi          = {10.3233/978-1-61499-627-9-33},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/CortierK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArapinisCK16,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {When Are Three Voters Enough for Privacy Properties?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/690},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArapinisCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/CortierEKMW15,
  author       = {V{\'{e}}ronique Cortier and
                  Fabienne Eigner and
                  Steve Kremer and
                  Matteo Maffei and
                  Cyrille Wiedling},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Type-Based Verification of Electronic Voting Protocols},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {303--323},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_16},
  doi          = {10.1007/978-3-662-46666-7\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/CortierEKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierEKMW15,
  author       = {V{\'{e}}ronique Cortier and
                  Fabienne Eigner and
                  Steve Kremer and
                  Matteo Maffei and
                  Cyrille Wiedling},
  title        = {Type-Based Verification of Electronic Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierEKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ArapinisDK14,
  author       = {Myrto Arapinis and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {Dynamic Tags for Security Protocols},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {10},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.2168/LMCS-10(2:11)2014},
  doi          = {10.2168/LMCS-10(2:11)2014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ArapinisDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftpl/CortierK14,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Formal Models and Techniques for Analyzing Security Protocols: {A}
                  Tutorial},
  journal      = {Found. Trends Program. Lang.},
  volume       = {1},
  number       = {3},
  pages        = {151--267},
  year         = {2014},
  url          = {https://doi.org/10.1561/2500000001},
  doi          = {10.1561/2500000001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftpl/CortierK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/KremerN14,
  author       = {Steve Kremer and
                  Paliath Narendran},
  title        = {Foreword to the special issue on security and rewriting techniques},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.002},
  doi          = {10.1016/J.IC.2014.07.002},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/KremerN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcomp/ChanDKGD14,
  author       = {Joel Chan and
                  Steven Dang and
                  P{\'{e}}ter Kr{\'{e}}mer and
                  Lucy Guo and
                  Steven Dow},
  editor       = {Jeffrey P. Bigham and
                  David C. Parkes},
  title        = {IdeaGens: {A} Social Ideation System for Guided Crowd Brainstorming},
  booktitle    = {Proceedings of the Seconf {AAAI} Conference on Human Computation and
                  Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania,
                  {USA}},
  pages        = {67--68},
  publisher    = {{AAAI}},
  year         = {2014},
  url          = {https://doi.org/10.1609/hcomp.v2i1.13140},
  doi          = {10.1609/HCOMP.V2I1.13140},
  timestamp    = {Tue, 05 Sep 2023 11:10:11 +0200},
  biburl       = {https://dblp.org/rec/conf/hcomp/ChanDKGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KremerK14,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Automated Analysis of Security Protocols with Global State},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {163--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.18},
  doi          = {10.1109/SP.2014.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KremerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2014,
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8},
  doi          = {10.1007/978-3-642-54792-8},
  isbn         = {978-3-642-54791-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KremerK14,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Automated analysis of security protocols with global state},
  journal      = {CoRR},
  volume       = {abs/1403.1142},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.1142},
  eprinttype    = {arXiv},
  eprint       = {1403.1142},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KremerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/ChevalierDKR13,
  author       = {C{\'{e}}line Chevalier and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Composition of password-based protocols},
  journal      = {Formal Methods Syst. Des.},
  volume       = {43},
  number       = {3},
  pages        = {369--413},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10703-013-0184-6},
  doi          = {10.1007/S10703-013-0184-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/ChevalierDKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerKS13,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann and
                  Graham Steel},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Universally Composable Key-Management},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {327--344},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_19},
  doi          = {10.1007/978-3-642-40203-6\_19},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCKR13,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Mark Ryan},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Practical Everlasting Privacy},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_2},
  doi          = {10.1007/978-3-642-36830-1\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/CiobacaDK12,
  author       = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  title        = {Computing Knowledge in Security Protocols Under Convergent Equational
                  Theories},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {219--262},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-010-9197-7},
  doi          = {10.1007/S10817-010-9197-7},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/CiobacaDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/KremerMT12,
  author       = {Steve Kremer and
                  Antoine Mercier and
                  Ralf Treinen},
  title        = {Reducing Equational Theories for the Decision of Static Equivalence},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {197--217},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-010-9203-0},
  doi          = {10.1007/S10817-010-9203-0},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/KremerMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/DelauneKP12,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Daniel Pasaila},
  editor       = {Bernhard Gramlich and
                  Dale Miller and
                  Uli Sattler},
  title        = {Security Protocols, Constraint Systems, and Group Theories},
  booktitle    = {Automated Reasoning - 6th International Joint Conference, {IJCAR}
                  2012, Manchester, UK, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7364},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31365-3\_15},
  doi          = {10.1007/978-3-642-31365-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/DelauneKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/ChadhaCK12,
  author       = {Rohit Chadha and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Steve Kremer},
  editor       = {Helmut Seidl},
  title        = {Automated Verification of Equivalence Properties of Cryptographic
                  Protocols},
  booktitle    = {Programming Languages and Systems - 21st European Symposium on Programming,
                  {ESOP} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7211},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28869-2\_6},
  doi          = {10.1007/978-3-642-28869-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/ChadhaCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KremerKS12,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann and
                  Graham Steel},
  title        = {Universally Composable Key-Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KremerKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Kremer11,
  author       = {Steve Kremer},
  title        = {Modelling and analyzing security protocols in cryptographic process
                  calculi},
  year         = {2011},
  url          = {https://tel.archives-ouvertes.fr/tel-00636769},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Kremer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/CortierKW11,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Bogdan Warinschi},
  title        = {A Survey of Symbolic Methods in Computational Analysis of Cryptographic
                  Systems},
  journal      = {J. Autom. Reason.},
  volume       = {46},
  number       = {3-4},
  pages        = {225--259},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10817-010-9187-9},
  doi          = {10.1007/S10817-010-9187-9},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/CortierKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKRS11,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan and
                  Graham Steel},
  title        = {Formal Analysis of Protocols Based on {TPM} State Registers},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {66--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.12},
  doi          = {10.1109/CSF.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KremerSW11,
  author       = {Steve Kremer and
                  Graham Steel and
                  Bogdan Warinschi},
  title        = {Security for Key Management Interfaces},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {266--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.25},
  doi          = {10.1109/CSF.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KremerSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ChevalierDK11,
  author       = {C{\'{e}}line Chevalier and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  editor       = {Supratik Chakraborty and
                  Amit Kumar},
  title        = {Transforming Password Protocols to Compose},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011,
                  Mumbai, India},
  series       = {LIPIcs},
  volume       = {13},
  pages        = {204--216},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2011},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2011.204},
  doi          = {10.4230/LIPICS.FSTTCS.2011.204},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/ChevalierDK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/CortierK11,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Introduction},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {1--12},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-1},
  doi          = {10.3233/978-1-60750-714-7-1},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/CortierK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ios/11/CK2011,
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols},
  isbn         = {978-1-60750-713-0},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/CK2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKR10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Symbolic bisimulation for the applied pi calculus},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {317--377},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2010-0363},
  doi          = {10.3233/JCS-2010-0363},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKS10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Graham Steel},
  title        = {Formal security analysis of PKCS{\#}11 and proprietary extensions},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {1211--1245},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0394},
  doi          = {10.3233/JCS-2009-0394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KremerM10,
  author       = {Steve Kremer and
                  Laurent Mazar{\'{e}}},
  title        = {Computationally sound analysis of protocols using bilinear pairings},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {999--1033},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0388},
  doi          = {10.3233/JCS-2009-0388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KremerM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerRS10,
  author       = {Steve Kremer and
                  Mark Ryan and
                  Ben Smyth},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Election Verifiability in Electronic Voting Protocols},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_24},
  doi          = {10.1007/978-3-642-15497-3\_24},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DelauneKRS10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Dermot Ryan and
                  Graham Steel},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {A Formal Analysis of Authentication in the {TPM}},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_8},
  doi          = {10.1007/978-3-642-19751-2\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DelauneKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Steve Kremer and
                  Mounira Kourjieh},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Towards Automatic Analysis of Election Verifiability Properties},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_11},
  doi          = {10.1007/978-3-642-16074-5\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/DelauneKR10,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Verifying Privacy-Type Properties of Electronic Voting Protocols:
                  {A} Taster},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {289--309},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_18},
  doi          = {10.1007/978-3-642-12980-3\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wote/DelauneKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BaudetCK09,
  author       = {Mathieu Baudet and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Computationally sound implementations of equational theories against
                  passive adversaries},
  journal      = {Inf. Comput.},
  volume       = {207},
  number       = {4},
  pages        = {496--520},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ic.2008.12.005},
  doi          = {10.1016/J.IC.2008.12.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/BaudetCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DelauneKR09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Verifying privacy-type properties of electronic voting protocols},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {435--487},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0340},
  doi          = {10.3233/JCS-2009-0340},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/KremerMT09,
  author       = {Steve Kremer and
                  Antoine Mercier and
                  Ralf Treinen},
  editor       = {Anupam Datta},
  title        = {Reducing Equational Theories for the Decision of Static Equivalence},
  booktitle    = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5913},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4\_8},
  doi          = {10.1007/978-3-642-10622-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/KremerMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/CiobacaDK09,
  author       = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  editor       = {Renate A. Schmidt},
  title        = {Computing Knowledge in Security Protocols under Convergent Equational
                  Theories},
  booktitle    = {Automated Deduction - CADE-22, 22nd International Conference on Automated
                  Deduction, Montreal, Canada, August 2-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5663},
  pages        = {355--370},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02959-2\_27},
  doi          = {10.1007/978-3-642-02959-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/CiobacaDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/ChadhaDK09,
  author       = {Rohit Chadha and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  editor       = {David Lee and
                  Ant{\'{o}}nia Lopes and
                  Arnd Poetzsch{-}Heffter},
  title        = {Epistemic Logic for the Applied Pi Calculus},
  booktitle    = {Formal Techniques for Distributed Systems, Joint 11th {IFIP} {WG}
                  6.1 International Conference {FMOODS} 2009 and 29th {IFIP} {WG} 6.1
                  International Conference {FORTE} 2009, Lisboa, Portugal, June 9-12,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5522},
  pages        = {182--197},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02138-1\_12},
  doi          = {10.1007/978-3-642-02138-1\_12},
  timestamp    = {Mon, 15 Jul 2019 16:26:46 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/ChadhaDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/DelauneKP09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Olivier Pereira},
  editor       = {Ravi Kannan and
                  K. Narayan Kumar},
  title        = {Simulation based security in the applied pi calculus},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2009, December 15-17, 2009,
                  {IIT} Kanpur, India},
  series       = {LIPIcs},
  volume       = {4},
  pages        = {169--180},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2009},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2009.2316},
  doi          = {10.4230/LIPICS.FSTTCS.2009.2316},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/DelauneKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secco/2008,
  editor       = {Steve Kremer and
                  Prakash Panangaden},
  title        = {Proceedings of the 6th Workshop on Security Issues in Concurrency,
                  SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {242},
  number       = {3},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/242/issue/3},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secco/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/corr/abs-0910-4420,
  editor       = {Michele Boreale and
                  Steve Kremer},
  title        = {Proceedings 7th International Workshop on Security Issues in Concurrency,
                  {SECCO} 2009, Bologna, Italy, 5th September 2009},
  series       = {{EPTCS}},
  volume       = {7},
  year         = {2009},
  url          = {https://doi.org/10.4204/EPTCS.7},
  doi          = {10.4204/EPTCS.7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-4420.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelauneKP09,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Olivier Pereira},
  title        = {Simulation based security in the applied pi calculus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelauneKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/KremerMT08,
  author       = {Steve Kremer and
                  Antoine Mercier and
                  Ralf Treinen},
  editor       = {Alessandro Armando and
                  Peter Baumgartner and
                  Gilles Dowek},
  title        = {Proving Group Protocols Secure Against Eavesdroppers},
  booktitle    = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008,
                  Sydney, Australia, August 12-15, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5195},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71070-7\_9},
  doi          = {10.1007/978-3-540-71070-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/KremerMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR08,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Composition of Password-Based Protocols},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {239--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.6},
  doi          = {10.1109/CSF.2008.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKS08,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Graham Steel},
  title        = {Formal Analysis of PKCS{\#}11},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {331--344},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.16},
  doi          = {10.1109/CSF.2008.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/ArapinisDK08,
  author       = {Myrto Arapinis and
                  St{\'{e}}phanie Delaune and
                  Steve Kremer},
  editor       = {Iliano Cervesato and
                  Helmut Veith and
                  Andrei Voronkov},
  title        = {From One Session to Many: Dynamic Tags for Security Protocols},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th
                  International Conference, {LPAR} 2008, Doha, Qatar, November 22-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5330},
  pages        = {128--142},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89439-1\_9},
  doi          = {10.1007/978-3-540-89439-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/ArapinisDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KremerP09,
  author       = {Steve Kremer and
                  Prakash Panangaden},
  editor       = {Steve Kremer and
                  Prakash Panangaden},
  title        = {Preface},
  booktitle    = {Proceedings of the 6th Workshop on Security Issues in Concurrency,
                  SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {242},
  number       = {3},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.077},
  doi          = {10.1016/J.ENTCS.2009.07.077},
  timestamp    = {Fri, 24 Feb 2023 13:42:44 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/KremerP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7421,
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/07421/},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KremerM07,
  author       = {Steve Kremer and
                  Laurent Mazar{\'{e}}},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Adaptive Soundness of Static Equivalence},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {610--625},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_40},
  doi          = {10.1007/978-3-540-74835-9\_40},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KremerM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/DelauneKR07,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  editor       = {Vikraman Arvind and
                  Sanjiva Prasad},
  title        = {Symbolic Bisimulation for the Applied Pi Calculus},
  booktitle    = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
                  Computer Science, 27th International Conference, New Delhi, India,
                  December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4855},
  pages        = {133--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77050-3\_11},
  doi          = {10.1007/978-3-540-77050-3\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/DelauneKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/Kremer07,
  author       = {Steve Kremer},
  editor       = {Gilles Barthe and
                  C{\'{e}}dric Fournet},
  title        = {Computational Soundness of Equational Theories (Tutorial)},
  booktitle    = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis,
                  France, November 5-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4912},
  pages        = {363--382},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78663-4\_24},
  doi          = {10.1007/978-3-540-78663-4\_24},
  timestamp    = {Sat, 19 Oct 2019 20:09:31 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/Kremer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChenKR07,
  author       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {07421 Executive Summary -- Formal Protocol Verification Applied},
  booktitle    = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1418},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChenKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChenKR07a,
  author       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {07421 Abstracts Collection -- Formal Protocol Verification Applied},
  booktitle    = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1419},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChenKR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ChadhaKS06,
  author       = {Rohit Chadha and
                  Steve Kremer and
                  Andre Scedrov},
  title        = {Formal Analysis of Multiparty Contract Signing},
  journal      = {J. Autom. Reason.},
  volume       = {36},
  number       = {1-2},
  pages        = {39--83},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10817-005-9019-5},
  doi          = {10.1007/S10817-005-9019-5},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ChadhaKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/CardinalKL06,
  author       = {Jean Cardinal and
                  Steve Kremer and
                  Stefan Langerman},
  title        = {Juggling with Pattern Matching},
  journal      = {Theory Comput. Syst.},
  volume       = {39},
  number       = {3},
  pages        = {425--437},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00224-005-1239-x},
  doi          = {10.1007/S00224-005-1239-X},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mst/CardinalKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR06,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Coercion-Resistance and Receipt-Freeness in Electronic Voting},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {28--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.8},
  doi          = {10.1109/CSFW.2006.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  editor       = {S. Arun{-}Kumar and
                  Naveen Garg},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  booktitle    = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical
                  Computer Science, 26th International Conference, Kolkata, India, December
                  13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4337},
  pages        = {176--187},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11944836\_18},
  doi          = {10.1007/11944836\_18},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/KremerR05,
  author       = {Steve Kremer and
                  Mark Ryan},
  editor       = {Shmuel Sagiv},
  title        = {Analysis of an Electronic Voting Protocol in the Applied Pi Calculus},
  booktitle    = {Programming Languages and Systems, 14th European Symposium on Programming,
                  {ESOP} 2005, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3444},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31987-0\_14},
  doi          = {10.1007/978-3-540-31987-0\_14},
  timestamp    = {Fri, 27 Jan 2023 15:04:25 +0100},
  biburl       = {https://dblp.org/rec/conf/esop/KremerR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MukhamedovKR05,
  author       = {Aybek Mukhamedov and
                  Steve Kremer and
                  Eike Ritter},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof
                  of Correctness in the Strand Space Model},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_23},
  doi          = {10.1007/11507840\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BaudetCK05,
  author       = {Mathieu Baudet and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Computationally Sound Implementations of Equational Theories Against
                  Passive Adversaries},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {652--663},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_53},
  doi          = {10.1007/11523468\_53},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BaudetCK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaudetCK05,
  author       = {Mathieu Baudet and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Computationally sound implementations of equational theories against
                  passive adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaudetCK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChadhaKS04,
  author       = {Rohit Chadha and
                  Steve Kremer and
                  Andre Scedrov},
  title        = {Formal Analysis of Multi-Party Contract Signing},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {266--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.10},
  doi          = {10.1109/CSFW.2004.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChadhaKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KremerR05,
  author       = {Steve Kremer and
                  Mark Ryan},
  editor       = {Riccardo Focardi and
                  Gianluigi Zavattaro},
  title        = {Analysing the Vulnerability of Protocols to Produce Known-pair and
                  Chosen-text Attacks},
  booktitle    = {Proceedings of the 2nd International Workshop on Security Issues in
                  Coordination Models, Languages, and Systems, SecCo 2004, London, UK,
                  August 30, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {128},
  number       = {5},
  pages        = {87--104},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.11.043},
  doi          = {10.1016/J.ENTCS.2004.11.043},
  timestamp    = {Mon, 12 Dec 2022 15:38:22 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/KremerR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KremerM03,
  author       = {Steve Kremer and
                  Olivier Markowitch},
  title        = {Fair multi-party non-repudiation protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {1},
  number       = {4},
  pages        = {223--235},
  year         = {2003},
  url          = {https://doi.org/10.1007/s10207-003-0019-3},
  doi          = {10.1007/S10207-003-0019-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KremerM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KremerR03,
  author       = {Steve Kremer and
                  Jean{-}Fran{\c{c}}ois Raskin},
  title        = {A Game-based Verification of Non-repudiation and Fair Exchange Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {399--430},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11307},
  doi          = {10.3233/JCS-2003-11307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KremerR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SaeedniaKM03,
  author       = {Shahrokh Saeednia and
                  Steve Kremer and
                  Olivier Markowitch},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {An Efficient Strong Designated Verifier Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_4},
  doi          = {10.1007/978-3-540-24691-6\_4},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/SaeedniaKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KremerMZ02,
  author       = {Steve Kremer and
                  Olivier Markowitch and
                  Jianying Zhou},
  title        = {An intensive survey of fair non-repudiation protocols},
  journal      = {Comput. Commun.},
  volume       = {25},
  number       = {17},
  pages        = {1606--1621},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0140-3664(02)00049-X},
  doi          = {10.1016/S0140-3664(02)00049-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KremerMZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KremerR02,
  author       = {Steve Kremer and
                  Jean{-}Fran{\c{c}}ois Raskin},
  title        = {Game Analysis of Abuse-free Contract Signing},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {206},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSFW.2002.1021817},
  doi          = {10.1109/CSFW.2002.1021817},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KremerR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MarkowitchGK02,
  author       = {Olivier Markowitch and
                  Dieter Gollmann and
                  Steve Kremer},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {On Fairness in Exchange Protocols},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {451--464},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_31},
  doi          = {10.1007/3-540-36552-4\_31},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MarkowitchGK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/KremerR01,
  author       = {Steve Kremer and
                  Jean{-}Fran{\c{c}}ois Raskin},
  editor       = {Kim Guldstrand Larsen and
                  Mogens Nielsen},
  title        = {A Game-Based Verification of Non-repudiation and Fair Exchange Protocols},
  booktitle    = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference,
                  Aalborg, Denmark, August 20-25, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2154},
  pages        = {551--565},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44685-0\_37},
  doi          = {10.1007/3-540-44685-0\_37},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/KremerR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KremerM01,
  author       = {Steve Kremer and
                  Olivier Markowitch},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Selective Receipt in Certified E-mail},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {136--148},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_14},
  doi          = {10.1007/3-540-45311-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KremerM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MarkowitchK01,
  author       = {Olivier Markowitch and
                  Steve Kremer},
  editor       = {George I. Davida and
                  Yair Frankel},
  title        = {An Optimistic Non-repudiation Protocol with Transparent Trusted Third
                  Party},
  booktitle    = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2200},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45439-X\_25},
  doi          = {10.1007/3-540-45439-X\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/MarkowitchK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MarkowitchK00,
  author       = {Olivier Markowitch and
                  Steve Kremer},
  editor       = {Dongho Won},
  title        = {A Multi-party Optimistic Non-repudiation Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2000, Third International
                  Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2015},
  pages        = {109--122},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45247-8\_9},
  doi          = {10.1007/3-540-45247-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MarkowitchK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KremerM00,
  author       = {Steve Kremer and
                  Olivier Markowitch},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {A Multi-Party Non-Repudiation Protocol},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {271--280},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KremerM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics