The SCEAS System
Navigation Menu

Search the dblp DataBase


Steve Kremer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steve Kremer, Jean-François Raskin
    A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2001, pp:551-565 [Conf]
  2. Rohit Chadha, Steve Kremer, Andre Scedrov
    Formal Analysis of Multi-Party Contract Signing. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:266-265 [Conf]
  3. Steve Kremer, Jean-François Raskin
    Game Analysis of Abuse-free Contract Signing. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:206-0 [Conf]
  4. Stéphanie Delaune, Steve Kremer, Mark Ryan
    Coercion-Resistance and Receipt-Freeness in Electronic Voting. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:28-42 [Conf]
  5. Steve Kremer, Mark Ryan
    Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. [Citation Graph (0, 0)][DBLP]
    ESOP, 2005, pp:186-200 [Conf]
  6. Aybek Mukhamedov, Steve Kremer, Eike Ritter
    Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:255-269 [Conf]
  7. Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi
    Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2006, pp:176-187 [Conf]
  8. Mathieu Baudet, Véronique Cortier, Steve Kremer
    Computationally Sound Implementations of Equational Theories Against Passive Adversaries. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:652-663 [Conf]
  9. Olivier Markowitch, Dieter Gollmann, Steve Kremer
    On Fairness in Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:451-464 [Conf]
  10. Olivier Markowitch, Steve Kremer
    A Multi-party Optimistic Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:109-122 [Conf]
  11. Shahrokh Saeednia, Steve Kremer, Olivier Markowitch
    An Efficient Strong Designated Verifier Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:40-54 [Conf]
  12. Steve Kremer, Olivier Markowitch
    Selective Receipt in Certified E-mail. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:136-148 [Conf]
  13. Olivier Markowitch, Steve Kremer
    An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:363-378 [Conf]
  14. Steve Kremer, Olivier Markowitch
    A Multi-Party Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:271-280 [Conf]
  15. Steve Kremer, Olivier Markowitch, Jianying Zhou
    An intensive survey of fair non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:17, pp:1606-1621 [Journal]
  16. Steve Kremer, Mark Ryan
    Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:128, n:5, pp:87-104 [Journal]
  17. Steve Kremer, Olivier Markowitch
    Fair multi-party non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:1, n:4, pp:223-235 [Journal]
  18. Rohit Chadha, Steve Kremer, Andre Scedrov
    Formal Analysis of Multiparty Contract Signing. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2006, v:36, n:1-2, pp:39-83 [Journal]
  19. Steve Kremer, Jean-François Raskin
    A Game-based Verification of Non-repudiation and Fair Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:399-430 [Journal]
  20. Jean Cardinal, Steve Kremer, Stefan Langerman
    Juggling with Pattern Matching. [Citation Graph (0, 0)][DBLP]
    Theory Comput. Syst., 2006, v:39, n:3, pp:425-437 [Journal]
  21. Steve Kremer, Laurent Mazaré
    Adaptive Soundness of Static Equivalence. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:610-625 [Conf]

  22. Reducing Equational Theories for the Decision of Static Equivalence. [Citation Graph (, )][DBLP]

  23. Proving Group Protocols Secure Against Eavesdroppers. [Citation Graph (, )][DBLP]

  24. Computing Knowledge in Security Protocols under Convergent Equational Theories. [Citation Graph (, )][DBLP]

  25. Composition of Password-Based Protocols. [Citation Graph (, )][DBLP]

  26. Formal Analysis of PKCS#11. [Citation Graph (, )][DBLP]

  27. 07421 Executive Summary -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP]

  28. 07421 Abstracts Collection -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP]

  29. Election Verifiability in Electronic Voting Protocols. [Citation Graph (, )][DBLP]

  30. Epistemic Logic for the Applied Pi Calculus. [Citation Graph (, )][DBLP]

  31. Simulation based security in the applied pi calculus. [Citation Graph (, )][DBLP]

  32. Symbolic Bisimulation for the Applied Pi Calculus. [Citation Graph (, )][DBLP]

  33. From One Session to Many: Dynamic Tags for Security Protocols. [Citation Graph (, )][DBLP]

  34. Computational Soundness of Equational Theories (Tutorial). [Citation Graph (, )][DBLP]

  35. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. [Citation Graph (, )][DBLP]

  36. Proceedings 7th International Workshop on Security Issues in Concurrency [Citation Graph (, )][DBLP]

  37. Preface. [Citation Graph (, )][DBLP]

Search in 0.029secs, Finished in 0.031secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002