Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Steve Kremer"
@article{DBLP:journals/siglog/Kremer24, author = {Steve Kremer}, title = {Security and Privacy Column}, journal = {{ACM} {SIGLOG} News}, volume = {11}, number = {2}, pages = {61}, year = {2024}, url = {https://doi.org/10.1145/3665453.3665460}, doi = {10.1145/3665453.3665460}, timestamp = {Tue, 11 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siglog/Kremer24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/theoretics/ChevalKR24, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice}, journal = {TheoretiCS}, volume = {3}, year = {2024}, url = {https://doi.org/10.46298/theoretics.24.4}, doi = {10.46298/THEORETICS.24.4}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/theoretics/ChevalKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChevalCK23, author = {Vincent Cheval and Rapha{\"{e}}lle Crubill{\'{e}} and Steve Kremer}, title = {Symbolic protocol verification with dice}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {501--538}, year = {2023}, url = {https://doi.org/10.3233/JCS-230037}, doi = {10.3233/JCS-230037}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siglog/Kremer23, author = {Steve Kremer}, title = {Security and Privacy Column}, journal = {{ACM} {SIGLOG} News}, volume = {10}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.1145/3584676.3584679}, doi = {10.1145/3584676.3584679}, timestamp = {Sun, 26 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siglog/Kremer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChevalCDHJK23, author = {Vincent Cheval and Cas Cremers and Alexander Dax and Lucca Hirschi and Charlie Jacomme and Steve Kremer}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5899--5916}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheval}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChevalCDHJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Jacomme0KR23, author = {Charlie Jacomme and Elise Klein and Steve Kremer and Ma{\"{\i}}wenn Racouchot}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {A comprehensive, formal and automated analysis of the {EDHOC} protocol}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5881--5898}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/jacomme}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Jacomme0KR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmmannHK23, author = {Max Ammann and Lucca Hirschi and Steve Kremer}, title = {{DY} Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2023}, url = {https://eprint.iacr.org/2023/057}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AmmannHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/BartheJK22, author = {Gilles Barthe and Charlie Jacomme and Steve Kremer}, title = {Universal Equivalence and Majority of Probabilistic Programs over Finite Fields}, journal = {{ACM} Trans. Comput. Log.}, volume = {23}, number = {1}, pages = {5:1--5:42}, year = {2022}, url = {https://doi.org/10.1145/3487063}, doi = {10.1145/3487063}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/BartheJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCK22, author = {Vincent Cheval and Rapha{\"{e}}lle Crubill{\'{e}} and Steve Kremer}, title = {Symbolic protocol verification with dice: process equivalences in the presence of probabilities}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {319--334}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919644}, doi = {10.1109/CSF54842.2022.9919644}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChevalJKK22, author = {Vincent Cheval and Charlie Jacomme and Steve Kremer and Robert K{\"{u}}nnemann}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SAPIC+:} protocol verifiers of the world, unite!}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3935--3952}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/cheval}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChevalJKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03225, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice}, journal = {CoRR}, volume = {abs/2211.03225}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03225}, doi = {10.48550/ARXIV.2211.03225}, eprinttype = {arXiv}, eprint = {2211.03225}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevalCDHJK22, author = {Vincent Cheval and Cas Cremers and Alexander Dax and Lucca Hirschi and Charlie Jacomme and Steve Kremer}, title = {Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1314}, year = {2022}, url = {https://eprint.iacr.org/2022/1314}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevalCDHJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevalJKK22, author = {Vincent Cheval and Charlie Jacomme and Steve Kremer and Robert K{\"{u}}nnemann}, title = {Sapic+: protocol verifiers of the world, unite!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {741}, year = {2022}, url = {https://eprint.iacr.org/2022/741}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevalJKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JacommeK21, author = {Charlie Jacomme and Steve Kremer}, title = {An Extensive Formal Analysis of Multi-factor Authentication Protocols}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {13:1--13:34}, year = {2021}, url = {https://doi.org/10.1145/3440712}, doi = {10.1145/3440712}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JacommeK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BabelCK20, author = {Kushal Babel and Vincent Cheval and Steve Kremer}, title = {On the semantics of communications when verifying equivalence properties}, journal = {J. Comput. Secur.}, volume = {28}, number = {1}, pages = {71--127}, year = {2020}, url = {https://doi.org/10.3233/JCS-191366}, doi = {10.3233/JCS-191366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BabelCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChevalKR20, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, editor = {Vivek Nigam and Tajana Ban Kirigin and Carolyn L. Talcott and Joshua D. Guttman and Stepan L. Kuznetsov and Boon Thau Loo and Mitsuhiro Okada}, title = {The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols}, booktitle = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {12300}, pages = {127--145}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62077-6\_10}, doi = {10.1007/978-3-030-62077-6\_10}, timestamp = {Sun, 12 Feb 2023 18:48:21 +0100}, biburl = {https://dblp.org/rec/conf/birthday/ChevalKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/BartheJK20, author = {Gilles Barthe and Charlie Jacomme and Steve Kremer}, editor = {Holger Hermanns and Lijun Zhang and Naoki Kobayashi and Dale Miller}, title = {Universal equivalence and majority of probabilistic programs over finite fields}, booktitle = {{LICS} '20: 35th Annual {ACM/IEEE} Symposium on Logic in Computer Science, Saarbr{\"{u}}cken, Germany, July 8-11, 2020}, pages = {155--166}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3373718.3394746}, doi = {10.1145/3373718.3394746}, timestamp = {Sat, 30 Sep 2023 09:52:07 +0200}, biburl = {https://dblp.org/rec/conf/lics/BartheJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChevalKR19, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Exploiting Symmetries When Proving Equivalence Properties for Security Protocols}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {905--922}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354260}, doi = {10.1145/3319535.3354260}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChevalKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BartheGJKS19, author = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Charlie Jacomme and Steve Kremer and Pierre{-}Yves Strub}, title = {Symbolic Methods in Computational Cryptography Proofs}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {136--151}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00017}, doi = {10.1109/CSF.2019.00017}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BartheGJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BursucK19, author = {Sergiu Bursuc and Steve Kremer}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {361--382}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_18}, doi = {10.1007/978-3-030-29959-0\_18}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BursucK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BursucDK19, author = {Sergiu Bursuc and Constantin Catalin Dragan and Steve Kremer}, title = {Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {606--620}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00050}, doi = {10.1109/EUROSP.2019.00050}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BursucDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BursucK19, author = {Sergiu Bursuc and Steve Kremer}, title = {Contingent payments on a public ledger: models and reductions for automated verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2019}, url = {https://eprint.iacr.org/2019/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BursucK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChevalKR18, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, editor = {Hana Chockler and Georg Weissenbacher}, title = {The {DEEPSEC} Prover}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10982}, pages = {28--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96142-2\_4}, doi = {10.1007/978-3-319-96142-2\_4}, timestamp = {Fri, 09 Apr 2021 18:35:26 +0200}, biburl = {https://dblp.org/rec/conf/cav/ChevalKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JacommeK18, author = {Charlie Jacomme and Steve Kremer}, title = {An Extensive Formal Analysis of Multi-factor Authentication Protocols}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {1--15}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00008}, doi = {10.1109/CSF.2018.00008}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JacommeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChevalKR18, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {{DEEPSEC:} Deciding Equivalence Properties in Security Protocols Theory and Practice}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {529--546}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00033}, doi = {10.1109/SP.2018.00033}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChevalKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/interfaces/MillerAADKMOT17, author = {Michael R. Miller and Robert J. Alexander and Vincent A. Arbige and Robert F. Dell and Steven R. Kremer and Brian P. McClune and Jane E. Oppenlander and Joshua P. Tomlin}, title = {Optimal Allocation of Students to Naval Nuclear-Power Training Units}, journal = {Interfaces}, volume = {47}, number = {4}, pages = {320--335}, year = {2017}, url = {https://doi.org/10.1287/inte.2017.0905}, doi = {10.1287/INTE.2017.0905}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/interfaces/MillerAADKMOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BaeldeDGK17, author = {David Baelde and St{\'{e}}phanie Delaune and Ivan Gazeau and Steve Kremer}, title = {Symbolic Verification of Privacy-Type Properties for Security Protocols with {XOR}}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {234--248}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.22}, doi = {10.1109/CSF.2017.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BaeldeDGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR17, author = {St{\'{e}}phanie Delaune and Steve Kremer and Ludovic Robin}, title = {Formal Verification of Protocols Based on Short Authenticated Strings}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {130--143}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.26}, doi = {10.1109/CSF.2017.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GazeauK17, author = {Ivan Gazeau and Steve Kremer}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {1--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_1}, doi = {10.1007/978-3-319-66399-9\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GazeauK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BackesDKK17, author = {Michael Backes and Jannik Dreier and Steve Kremer and Robert K{\"{u}}nnemann}, title = {A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {76--91}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.12}, doi = {10.1109/EUROSP.2017.12}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BackesDKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/JacommeKS17, author = {Charlie Jacomme and Steve Kremer and Guillaume Scerri}, title = {Symbolic Models for Isolated Execution Environments}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {530--545}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.16}, doi = {10.1109/EUROSP.2017.16}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/JacommeKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BabelCK17, author = {Kushal Babel and Vincent Cheval and Steve Kremer}, editor = {Matteo Maffei and Mark Ryan}, title = {On Communication Models When Verifying Equivalence Properties}, booktitle = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10204}, pages = {141--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54455-6\_7}, doi = {10.1007/978-3-662-54455-6\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/BabelCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/DreierDKS17, author = {Jannik Dreier and Charles Dum{\'{e}}nil and Steve Kremer and Ralf Sasse}, editor = {Matteo Maffei and Mark Ryan}, title = {Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols}, booktitle = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10204}, pages = {117--140}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54455-6\_6}, doi = {10.1007/978-3-662-54455-6\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/DreierDKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacommeKS17, author = {Charlie Jacomme and Steve Kremer and Guillaume Scerri}, title = {Symbolic Models for Isolated Execution Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2017}, url = {http://eprint.iacr.org/2017/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacommeKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KremerK16, author = {Steve Kremer and Robert K{\"{u}}nnemann}, title = {Automated analysis of security protocols with global state}, journal = {J. Comput. Secur.}, volume = {24}, number = {5}, pages = {583--616}, year = {2016}, url = {https://doi.org/10.3233/JCS-160556}, doi = {10.3233/JCS-160556}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KremerK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ChadhaCCK16, author = {Rohit Chadha and Vincent Cheval and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Steve Kremer}, title = {Automated Verification of Equivalence Properties of Cryptographic Protocols}, journal = {{ACM} Trans. Comput. Log.}, volume = {17}, number = {4}, pages = {23}, year = {2016}, url = {https://doi.org/10.1145/2926715}, doi = {10.1145/2926715}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ChadhaCCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArapinisCK16, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {When Are Three Voters Enough for Privacy Properties?}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {241--260}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_13}, doi = {10.1007/978-3-319-45741-3\_13}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ArapinisCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KremerR16, author = {Steve Kremer and Peter B. R{\o}nne}, title = {To Du or Not to Du: {A} Security Analysis of Du-Vote}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {473--486}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.42}, doi = {10.1109/EUROSP.2016.42}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KremerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/CortierK16, author = {V{\'{e}}ronique Cortier and Steve Kremer}, editor = {Javier Esparza and Orna Grumberg and Salomon Sickert}, title = {Formal Models for Analyzing Security Protocols: Some Lecture Notes}, booktitle = {Dependable Software Systems Engineering}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {45}, pages = {33--58}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-627-9-33}, doi = {10.3233/978-1-61499-627-9-33}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/CortierK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArapinisCK16, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer}, title = {When Are Three Voters Enough for Privacy Properties?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2016}, url = {http://eprint.iacr.org/2016/690}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArapinisCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/CortierEKMW15, author = {V{\'{e}}ronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Type-Based Verification of Electronic Voting Protocols}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {303--323}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_16}, doi = {10.1007/978-3-662-46666-7\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/CortierEKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierEKMW15, author = {V{\'{e}}ronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling}, title = {Type-Based Verification of Electronic Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2015}, url = {http://eprint.iacr.org/2015/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierEKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ArapinisDK14, author = {Myrto Arapinis and St{\'{e}}phanie Delaune and Steve Kremer}, title = {Dynamic Tags for Security Protocols}, journal = {Log. Methods Comput. Sci.}, volume = {10}, number = {2}, year = {2014}, url = {https://doi.org/10.2168/LMCS-10(2:11)2014}, doi = {10.2168/LMCS-10(2:11)2014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ArapinisDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftpl/CortierK14, author = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models and Techniques for Analyzing Security Protocols: {A} Tutorial}, journal = {Found. Trends Program. Lang.}, volume = {1}, number = {3}, pages = {151--267}, year = {2014}, url = {https://doi.org/10.1561/2500000001}, doi = {10.1561/2500000001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftpl/CortierK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/KremerN14, author = {Steve Kremer and Paliath Narendran}, title = {Foreword to the special issue on security and rewriting techniques}, journal = {Inf. Comput.}, volume = {238}, pages = {1}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.002}, doi = {10.1016/J.IC.2014.07.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/KremerN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcomp/ChanDKGD14, author = {Joel Chan and Steven Dang and P{\'{e}}ter Kr{\'{e}}mer and Lucy Guo and Steven Dow}, editor = {Jeffrey P. Bigham and David C. Parkes}, title = {IdeaGens: {A} Social Ideation System for Guided Crowd Brainstorming}, booktitle = {Proceedings of the Seconf {AAAI} Conference on Human Computation and Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania, {USA}}, pages = {67--68}, publisher = {{AAAI}}, year = {2014}, url = {https://doi.org/10.1609/hcomp.v2i1.13140}, doi = {10.1609/HCOMP.V2I1.13140}, timestamp = {Tue, 05 Sep 2023 11:10:11 +0200}, biburl = {https://dblp.org/rec/conf/hcomp/ChanDKGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KremerK14, author = {Steve Kremer and Robert K{\"{u}}nnemann}, title = {Automated Analysis of Security Protocols with Global State}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {163--178}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.18}, doi = {10.1109/SP.2014.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KremerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2014, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8}, doi = {10.1007/978-3-642-54792-8}, isbn = {978-3-642-54791-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KremerK14, author = {Steve Kremer and Robert K{\"{u}}nnemann}, title = {Automated analysis of security protocols with global state}, journal = {CoRR}, volume = {abs/1403.1142}, year = {2014}, url = {http://arxiv.org/abs/1403.1142}, eprinttype = {arXiv}, eprint = {1403.1142}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KremerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/ChevalierDKR13, author = {C{\'{e}}line Chevalier and St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan}, title = {Composition of password-based protocols}, journal = {Formal Methods Syst. Des.}, volume = {43}, number = {3}, pages = {369--413}, year = {2013}, url = {https://doi.org/10.1007/s10703-013-0184-6}, doi = {10.1007/S10703-013-0184-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/ChevalierDKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerKS13, author = {Steve Kremer and Robert K{\"{u}}nnemann and Graham Steel}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Universally Composable Key-Management}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {327--344}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_19}, doi = {10.1007/978-3-642-40203-6\_19}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KremerKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisCKR13, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer and Mark Ryan}, editor = {David A. Basin and John C. Mitchell}, title = {Practical Everlasting Privacy}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {21--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_2}, doi = {10.1007/978-3-642-36830-1\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/CiobacaDK12, author = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and St{\'{e}}phanie Delaune and Steve Kremer}, title = {Computing Knowledge in Security Protocols Under Convergent Equational Theories}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {219--262}, year = {2012}, url = {https://doi.org/10.1007/s10817-010-9197-7}, doi = {10.1007/S10817-010-9197-7}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/CiobacaDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/KremerMT12, author = {Steve Kremer and Antoine Mercier and Ralf Treinen}, title = {Reducing Equational Theories for the Decision of Static Equivalence}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {197--217}, year = {2012}, url = {https://doi.org/10.1007/s10817-010-9203-0}, doi = {10.1007/S10817-010-9203-0}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/KremerMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/DelauneKP12, author = {St{\'{e}}phanie Delaune and Steve Kremer and Daniel Pasaila}, editor = {Bernhard Gramlich and Dale Miller and Uli Sattler}, title = {Security Protocols, Constraint Systems, and Group Theories}, booktitle = {Automated Reasoning - 6th International Joint Conference, {IJCAR} 2012, Manchester, UK, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7364}, pages = {164--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31365-3\_15}, doi = {10.1007/978-3-642-31365-3\_15}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/DelauneKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/ChadhaCK12, author = {Rohit Chadha and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Steve Kremer}, editor = {Helmut Seidl}, title = {Automated Verification of Equivalence Properties of Cryptographic Protocols}, booktitle = {Programming Languages and Systems - 21st European Symposium on Programming, {ESOP} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7211}, pages = {108--127}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28869-2\_6}, doi = {10.1007/978-3-642-28869-2\_6}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/ChadhaCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KremerKS12, author = {Steve Kremer and Robert K{\"{u}}nnemann and Graham Steel}, title = {Universally Composable Key-Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2012}, url = {http://eprint.iacr.org/2012/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KremerKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Kremer11, author = {Steve Kremer}, title = {Modelling and analyzing security protocols in cryptographic process calculi}, year = {2011}, url = {https://tel.archives-ouvertes.fr/tel-00636769}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Kremer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/CortierKW11, author = {V{\'{e}}ronique Cortier and Steve Kremer and Bogdan Warinschi}, title = {A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {225--259}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9187-9}, doi = {10.1007/S10817-010-9187-9}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/CortierKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKRS11, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan and Graham Steel}, title = {Formal Analysis of Protocols Based on {TPM} State Registers}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {66--80}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.12}, doi = {10.1109/CSF.2011.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KremerSW11, author = {Steve Kremer and Graham Steel and Bogdan Warinschi}, title = {Security for Key Management Interfaces}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {266--280}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.25}, doi = {10.1109/CSF.2011.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KremerSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/ChevalierDK11, author = {C{\'{e}}line Chevalier and St{\'{e}}phanie Delaune and Steve Kremer}, editor = {Supratik Chakraborty and Amit Kumar}, title = {Transforming Password Protocols to Compose}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011, Mumbai, India}, series = {LIPIcs}, volume = {13}, pages = {204--216}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2011}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2011.204}, doi = {10.4230/LIPICS.FSTTCS.2011.204}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/ChevalierDK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/CortierK11, author = {V{\'{e}}ronique Cortier and Steve Kremer}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Introduction}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {1--12}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-1}, doi = {10.3233/978-1-60750-714-7-1}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CortierK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ios/11/CK2011, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, publisher = {{IOS} Press}, year = {2011}, url = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols}, isbn = {978-1-60750-713-0}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CK2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKR10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan}, title = {Symbolic bisimulation for the applied pi calculus}, journal = {J. Comput. Secur.}, volume = {18}, number = {2}, pages = {317--377}, year = {2010}, url = {https://doi.org/10.3233/JCS-2010-0363}, doi = {10.3233/JCS-2010-0363}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKS10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Graham Steel}, title = {Formal security analysis of PKCS{\#}11 and proprietary extensions}, journal = {J. Comput. Secur.}, volume = {18}, number = {6}, pages = {1211--1245}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0394}, doi = {10.3233/JCS-2009-0394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KremerM10, author = {Steve Kremer and Laurent Mazar{\'{e}}}, title = {Computationally sound analysis of protocols using bilinear pairings}, journal = {J. Comput. Secur.}, volume = {18}, number = {6}, pages = {999--1033}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0388}, doi = {10.3233/JCS-2009-0388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KremerM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerRS10, author = {Steve Kremer and Mark Ryan and Ben Smyth}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Election Verifiability in Electronic Voting Protocols}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {389--404}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_24}, doi = {10.1007/978-3-642-15497-3\_24}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KremerRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DelauneKRS10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan and Graham Steel}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {A Formal Analysis of Authentication in the {TPM}}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {111--125}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_8}, doi = {10.1007/978-3-642-19751-2\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/DelauneKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10, author = {Ben Smyth and Mark Ryan and Steve Kremer and Mounira Kourjieh}, editor = {Alessandro Armando and Gavin Lowe}, title = {Towards Automatic Analysis of Election Verifiability Properties}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {146--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_11}, doi = {10.1007/978-3-642-16074-5\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/DelauneKR10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Verifying Privacy-Type Properties of Electronic Voting Protocols: {A} Taster}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {289--309}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_18}, doi = {10.1007/978-3-642-12980-3\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wote/DelauneKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BaudetCK09, author = {Mathieu Baudet and V{\'{e}}ronique Cortier and Steve Kremer}, title = {Computationally sound implementations of equational theories against passive adversaries}, journal = {Inf. Comput.}, volume = {207}, number = {4}, pages = {496--520}, year = {2009}, url = {https://doi.org/10.1016/j.ic.2008.12.005}, doi = {10.1016/J.IC.2008.12.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BaudetCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKR09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Verifying privacy-type properties of electronic voting protocols}, journal = {J. Comput. Secur.}, volume = {17}, number = {4}, pages = {435--487}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0340}, doi = {10.3233/JCS-2009-0340}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/KremerMT09, author = {Steve Kremer and Antoine Mercier and Ralf Treinen}, editor = {Anupam Datta}, title = {Reducing Equational Theories for the Decision of Static Equivalence}, booktitle = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, pages = {94--108}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4\_8}, doi = {10.1007/978-3-642-10622-4\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/KremerMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/CiobacaDK09, author = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and St{\'{e}}phanie Delaune and Steve Kremer}, editor = {Renate A. Schmidt}, title = {Computing Knowledge in Security Protocols under Convergent Equational Theories}, booktitle = {Automated Deduction - CADE-22, 22nd International Conference on Automated Deduction, Montreal, Canada, August 2-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5663}, pages = {355--370}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02959-2\_27}, doi = {10.1007/978-3-642-02959-2\_27}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/CiobacaDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/ChadhaDK09, author = {Rohit Chadha and St{\'{e}}phanie Delaune and Steve Kremer}, editor = {David Lee and Ant{\'{o}}nia Lopes and Arnd Poetzsch{-}Heffter}, title = {Epistemic Logic for the Applied Pi Calculus}, booktitle = {Formal Techniques for Distributed Systems, Joint 11th {IFIP} {WG} 6.1 International Conference {FMOODS} 2009 and 29th {IFIP} {WG} 6.1 International Conference {FORTE} 2009, Lisboa, Portugal, June 9-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5522}, pages = {182--197}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02138-1\_12}, doi = {10.1007/978-3-642-02138-1\_12}, timestamp = {Mon, 15 Jul 2019 16:26:46 +0200}, biburl = {https://dblp.org/rec/conf/forte/ChadhaDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/DelauneKP09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Olivier Pereira}, editor = {Ravi Kannan and K. Narayan Kumar}, title = {Simulation based security in the applied pi calculus}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2009, December 15-17, 2009, {IIT} Kanpur, India}, series = {LIPIcs}, volume = {4}, pages = {169--180}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2009}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2009.2316}, doi = {10.4230/LIPICS.FSTTCS.2009.2316}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/DelauneKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secco/2008, editor = {Steve Kremer and Prakash Panangaden}, title = {Proceedings of the 6th Workshop on Security Issues in Concurrency, SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {242}, number = {3}, publisher = {Elsevier}, year = {2009}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/242/issue/3}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secco/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/corr/abs-0910-4420, editor = {Michele Boreale and Steve Kremer}, title = {Proceedings 7th International Workshop on Security Issues in Concurrency, {SECCO} 2009, Bologna, Italy, 5th September 2009}, series = {{EPTCS}}, volume = {7}, year = {2009}, url = {https://doi.org/10.4204/EPTCS.7}, doi = {10.4204/EPTCS.7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-4420.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelauneKP09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Olivier Pereira}, title = {Simulation based security in the applied pi calculus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2009}, url = {http://eprint.iacr.org/2009/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelauneKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/KremerMT08, author = {Steve Kremer and Antoine Mercier and Ralf Treinen}, editor = {Alessandro Armando and Peter Baumgartner and Gilles Dowek}, title = {Proving Group Protocols Secure Against Eavesdroppers}, booktitle = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008, Sydney, Australia, August 12-15, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5195}, pages = {116--131}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71070-7\_9}, doi = {10.1007/978-3-540-71070-7\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/KremerMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR08, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Composition of Password-Based Protocols}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {239--251}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.6}, doi = {10.1109/CSF.2008.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKS08, author = {St{\'{e}}phanie Delaune and Steve Kremer and Graham Steel}, title = {Formal Analysis of PKCS{\#}11}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {331--344}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.16}, doi = {10.1109/CSF.2008.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/ArapinisDK08, author = {Myrto Arapinis and St{\'{e}}phanie Delaune and Steve Kremer}, editor = {Iliano Cervesato and Helmut Veith and Andrei Voronkov}, title = {From One Session to Many: Dynamic Tags for Security Protocols}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, {LPAR} 2008, Doha, Qatar, November 22-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5330}, pages = {128--142}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89439-1\_9}, doi = {10.1007/978-3-540-89439-1\_9}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/ArapinisDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KremerP09, author = {Steve Kremer and Prakash Panangaden}, editor = {Steve Kremer and Prakash Panangaden}, title = {Preface}, booktitle = {Proceedings of the 6th Workshop on Security Issues in Concurrency, SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {242}, number = {3}, pages = {1--2}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.077}, doi = {10.1016/J.ENTCS.2009.07.077}, timestamp = {Fri, 24 Feb 2023 13:42:44 +0100}, biburl = {https://dblp.org/rec/journals/entcs/KremerP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7421, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/07421/}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerM07, author = {Steve Kremer and Laurent Mazar{\'{e}}}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Adaptive Soundness of Static Equivalence}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {610--625}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_40}, doi = {10.1007/978-3-540-74835-9\_40}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KremerM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/DelauneKR07, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, editor = {Vikraman Arvind and Sanjiva Prasad}, title = {Symbolic Bisimulation for the Applied Pi Calculus}, booktitle = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4855}, pages = {133--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77050-3\_11}, doi = {10.1007/978-3-540-77050-3\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/DelauneKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/Kremer07, author = {Steve Kremer}, editor = {Gilles Barthe and C{\'{e}}dric Fournet}, title = {Computational Soundness of Equational Theories (Tutorial)}, booktitle = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4912}, pages = {363--382}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78663-4\_24}, doi = {10.1007/978-3-540-78663-4\_24}, timestamp = {Sat, 19 Oct 2019 20:09:31 +0200}, biburl = {https://dblp.org/rec/conf/tgc/Kremer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChenKR07, author = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {07421 Executive Summary -- Formal Protocol Verification Applied}, booktitle = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1418}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChenKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChenKR07a, author = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {07421 Abstracts Collection -- Formal Protocol Verification Applied}, booktitle = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1419}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChenKR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ChadhaKS06, author = {Rohit Chadha and Steve Kremer and Andre Scedrov}, title = {Formal Analysis of Multiparty Contract Signing}, journal = {J. Autom. Reason.}, volume = {36}, number = {1-2}, pages = {39--83}, year = {2006}, url = {https://doi.org/10.1007/s10817-005-9019-5}, doi = {10.1007/S10817-005-9019-5}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ChadhaKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/CardinalKL06, author = {Jean Cardinal and Steve Kremer and Stefan Langerman}, title = {Juggling with Pattern Matching}, journal = {Theory Comput. Syst.}, volume = {39}, number = {3}, pages = {425--437}, year = {2006}, url = {https://doi.org/10.1007/s00224-005-1239-x}, doi = {10.1007/S00224-005-1239-X}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mst/CardinalKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR06, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Coercion-Resistance and Receipt-Freeness in Electronic Voting}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {28--42}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.8}, doi = {10.1109/CSFW.2006.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, editor = {S. Arun{-}Kumar and Naveen Garg}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, booktitle = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4337}, pages = {176--187}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11944836\_18}, doi = {10.1007/11944836\_18}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2006}, url = {http://eprint.iacr.org/2006/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/KremerR05, author = {Steve Kremer and Mark Ryan}, editor = {Shmuel Sagiv}, title = {Analysis of an Electronic Voting Protocol in the Applied Pi Calculus}, booktitle = {Programming Languages and Systems, 14th European Symposium on Programming, {ESOP} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3444}, pages = {186--200}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31987-0\_14}, doi = {10.1007/978-3-540-31987-0\_14}, timestamp = {Fri, 27 Jan 2023 15:04:25 +0100}, biburl = {https://dblp.org/rec/conf/esop/KremerR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MukhamedovKR05, author = {Aybek Mukhamedov and Steve Kremer and Eike Ritter}, editor = {Andrew S. Patrick and Moti Yung}, title = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {255--269}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_23}, doi = {10.1007/11507840\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BaudetCK05, author = {Mathieu Baudet and V{\'{e}}ronique Cortier and Steve Kremer}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Computationally Sound Implementations of Equational Theories Against Passive Adversaries}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {652--663}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_53}, doi = {10.1007/11523468\_53}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BaudetCK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaudetCK05, author = {Mathieu Baudet and V{\'{e}}ronique Cortier and Steve Kremer}, title = {Computationally sound implementations of equational theories against passive adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2005}, url = {http://eprint.iacr.org/2005/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaudetCK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChadhaKS04, author = {Rohit Chadha and Steve Kremer and Andre Scedrov}, title = {Formal Analysis of Multi-Party Contract Signing}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {266--265}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.10}, doi = {10.1109/CSFW.2004.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChadhaKS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KremerR05, author = {Steve Kremer and Mark Ryan}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {87--104}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.043}, doi = {10.1016/J.ENTCS.2004.11.043}, timestamp = {Mon, 12 Dec 2022 15:38:22 +0100}, biburl = {https://dblp.org/rec/journals/entcs/KremerR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KremerM03, author = {Steve Kremer and Olivier Markowitch}, title = {Fair multi-party non-repudiation protocols}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {4}, pages = {223--235}, year = {2003}, url = {https://doi.org/10.1007/s10207-003-0019-3}, doi = {10.1007/S10207-003-0019-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KremerM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KremerR03, author = {Steve Kremer and Jean{-}Fran{\c{c}}ois Raskin}, title = {A Game-based Verification of Non-repudiation and Fair Exchange Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {3}, pages = {399--430}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11307}, doi = {10.3233/JCS-2003-11307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KremerR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SaeedniaKM03, author = {Shahrokh Saeednia and Steve Kremer and Olivier Markowitch}, editor = {Jong In Lim and Dong Hoon Lee}, title = {An Efficient Strong Designated Verifier Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {40--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_4}, doi = {10.1007/978-3-540-24691-6\_4}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/SaeedniaKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KremerMZ02, author = {Steve Kremer and Olivier Markowitch and Jianying Zhou}, title = {An intensive survey of fair non-repudiation protocols}, journal = {Comput. Commun.}, volume = {25}, number = {17}, pages = {1606--1621}, year = {2002}, url = {https://doi.org/10.1016/S0140-3664(02)00049-X}, doi = {10.1016/S0140-3664(02)00049-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KremerMZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KremerR02, author = {Steve Kremer and Jean{-}Fran{\c{c}}ois Raskin}, title = {Game Analysis of Abuse-free Contract Signing}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {206}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSFW.2002.1021817}, doi = {10.1109/CSFW.2002.1021817}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KremerR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MarkowitchGK02, author = {Olivier Markowitch and Dieter Gollmann and Steve Kremer}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {On Fairness in Exchange Protocols}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {451--464}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_31}, doi = {10.1007/3-540-36552-4\_31}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MarkowitchGK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/KremerR01, author = {Steve Kremer and Jean{-}Fran{\c{c}}ois Raskin}, editor = {Kim Guldstrand Larsen and Mogens Nielsen}, title = {A Game-Based Verification of Non-repudiation and Fair Exchange Protocols}, booktitle = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2154}, pages = {551--565}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44685-0\_37}, doi = {10.1007/3-540-44685-0\_37}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/KremerR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KremerM01, author = {Steve Kremer and Olivier Markowitch}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Selective Receipt in Certified E-mail}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {136--148}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_14}, doi = {10.1007/3-540-45311-3\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KremerM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MarkowitchK01, author = {Olivier Markowitch and Steve Kremer}, editor = {George I. Davida and Yair Frankel}, title = {An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {363--378}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_25}, doi = {10.1007/3-540-45439-X\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/MarkowitchK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MarkowitchK00, author = {Olivier Markowitch and Steve Kremer}, editor = {Dongho Won}, title = {A Multi-party Optimistic Non-repudiation Protocol}, booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2015}, pages = {109--122}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45247-8\_9}, doi = {10.1007/3-540-45247-8\_9}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MarkowitchK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KremerM00, author = {Steve Kremer and Olivier Markowitch}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {A Multi-Party Non-Repudiation Protocol}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {271--280}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/KremerM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.