The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stéphanie Delaune: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stéphanie Delaune, Florent Jacquemard
    A decision procedure for the verification of security protocols with explicit destructors. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:278-287 [Conf]
  2. Stéphanie Delaune, Florent Jacquemard
    A Theory of Dictionary Attacks and its Complexity. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:2-15 [Conf]
  3. Stéphanie Delaune, Steve Kremer, Mark Ryan
    Coercion-Resistance and Receipt-Freeness in Electronic Voting. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:28-42 [Conf]
  4. Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen
    Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:132-143 [Conf]
  5. Hubert Comon-Lundh, Stéphanie Delaune
    The Finite Variant Property: How to Get Rid of Some Algebraic Properties. [Citation Graph (0, 0)][DBLP]
    RTA, 2005, pp:294-307 [Conf]
  6. Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune
    Associative-Commutative Deducibility Constraints. [Citation Graph (0, 0)][DBLP]
    STACS, 2007, pp:634-645 [Conf]
  7. Stéphanie Delaune
    Easy intruder deduction problems with homomorphisms. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:97, n:6, pp:213-218 [Journal]
  8. Stéphanie Delaune, Florent Jacquemard
    Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2006, v:36, n:1-2, pp:85-124 [Journal]
  9. Véronique Cortier, Stéphanie Delaune, Pascal Lafourcade
    A survey of algebraic properties used in cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:1, pp:1-43 [Journal]
  10. Stéphanie Delaune
    An undecidability result for AGh. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:368, n:1-2, pp:161-167 [Journal]
  11. Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune
    Deducibility Constraints, Equational Theory and Electronic Money. [Citation Graph (0, 0)][DBLP]
    Rewriting, Computation and Proof, 2007, pp:196-212 [Conf]
  12. Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune
    Combining Algorithms for Deciding Knowledge in Security Protocols. [Citation Graph (0, 0)][DBLP]
    FroCos, 2007, pp:103-117 [Conf]
  13. Stéphanie Delaune, Hai Lin, Christopher Lynch
    Protocol Verification Via Rigid/Flexible Resolution. [Citation Graph (0, 0)][DBLP]
    LPAR, 2007, pp:242-256 [Conf]
  14. Véronique Cortier, Stéphanie Delaune
    Deciding Knowledge in Security Protocols for Monoidal Equational Theories. [Citation Graph (0, 0)][DBLP]
    LPAR, 2007, pp:196-210 [Conf]

  15. Deducibility Constraints. [Citation Graph (, )][DBLP]


  16. Computing Knowledge in Security Protocols under Convergent Equational Theories. [Citation Graph (, )][DBLP]


  17. Automating Security Analysis: Symbolic Equivalence of Constraint Systems. [Citation Graph (, )][DBLP]


  18. A Formal Theory of Key Conjuring. [Citation Graph (, )][DBLP]


  19. Composition of Password-Based Protocols. [Citation Graph (, )][DBLP]


  20. Formal Analysis of PKCS#11. [Citation Graph (, )][DBLP]


  21. A Method for Proving Observational Equivalence. [Citation Graph (, )][DBLP]


  22. Modeling and Verifying Ad Hoc Routing Protocols. [Citation Graph (, )][DBLP]


  23. Formal Analysis of Privacy for Vehicular Mix-Zones. [Citation Graph (, )][DBLP]


  24. Epistemic Logic for the Applied Pi Calculus. [Citation Graph (, )][DBLP]


  25. Simulation based security in the applied pi calculus. [Citation Graph (, )][DBLP]


  26. Safely Composing Security Protocols. [Citation Graph (, )][DBLP]


  27. Symbolic Bisimulation for the Applied Pi Calculus. [Citation Graph (, )][DBLP]


  28. From One Session to Many: Dynamic Tags for Security Protocols. [Citation Graph (, )][DBLP]


  29. YAPA: A Generic Tool for Computing Intruder Knowledge. [Citation Graph (, )][DBLP]


  30. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. [Citation Graph (, )][DBLP]


  31. YAPA: A generic tool for computing intruder knowledge [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.281secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002