Search the dblp DataBase
Stéphanie Delaune :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stéphanie Delaune , Florent Jacquemard A decision procedure for the verification of security protocols with explicit destructors. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:278-287 [Conf ] Stéphanie Delaune , Florent Jacquemard A Theory of Dictionary Attacks and its Complexity. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:2-15 [Conf ] Stéphanie Delaune , Steve Kremer , Mark Ryan Coercion-Resistance and Receipt-Freeness in Electronic Voting. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:28-42 [Conf ] Stéphanie Delaune , Pascal Lafourcade , Denis Lugiez , Ralf Treinen Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or . [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:132-143 [Conf ] Hubert Comon-Lundh , Stéphanie Delaune The Finite Variant Property: How to Get Rid of Some Algebraic Properties. [Citation Graph (0, 0)][DBLP ] RTA, 2005, pp:294-307 [Conf ] Sergiu Bursuc , Hubert Comon-Lundh , Stéphanie Delaune Associative-Commutative Deducibility Constraints. [Citation Graph (0, 0)][DBLP ] STACS, 2007, pp:634-645 [Conf ] Stéphanie Delaune Easy intruder deduction problems with homomorphisms. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2006, v:97, n:6, pp:213-218 [Journal ] Stéphanie Delaune , Florent Jacquemard Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2006, v:36, n:1-2, pp:85-124 [Journal ] Véronique Cortier , Stéphanie Delaune , Pascal Lafourcade A survey of algebraic properties used in cryptographic protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:1, pp:1-43 [Journal ] Stéphanie Delaune An undecidability result for AGh. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:368, n:1-2, pp:161-167 [Journal ] Sergiu Bursuc , Hubert Comon-Lundh , Stéphanie Delaune Deducibility Constraints, Equational Theory and Electronic Money. [Citation Graph (0, 0)][DBLP ] Rewriting, Computation and Proof, 2007, pp:196-212 [Conf ] Mathilde Arnaud , Véronique Cortier , Stéphanie Delaune Combining Algorithms for Deciding Knowledge in Security Protocols. [Citation Graph (0, 0)][DBLP ] FroCos, 2007, pp:103-117 [Conf ] Stéphanie Delaune , Hai Lin , Christopher Lynch Protocol Verification Via Rigid/Flexible Resolution. [Citation Graph (0, 0)][DBLP ] LPAR, 2007, pp:242-256 [Conf ] Véronique Cortier , Stéphanie Delaune Deciding Knowledge in Security Protocols for Monoidal Equational Theories. [Citation Graph (0, 0)][DBLP ] LPAR, 2007, pp:196-210 [Conf ] Deducibility Constraints. [Citation Graph (, )][DBLP ] Computing Knowledge in Security Protocols under Convergent Equational Theories. [Citation Graph (, )][DBLP ] Automating Security Analysis: Symbolic Equivalence of Constraint Systems. [Citation Graph (, )][DBLP ] A Formal Theory of Key Conjuring. [Citation Graph (, )][DBLP ] Composition of Password-Based Protocols. [Citation Graph (, )][DBLP ] Formal Analysis of PKCS#11. [Citation Graph (, )][DBLP ] A Method for Proving Observational Equivalence. [Citation Graph (, )][DBLP ] Modeling and Verifying Ad Hoc Routing Protocols. [Citation Graph (, )][DBLP ] Formal Analysis of Privacy for Vehicular Mix-Zones. [Citation Graph (, )][DBLP ] Epistemic Logic for the Applied Pi Calculus. [Citation Graph (, )][DBLP ] Simulation based security in the applied pi calculus. [Citation Graph (, )][DBLP ] Safely Composing Security Protocols. [Citation Graph (, )][DBLP ] Symbolic Bisimulation for the Applied Pi Calculus. [Citation Graph (, )][DBLP ] From One Session to Many: Dynamic Tags for Security Protocols. [Citation Graph (, )][DBLP ] YAPA: A Generic Tool for Computing Intruder Knowledge. [Citation Graph (, )][DBLP ] Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. [Citation Graph (, )][DBLP ] YAPA: A generic tool for computing intruder knowledge [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.281secs