Search the dblp DataBase
Steve Kremer :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Steve Kremer , Jean-François Raskin A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP ] CONCUR, 2001, pp:551-565 [Conf ] Rohit Chadha , Steve Kremer , Andre Scedrov Formal Analysis of Multi-Party Contract Signing. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:266-265 [Conf ] Steve Kremer , Jean-François Raskin Game Analysis of Abuse-free Contract Signing. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:206-0 [Conf ] Stéphanie Delaune , Steve Kremer , Mark Ryan Coercion-Resistance and Receipt-Freeness in Electronic Voting. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:28-42 [Conf ] Steve Kremer , Mark Ryan Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. [Citation Graph (0, 0)][DBLP ] ESOP, 2005, pp:186-200 [Conf ] Aybek Mukhamedov , Steve Kremer , Eike Ritter Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:255-269 [Conf ] Véronique Cortier , Steve Kremer , Ralf Küsters , Bogdan Warinschi Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2006, pp:176-187 [Conf ] Mathieu Baudet , Véronique Cortier , Steve Kremer Computationally Sound Implementations of Equational Theories Against Passive Adversaries. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:652-663 [Conf ] Olivier Markowitch , Dieter Gollmann , Steve Kremer On Fairness in Exchange Protocols. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:451-464 [Conf ] Olivier Markowitch , Steve Kremer A Multi-party Optimistic Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:109-122 [Conf ] Shahrokh Saeednia , Steve Kremer , Olivier Markowitch An Efficient Strong Designated Verifier Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:40-54 [Conf ] Steve Kremer , Olivier Markowitch Selective Receipt in Certified E-mail. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:136-148 [Conf ] Olivier Markowitch , Steve Kremer An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. [Citation Graph (0, 0)][DBLP ] ISC, 2001, pp:363-378 [Conf ] Steve Kremer , Olivier Markowitch A Multi-Party Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:271-280 [Conf ] Steve Kremer , Olivier Markowitch , Jianying Zhou An intensive survey of fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2002, v:25, n:17, pp:1606-1621 [Journal ] Steve Kremer , Mark Ryan Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:128, n:5, pp:87-104 [Journal ] Steve Kremer , Olivier Markowitch Fair multi-party non-repudiation protocols. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2003, v:1, n:4, pp:223-235 [Journal ] Rohit Chadha , Steve Kremer , Andre Scedrov Formal Analysis of Multiparty Contract Signing. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2006, v:36, n:1-2, pp:39-83 [Journal ] Steve Kremer , Jean-François Raskin A Game-based Verification of Non-repudiation and Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:3, pp:399-430 [Journal ] Jean Cardinal , Steve Kremer , Stefan Langerman Juggling with Pattern Matching. [Citation Graph (0, 0)][DBLP ] Theory Comput. Syst., 2006, v:39, n:3, pp:425-437 [Journal ] Steve Kremer , Laurent Mazaré Adaptive Soundness of Static Equivalence. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:610-625 [Conf ] Reducing Equational Theories for the Decision of Static Equivalence. [Citation Graph (, )][DBLP ] Proving Group Protocols Secure Against Eavesdroppers. [Citation Graph (, )][DBLP ] Computing Knowledge in Security Protocols under Convergent Equational Theories. [Citation Graph (, )][DBLP ] Composition of Password-Based Protocols. [Citation Graph (, )][DBLP ] Formal Analysis of PKCS#11. [Citation Graph (, )][DBLP ] 07421 Executive Summary -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP ] 07421 Abstracts Collection -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP ] Election Verifiability in Electronic Voting Protocols. [Citation Graph (, )][DBLP ] Epistemic Logic for the Applied Pi Calculus. [Citation Graph (, )][DBLP ] Simulation based security in the applied pi calculus. [Citation Graph (, )][DBLP ] Symbolic Bisimulation for the Applied Pi Calculus. [Citation Graph (, )][DBLP ] From One Session to Many: Dynamic Tags for Security Protocols. [Citation Graph (, )][DBLP ] Computational Soundness of Equational Theories (Tutorial). [Citation Graph (, )][DBLP ] Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. [Citation Graph (, )][DBLP ] Proceedings 7th International Workshop on Security Issues in Concurrency [Citation Graph (, )][DBLP ] Preface. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs