| 2009 |
37 | | Stefan Ciobâca,
Stéphanie Delaune,
Steve Kremer:
Computing Knowledge in Security Protocols under Convergent Equational Theories.
CADE 2009: 355-370 |
36 | | Rohit Chadha,
Stéphanie Delaune,
Steve Kremer:
Epistemic Logic for the Applied Pi Calculus.
FMOODS/FORTE 2009: 182-197 |
35 | | Stéphanie Delaune,
Steve Kremer,
Olivier Pereira:
Simulation based security in the applied pi calculus.
FSTTCS 2009: 169-180 |
34 | | Michele Boreale,
Steve Kremer:
Proceedings 7th International Workshop on Security Issues in Concurrency
CoRR abs/0910.4420: (2009) |
33 | | Steve Kremer,
Prakash Panangaden:
Preface.
Electr. Notes Theor. Comput. Sci. 242(3): 1-2 (2009) |
32 | | Mathieu Baudet,
Véronique Cortier,
Steve Kremer:
Computationally sound implementations of equational theories against passive adversaries.
Inf. Comput. 207(4): 496-520 (2009) |
31 | | Stéphanie Delaune,
Steve Kremer,
Mark Ryan:
Verifying privacy-type properties of electronic voting protocols.
Journal of Computer Security 17(4): 435-487 (2009) |
| 2008 |
30 | | Liqun Chen,
Steve Kremer,
Mark Dermot Ryan:
Formal Protocol Verification Applied, 14.10. - 19.10.2007
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 |
29 | | Stéphanie Delaune,
Steve Kremer,
Mark Ryan:
Composition of Password-Based Protocols.
CSF 2008: 239-251 |
28 | | Stéphanie Delaune,
Steve Kremer,
Graham Steel:
Formal Analysis of PKCS#11.
CSF 2008: 331-344 |
27 | | Steve Kremer,
Antoine Mercier,
Ralf Treinen:
Proving Group Protocols Secure Against Eavesdroppers.
IJCAR 2008: 116-131 |
26 | | Myrto Arapinis,
Stéphanie Delaune,
Steve Kremer:
From One Session to Many: Dynamic Tags for Security Protocols.
LPAR 2008: 128-142 |
| 2007 |
25 | | Steve Kremer,
Laurent Mazaré:
Adaptive Soundness of Static Equivalence.
ESORICS 2007: 610-625 |
24 | | Stéphanie Delaune,
Steve Kremer,
Mark Ryan:
Symbolic Bisimulation for the Applied Pi Calculus.
FSTTCS 2007: 133-145 |
23 | | Liqun Chen,
Steve Kremer,
Mark Dermot Ryan:
07421 Abstracts Collection -- Formal Protocol Verification Applied.
Formal Protocol Verification Applied 2007 |
22 | | Liqun Chen,
Steve Kremer,
Mark Dermot Ryan:
07421 Executive Summary -- Formal Protocol Verification Applied.
Formal Protocol Verification Applied 2007 |
21 | | Steve Kremer:
Computational Soundness of Equational Theories (Tutorial).
TGC 2007: 363-382 |
| 2006 |
20 | | Stéphanie Delaune,
Steve Kremer,
Mark Ryan:
Coercion-Resistance and Receipt-Freeness in Electronic Voting.
CSFW 2006: 28-42 |
19 | | Véronique Cortier,
Steve Kremer,
Ralf Küsters,
Bogdan Warinschi:
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions.
FSTTCS 2006: 176-187 |
18 | | Rohit Chadha,
Steve Kremer,
Andre Scedrov:
Formal Analysis of Multiparty Contract Signing.
J. Autom. Reasoning 36(1-2): 39-83 (2006) |
17 | | Jean Cardinal,
Steve Kremer,
Stefan Langerman:
Juggling with Pattern Matching.
Theory Comput. Syst. 39(3): 425-437 (2006) |
| 2005 |
16 | | Steve Kremer,
Mark Ryan:
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus.
ESOP 2005: 186-200 |
15 | | Aybek Mukhamedov,
Steve Kremer,
Eike Ritter:
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model.
Financial Cryptography 2005: 255-269 |
14 | | Mathieu Baudet,
Véronique Cortier,
Steve Kremer:
Computationally Sound Implementations of Equational Theories Against Passive Adversaries.
ICALP 2005: 652-663 |
13 | | Steve Kremer,
Mark Ryan:
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks.
Electr. Notes Theor. Comput. Sci. 128(5): 87-104 (2005) |
| 2004 |
12 | | Rohit Chadha,
Steve Kremer,
Andre Scedrov:
Formal Analysis of Multi-Party Contract Signing.
CSFW 2004: 266-265 |
| 2003 |
11 | | Shahrokh Saeednia,
Steve Kremer,
Olivier Markowitch:
An Efficient Strong Designated Verifier Signature Scheme.
ICISC 2003: 40-54 |
10 | | Steve Kremer,
Olivier Markowitch:
Fair multi-party non-repudiation protocols.
Int. J. Inf. Sec. 1(4): 223-235 (2003) |
9 | | Steve Kremer,
Jean-François Raskin:
A Game-based Verification of Non-repudiation and Fair Exchange Protocols.
Journal of Computer Security 11(3): 399-430 (2003) |
| 2002 |
8 | | Steve Kremer,
Jean-François Raskin:
Game Analysis of Abuse-free Contract Signing.
CSFW 2002: 206- |
7 | | Olivier Markowitch,
Dieter Gollmann,
Steve Kremer:
On Fairness in Exchange Protocols.
ICISC 2002: 451-464 |
6 | | Steve Kremer,
Olivier Markowitch,
Jianying Zhou:
An intensive survey of fair non-repudiation protocols.
Computer Communications 25(17): 1606-1621 (2002) |
| 2001 |
5 | | Steve Kremer,
Jean-François Raskin:
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols.
CONCUR 2001: 551-565 |
4 | | Steve Kremer,
Olivier Markowitch:
Selective Receipt in Certified E-mail.
INDOCRYPT 2001: 136-148 |
3 | | Olivier Markowitch,
Steve Kremer:
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party.
ISC 2001: 363-378 |
| 2000 |
2 | | Olivier Markowitch,
Steve Kremer:
A Multi-party Optimistic Non-repudiation Protocol.
ICISC 2000: 109-122 |
1 | | Steve Kremer,
Olivier Markowitch:
A Multi-Party Non-Repudiation Protocol.
SEC 2000: 271-280 |