share record
persistent URL:
Charlie Jacomme , Steve Kremer , Guillaume Scerri : Symbolic Models for Isolated Execution Environments. EuroS&P 2017 : 530-545 share record
persistent URL:
Kushal Babel , Vincent Cheval , Steve Kremer : On Communication Models When Verifying Equivalence Properties. POST 2017 : 141-163 share record
persistent URL:
Jannik Dreier , Charles Duménil , Steve Kremer , Ralf Sasse : Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. POST 2017 : 117-140 export record
dblp key:
journals/iacr/JacommeKS17 share record
persistent URL:
Charlie Jacomme , Steve Kremer , Guillaume Scerri : Symbolic Models for Isolated Execution Environments. IACR Cryptol. ePrint Arch. 2017 : 70 (2017 )2016 share record
persistent URL:
Steve Kremer , Robert Künnemann : Automated analysis of security protocols with global state. J. Comput. Secur. 24 (5 ) : 583-616 (2016 )export record
dblp key:
journals/tocl/ChadhaCCK16 share record
persistent URL:
Rohit Chadha , Vincent Cheval , Stefan Ciobaca , Steve Kremer : Automated Verification of Equivalence Properties of Cryptographic Protocols. ACM Trans. Comput. Log. 17 (4 ) : 23 (2016 )export record
dblp key:
conf/esorics/ArapinisCK16 share record
persistent URL:
Myrto Arapinis , Véronique Cortier , Steve Kremer : When Are Three Voters Enough for Privacy Properties? ESORICS (2) 2016 : 241-260 share record
persistent URL:
Steve Kremer , Peter B. Rønne : To Du or Not to Du: A Security Analysis of Du-Vote. EuroS&P 2016 : 473-486 export record
dblp key:
series/natosec/CortierK16 share record
persistent URL:
Véronique Cortier , Steve Kremer : Formal Models for Analyzing Security Protocols: Some Lecture Notes. Dependable Software Systems Engineering 2016 : 33-58 export record
dblp key:
journals/iacr/ArapinisCK16 share record
persistent URL:
Myrto Arapinis , Véronique Cortier , Steve Kremer : When Are Three Voters Enough for Privacy Properties? IACR Cryptol. ePrint Arch. 2016 : 690 (2016 )2015 share record
persistent URL:
Véronique Cortier , Fabienne Eigner , Steve Kremer , Matteo Maffei , Cyrille Wiedling : Type-Based Verification of Electronic Voting Protocols. POST 2015 : 303-323 export record
dblp key:
journals/iacr/CortierEKMW15 share record
persistent URL:
Véronique Cortier , Fabienne Eigner , Steve Kremer , Matteo Maffei , Cyrille Wiedling : Type-Based Verification of Electronic Voting Protocols. IACR Cryptol. ePrint Arch. 2015 : 39 (2015 )2014 export record
dblp key:
journals/corr/ArapinisDK14 share record
persistent URL:
Myrto Arapinis , Stéphanie Delaune , Steve Kremer : Dynamic Tags for Security Protocols. Log. Methods Comput. Sci. 10 (2 ) (2014 )share record
persistent URL:
Véronique Cortier , Steve Kremer : Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Found. Trends Program. Lang. 1 (3 ) : 151-267 (2014 )share record
persistent URL:
Steve Kremer , Paliath Narendran : Foreword to the special issue on security and rewriting techniques. Inf. Comput. 238 : 1 (2014 )share record
persistent URL:
Joel Chan , Steven Dang , Péter Krémer , Lucy Guo , Steven Dow : IdeaGens: A Social Ideation System for Guided Crowd Brainstorming. HCOMP 2014 : 67-68 share record
persistent URL:
Steve Kremer , Robert Künnemann : Automated Analysis of Security Protocols with Global State. IEEE Symposium on Security and Privacy 2014 : 163-178 share record
persistent URL:
Martín Abadi , Steve Kremer : Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Lecture Notes in Computer Science 8414, Springer 2014 , ISBN 978-3-642-54791-1 [contents] share record
persistent URL:
Steve Kremer , Robert Künnemann : Automated analysis of security protocols with global state. CoRR abs/1403.1142 (2014 )2013 export record
dblp key:
journals/fmsd/ChevalierDKR13 share record
persistent URL:
Céline Chevalier , Stéphanie Delaune , Steve Kremer , Mark Dermot Ryan : Composition of password-based protocols. Formal Methods Syst. Des. 43 (3 ) : 369-413 (2013 )share record
persistent URL:
Steve Kremer , Robert Künnemann , Graham Steel : Universally Composable Key-Management. ESORICS 2013 : 327-344 share record
persistent URL:
Myrto Arapinis , Véronique Cortier , Steve Kremer , Mark Ryan : Practical Everlasting Privacy. POST 2013 : 21-40 2012 share record
persistent URL:
Stefan Ciobaca , Stéphanie Delaune , Steve Kremer : Computing Knowledge in Security Protocols Under Convergent Equational Theories. J. Autom. Reason. 48 (2 ) : 219-262 (2012 )share record
persistent URL:
Steve Kremer , Antoine Mercier , Ralf Treinen : Reducing Equational Theories for the Decision of Static Equivalence. J. Autom. Reason. 48 (2 ) : 197-217 (2012 )share record
persistent URL:
Stéphanie Delaune , Steve Kremer , Daniel Pasaila : Security Protocols, Constraint Systems, and Group Theories. IJCAR 2012 : 164-178 share record
persistent URL:
Rohit Chadha , Stefan Ciobaca , Steve Kremer : Automated Verification of Equivalence Properties of Cryptographic Protocols. ESOP 2012 : 108-127 share record
persistent URL:
Steve Kremer , Robert Künnemann , Graham Steel : Universally Composable Key-Management. IACR Cryptol. ePrint Arch. 2012 : 189 (2012 )2011 share record
persistent URL:
Steve Kremer : Modelling and analyzing security protocols in cryptographic process calculi. École normale supérieure de Cachan, France, 2011 share record
persistent URL:
Véronique Cortier , Steve Kremer , Bogdan Warinschi : A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. J. Autom. Reason. 46 (3-4 ) : 225-259 (2011 )share record
persistent URL:
Stéphanie Delaune , Steve Kremer , Mark Dermot Ryan , Graham Steel : Formal Analysis of Protocols Based on TPM State Registers. CSF 2011 : 66-80