default search action
Search dblp for Publications
export results for "Steve Kremer"
@article{DBLP:journals/siglog/Kremer24, author = {Steve Kremer}, title = {Security and Privacy Column}, journal = {{ACM} {SIGLOG} News}, volume = {11}, number = {2}, pages = {61}, year = {2024}, url = {https://doi.org/10.1145/3665453.3665460}, doi = {10.1145/3665453.3665460}, timestamp = {Tue, 11 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siglog/Kremer24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/theoretics/ChevalKR24, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice}, journal = {TheoretiCS}, volume = {3}, year = {2024}, url = {https://doi.org/10.46298/theoretics.24.4}, doi = {10.46298/THEORETICS.24.4}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/theoretics/ChevalKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AmmannHK24, author = {Max Ammann and Lucca Hirschi and Steve Kremer}, title = {{DY} Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco, CA, USA, May 19-23, 2024}, pages = {1481--1499}, year = {2024}, crossref = {DBLP:conf/sp/2024}, url = {https://doi.org/10.1109/SP54263.2024.00096}, doi = {10.1109/SP54263.2024.00096}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AmmannHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChevalCK23, author = {Vincent Cheval and Rapha{\"{e}}lle Crubill{\'{e}} and Steve Kremer}, title = {Symbolic protocol verification with dice}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {501--538}, year = {2023}, url = {https://doi.org/10.3233/JCS-230037}, doi = {10.3233/JCS-230037}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siglog/Kremer23, author = {Steve Kremer}, title = {Security and Privacy Column}, journal = {{ACM} {SIGLOG} News}, volume = {10}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.1145/3584676.3584679}, doi = {10.1145/3584676.3584679}, timestamp = {Sun, 26 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siglog/Kremer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChevalCDHJK23, author = {Vincent Cheval and Cas Cremers and Alexander Dax and Lucca Hirschi and Charlie Jacomme and Steve Kremer}, title = {Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5899--5916}, year = {2023}, crossref = {DBLP:conf/uss/2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/cheval}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChevalCDHJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Jacomme0KR23, author = {Charlie Jacomme and Elise Klein and Steve Kremer and Ma{\"{\i}}wenn Racouchot}, title = {A comprehensive, formal and automated analysis of the {EDHOC} protocol}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5881--5898}, year = {2023}, crossref = {DBLP:conf/uss/2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/jacomme}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Jacomme0KR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmmannHK23, author = {Max Ammann and Lucca Hirschi and Steve Kremer}, title = {{DY} Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2023}, url = {https://eprint.iacr.org/2023/057}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AmmannHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/BartheJK22, author = {Gilles Barthe and Charlie Jacomme and Steve Kremer}, title = {Universal Equivalence and Majority of Probabilistic Programs over Finite Fields}, journal = {{ACM} Trans. Comput. Log.}, volume = {23}, number = {1}, pages = {5:1--5:42}, year = {2022}, url = {https://doi.org/10.1145/3487063}, doi = {10.1145/3487063}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/BartheJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCK22, author = {Vincent Cheval and Rapha{\"{e}}lle Crubill{\'{e}} and Steve Kremer}, title = {Symbolic protocol verification with dice: process equivalences in the presence of probabilities}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {319--334}, year = {2022}, crossref = {DBLP:conf/csfw/2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919644}, doi = {10.1109/CSF54842.2022.9919644}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChevalJKK22, author = {Vincent Cheval and Charlie Jacomme and Steve Kremer and Robert K{\"{u}}nnemann}, title = {{SAPIC+:} protocol verifiers of the world, unite!}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3935--3952}, year = {2022}, crossref = {DBLP:conf/uss/2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/cheval}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChevalJKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03225, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice}, journal = {CoRR}, volume = {abs/2211.03225}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03225}, doi = {10.48550/ARXIV.2211.03225}, eprinttype = {arXiv}, eprint = {2211.03225}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevalCDHJK22, author = {Vincent Cheval and Cas Cremers and Alexander Dax and Lucca Hirschi and Charlie Jacomme and Steve Kremer}, title = {Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1314}, year = {2022}, url = {https://eprint.iacr.org/2022/1314}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevalCDHJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevalJKK22, author = {Vincent Cheval and Charlie Jacomme and Steve Kremer and Robert K{\"{u}}nnemann}, title = {Sapic+: protocol verifiers of the world, unite!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {741}, year = {2022}, url = {https://eprint.iacr.org/2022/741}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevalJKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JacommeK21, author = {Charlie Jacomme and Steve Kremer}, title = {An Extensive Formal Analysis of Multi-factor Authentication Protocols}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {2}, pages = {13:1--13:34}, year = {2021}, url = {https://doi.org/10.1145/3440712}, doi = {10.1145/3440712}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JacommeK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BabelCK20, author = {Kushal Babel and Vincent Cheval and Steve Kremer}, title = {On the semantics of communications when verifying equivalence properties}, journal = {J. Comput. Secur.}, volume = {28}, number = {1}, pages = {71--127}, year = {2020}, url = {https://doi.org/10.3233/JCS-191366}, doi = {10.3233/JCS-191366}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BabelCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChevalKR20, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols}, booktitle = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday}, pages = {127--145}, year = {2020}, crossref = {DBLP:conf/birthday/2020scedrov}, url = {https://doi.org/10.1007/978-3-030-62077-6\_10}, doi = {10.1007/978-3-030-62077-6\_10}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ChevalKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/BartheJK20, author = {Gilles Barthe and Charlie Jacomme and Steve Kremer}, title = {Universal equivalence and majority of probabilistic programs over finite fields}, booktitle = {{LICS} '20: 35th Annual {ACM/IEEE} Symposium on Logic in Computer Science, Saarbr{\"{u}}cken, Germany, July 8-11, 2020}, pages = {155--166}, year = {2020}, crossref = {DBLP:conf/lics/2020}, url = {https://doi.org/10.1145/3373718.3394746}, doi = {10.1145/3373718.3394746}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lics/BartheJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChevalKR19, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {Exploiting Symmetries When Proving Equivalence Properties for Security Protocols}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {905--922}, year = {2019}, crossref = {DBLP:conf/ccs/2019}, url = {https://doi.org/10.1145/3319535.3354260}, doi = {10.1145/3319535.3354260}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChevalKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BartheGJKS19, author = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Charlie Jacomme and Steve Kremer and Pierre{-}Yves Strub}, title = {Symbolic Methods in Computational Cryptography Proofs}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {136--151}, year = {2019}, crossref = {DBLP:conf/csfw/2019}, url = {https://doi.org/10.1109/CSF.2019.00017}, doi = {10.1109/CSF.2019.00017}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BartheGJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BursucK19, author = {Sergiu Bursuc and Steve Kremer}, title = {Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, pages = {361--382}, year = {2019}, crossref = {DBLP:conf/esorics/2019-1}, url = {https://doi.org/10.1007/978-3-030-29959-0\_18}, doi = {10.1007/978-3-030-29959-0\_18}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BursucK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BursucDK19, author = {Sergiu Bursuc and Constantin Catalin Dragan and Steve Kremer}, title = {Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {606--620}, year = {2019}, crossref = {DBLP:conf/eurosp/2019}, url = {https://doi.org/10.1109/EuroSP.2019.00050}, doi = {10.1109/EUROSP.2019.00050}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BursucDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BursucK19, author = {Sergiu Bursuc and Steve Kremer}, title = {Contingent payments on a public ledger: models and reductions for automated verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2019}, url = {https://eprint.iacr.org/2019/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BursucK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChevalKR18, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {The {DEEPSEC} Prover}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, pages = {28--36}, year = {2018}, crossref = {DBLP:conf/cav/2018-2}, url = {https://doi.org/10.1007/978-3-319-96142-2\_4}, doi = {10.1007/978-3-319-96142-2\_4}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ChevalKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JacommeK18, author = {Charlie Jacomme and Steve Kremer}, title = {An Extensive Formal Analysis of Multi-factor Authentication Protocols}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {1--15}, year = {2018}, crossref = {DBLP:conf/csfw/2018}, url = {https://doi.org/10.1109/CSF.2018.00008}, doi = {10.1109/CSF.2018.00008}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/JacommeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChevalKR18, author = {Vincent Cheval and Steve Kremer and Itsaka Rakotonirina}, title = {{DEEPSEC:} Deciding Equivalence Properties in Security Protocols Theory and Practice}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {529--546}, year = {2018}, crossref = {DBLP:conf/sp/2018}, url = {https://doi.org/10.1109/SP.2018.00033}, doi = {10.1109/SP.2018.00033}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChevalKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/interfaces/MillerAADKMOT17, author = {Michael R. Miller and Robert J. Alexander and Vincent A. Arbige and Robert F. Dell and Steven R. Kremer and Brian P. McClune and Jane E. Oppenlander and Joshua P. Tomlin}, title = {Optimal Allocation of Students to Naval Nuclear-Power Training Units}, journal = {Interfaces}, volume = {47}, number = {4}, pages = {320--335}, year = {2017}, url = {https://doi.org/10.1287/inte.2017.0905}, doi = {10.1287/INTE.2017.0905}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/interfaces/MillerAADKMOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BaeldeDGK17, author = {David Baelde and St{\'{e}}phanie Delaune and Ivan Gazeau and Steve Kremer}, title = {Symbolic Verification of Privacy-Type Properties for Security Protocols with {XOR}}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {234--248}, year = {2017}, crossref = {DBLP:conf/csfw/2017}, url = {https://doi.org/10.1109/CSF.2017.22}, doi = {10.1109/CSF.2017.22}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BaeldeDGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR17, author = {St{\'{e}}phanie Delaune and Steve Kremer and Ludovic Robin}, title = {Formal Verification of Protocols Based on Short Authenticated Strings}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {130--143}, year = {2017}, crossref = {DBLP:conf/csfw/2017}, url = {https://doi.org/10.1109/CSF.2017.26}, doi = {10.1109/CSF.2017.26}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GazeauK17, author = {Ivan Gazeau and Steve Kremer}, title = {Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, pages = {1--20}, year = {2017}, crossref = {DBLP:conf/esorics/2017-2}, url = {https://doi.org/10.1007/978-3-319-66399-9\_1}, doi = {10.1007/978-3-319-66399-9\_1}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GazeauK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BackesDKK17, author = {Michael Backes and Jannik Dreier and Steve Kremer and Robert K{\"{u}}nnemann}, title = {A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {76--91}, year = {2017}, crossref = {DBLP:conf/eurosp/2017}, url = {https://doi.org/10.1109/EuroSP.2017.12}, doi = {10.1109/EUROSP.2017.12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BackesDKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/JacommeKS17, author = {Charlie Jacomme and Steve Kremer and Guillaume Scerri}, title = {Symbolic Models for Isolated Execution Environments}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {530--545}, year = {2017}, crossref = {DBLP:conf/eurosp/2017}, url = {https://doi.org/10.1109/EuroSP.2017.16}, doi = {10.1109/EUROSP.2017.16}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/JacommeKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BabelCK17, author = {Kushal Babel and Vincent Cheval and Steve Kremer}, title = {On Communication Models When Verifying Equivalence Properties}, booktitle = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, pages = {141--163}, year = {2017}, crossref = {DBLP:conf/post/2017}, url = {https://doi.org/10.1007/978-3-662-54455-6\_7}, doi = {10.1007/978-3-662-54455-6\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/BabelCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/DreierDKS17, author = {Jannik Dreier and Charles Dum{\'{e}}nil and Steve Kremer and Ralf Sasse}, title = {Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols}, booktitle = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, pages = {117--140}, year = {2017}, crossref = {DBLP:conf/post/2017}, url = {https://doi.org/10.1007/978-3-662-54455-6\_6}, doi = {10.1007/978-3-662-54455-6\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/DreierDKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacommeKS17, author = {Charlie Jacomme and Steve Kremer and Guillaume Scerri}, title = {Symbolic Models for Isolated Execution Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2017}, url = {http://eprint.iacr.org/2017/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacommeKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KremerK16, author = {Steve Kremer and Robert K{\"{u}}nnemann}, title = {Automated analysis of security protocols with global state}, journal = {J. Comput. Secur.}, volume = {24}, number = {5}, pages = {583--616}, year = {2016}, url = {https://doi.org/10.3233/JCS-160556}, doi = {10.3233/JCS-160556}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KremerK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ChadhaCCK16, author = {Rohit Chadha and Vincent Cheval and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Steve Kremer}, title = {Automated Verification of Equivalence Properties of Cryptographic Protocols}, journal = {{ACM} Trans. Comput. Log.}, volume = {17}, number = {4}, pages = {23}, year = {2016}, url = {https://doi.org/10.1145/2926715}, doi = {10.1145/2926715}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ChadhaCCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArapinisCK16, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer}, title = {When Are Three Voters Enough for Privacy Properties?}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, pages = {241--260}, year = {2016}, crossref = {DBLP:conf/esorics/2016-2}, url = {https://doi.org/10.1007/978-3-319-45741-3\_13}, doi = {10.1007/978-3-319-45741-3\_13}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ArapinisCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KremerR16, author = {Steve Kremer and Peter B. R{\o}nne}, title = {To Du or Not to Du: {A} Security Analysis of Du-Vote}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {473--486}, year = {2016}, crossref = {DBLP:conf/eurosp/2016}, url = {https://doi.org/10.1109/EuroSP.2016.42}, doi = {10.1109/EUROSP.2016.42}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KremerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/CortierK16, author = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models for Analyzing Security Protocols: Some Lecture Notes}, booktitle = {Dependable Software Systems Engineering}, pages = {33--58}, year = {2016}, crossref = {DBLP:series/natosec/45}, url = {https://doi.org/10.3233/978-1-61499-627-9-33}, doi = {10.3233/978-1-61499-627-9-33}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/CortierK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArapinisCK16, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer}, title = {When Are Three Voters Enough for Privacy Properties?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2016}, url = {http://eprint.iacr.org/2016/690}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArapinisCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/CortierEKMW15, author = {V{\'{e}}ronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling}, title = {Type-Based Verification of Electronic Voting Protocols}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, pages = {303--323}, year = {2015}, crossref = {DBLP:conf/post/2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_16}, doi = {10.1007/978-3-662-46666-7\_16}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/CortierEKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierEKMW15, author = {V{\'{e}}ronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling}, title = {Type-Based Verification of Electronic Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2015}, url = {http://eprint.iacr.org/2015/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierEKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ArapinisDK14, author = {Myrto Arapinis and St{\'{e}}phanie Delaune and Steve Kremer}, title = {Dynamic Tags for Security Protocols}, journal = {Log. Methods Comput. Sci.}, volume = {10}, number = {2}, year = {2014}, url = {https://doi.org/10.2168/LMCS-10(2:11)2014}, doi = {10.2168/LMCS-10(2:11)2014}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ArapinisDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftpl/CortierK14, author = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models and Techniques for Analyzing Security Protocols: {A} Tutorial}, journal = {Found. Trends Program. Lang.}, volume = {1}, number = {3}, pages = {151--267}, year = {2014}, url = {https://doi.org/10.1561/2500000001}, doi = {10.1561/2500000001}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftpl/CortierK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/KremerN14, author = {Steve Kremer and Paliath Narendran}, title = {Foreword to the special issue on security and rewriting techniques}, journal = {Inf. Comput.}, volume = {238}, pages = {1}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.002}, doi = {10.1016/J.IC.2014.07.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/KremerN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcomp/ChanDKGD14, author = {Joel Chan and Steven Dang and P{\'{e}}ter Kr{\'{e}}mer and Lucy Guo and Steven Dow}, title = {IdeaGens: {A} Social Ideation System for Guided Crowd Brainstorming}, booktitle = {Proceedings of the Seconf {AAAI} Conference on Human Computation and Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania, {USA}}, pages = {67--68}, year = {2014}, crossref = {DBLP:conf/hcomp/2014}, url = {https://doi.org/10.1609/hcomp.v2i1.13140}, doi = {10.1609/HCOMP.V2I1.13140}, timestamp = {Tue, 05 Sep 2023 11:10:11 +0200}, biburl = {https://dblp.org/rec/conf/hcomp/ChanDKGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KremerK14, author = {Steve Kremer and Robert K{\"{u}}nnemann}, title = {Automated Analysis of Security Protocols with Global State}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {163--178}, year = {2014}, crossref = {DBLP:conf/sp/2014}, url = {https://doi.org/10.1109/SP.2014.18}, doi = {10.1109/SP.2014.18}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KremerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2014, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8}, doi = {10.1007/978-3-642-54792-8}, isbn = {978-3-642-54791-1}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KremerK14, author = {Steve Kremer and Robert K{\"{u}}nnemann}, title = {Automated analysis of security protocols with global state}, journal = {CoRR}, volume = {abs/1403.1142}, year = {2014}, url = {http://arxiv.org/abs/1403.1142}, eprinttype = {arXiv}, eprint = {1403.1142}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KremerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/ChevalierDKR13, author = {C{\'{e}}line Chevalier and St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan}, title = {Composition of password-based protocols}, journal = {Formal Methods Syst. Des.}, volume = {43}, number = {3}, pages = {369--413}, year = {2013}, url = {https://doi.org/10.1007/s10703-013-0184-6}, doi = {10.1007/S10703-013-0184-6}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/ChevalierDKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerKS13, author = {Steve Kremer and Robert K{\"{u}}nnemann and Graham Steel}, title = {Universally Composable Key-Management}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, pages = {327--344}, year = {2013}, crossref = {DBLP:conf/esorics/2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_19}, doi = {10.1007/978-3-642-40203-6\_19}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KremerKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisCKR13, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer and Mark Ryan}, title = {Practical Everlasting Privacy}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, pages = {21--40}, year = {2013}, crossref = {DBLP:conf/post/2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_2}, doi = {10.1007/978-3-642-36830-1\_2}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/CiobacaDK12, author = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and St{\'{e}}phanie Delaune and Steve Kremer}, title = {Computing Knowledge in Security Protocols Under Convergent Equational Theories}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {219--262}, year = {2012}, url = {https://doi.org/10.1007/s10817-010-9197-7}, doi = {10.1007/S10817-010-9197-7}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/CiobacaDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/KremerMT12, author = {Steve Kremer and Antoine Mercier and Ralf Treinen}, title = {Reducing Equational Theories for the Decision of Static Equivalence}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {197--217}, year = {2012}, url = {https://doi.org/10.1007/s10817-010-9203-0}, doi = {10.1007/S10817-010-9203-0}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/KremerMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/DelauneKP12, author = {St{\'{e}}phanie Delaune and Steve Kremer and Daniel Pasaila}, title = {Security Protocols, Constraint Systems, and Group Theories}, booktitle = {Automated Reasoning - 6th International Joint Conference, {IJCAR} 2012, Manchester, UK, June 26-29, 2012. Proceedings}, pages = {164--178}, year = {2012}, crossref = {DBLP:conf/cade/2012}, url = {https://doi.org/10.1007/978-3-642-31365-3\_15}, doi = {10.1007/978-3-642-31365-3\_15}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/DelauneKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/ChadhaCK12, author = {Rohit Chadha and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Steve Kremer}, title = {Automated Verification of Equivalence Properties of Cryptographic Protocols}, booktitle = {Programming Languages and Systems - 21st European Symposium on Programming, {ESOP} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, pages = {108--127}, year = {2012}, crossref = {DBLP:conf/esop/2012}, url = {https://doi.org/10.1007/978-3-642-28869-2\_6}, doi = {10.1007/978-3-642-28869-2\_6}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esop/ChadhaCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KremerKS12, author = {Steve Kremer and Robert K{\"{u}}nnemann and Graham Steel}, title = {Universally Composable Key-Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2012}, url = {http://eprint.iacr.org/2012/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KremerKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Kremer11, author = {Steve Kremer}, title = {Modelling and analyzing security protocols in cryptographic process calculi}, year = {2011}, url = {https://tel.archives-ouvertes.fr/tel-00636769}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Kremer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/CortierKW11, author = {V{\'{e}}ronique Cortier and Steve Kremer and Bogdan Warinschi}, title = {A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {225--259}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9187-9}, doi = {10.1007/S10817-010-9187-9}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/CortierKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKRS11, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan and Graham Steel}, title = {Formal Analysis of Protocols Based on {TPM} State Registers}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {66--80}, year = {2011}, crossref = {DBLP:conf/csfw/2011}, url = {https://doi.org/10.1109/CSF.2011.12}, doi = {10.1109/CSF.2011.12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KremerSW11, author = {Steve Kremer and Graham Steel and Bogdan Warinschi}, title = {Security for Key Management Interfaces}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {266--280}, year = {2011}, crossref = {DBLP:conf/csfw/2011}, url = {https://doi.org/10.1109/CSF.2011.25}, doi = {10.1109/CSF.2011.25}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KremerSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/ChevalierDK11, author = {C{\'{e}}line Chevalier and St{\'{e}}phanie Delaune and Steve Kremer}, title = {Transforming Password Protocols to Compose}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011, Mumbai, India}, pages = {204--216}, year = {2011}, crossref = {DBLP:conf/fsttcs/2011}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2011.204}, doi = {10.4230/LIPICS.FSTTCS.2011.204}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/ChevalierDK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/CortierK11, author = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Introduction}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, pages = {1--12}, year = {2011}, crossref = {DBLP:books/ios/11/CK2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-1}, doi = {10.3233/978-1-60750-714-7-1}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CortierK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ios/11/CK2011, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, publisher = {{IOS} Press}, year = {2011}, url = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols}, isbn = {978-1-60750-713-0}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CK2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKR10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan}, title = {Symbolic bisimulation for the applied pi calculus}, journal = {J. Comput. Secur.}, volume = {18}, number = {2}, pages = {317--377}, year = {2010}, url = {https://doi.org/10.3233/JCS-2010-0363}, doi = {10.3233/JCS-2010-0363}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKS10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Graham Steel}, title = {Formal security analysis of PKCS{\#}11 and proprietary extensions}, journal = {J. Comput. Secur.}, volume = {18}, number = {6}, pages = {1211--1245}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0394}, doi = {10.3233/JCS-2009-0394}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KremerM10, author = {Steve Kremer and Laurent Mazar{\'{e}}}, title = {Computationally sound analysis of protocols using bilinear pairings}, journal = {J. Comput. Secur.}, volume = {18}, number = {6}, pages = {999--1033}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0388}, doi = {10.3233/JCS-2009-0388}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KremerM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerRS10, author = {Steve Kremer and Mark Ryan and Ben Smyth}, title = {Election Verifiability in Electronic Voting Protocols}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, pages = {389--404}, year = {2010}, crossref = {DBLP:conf/esorics/2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_24}, doi = {10.1007/978-3-642-15497-3\_24}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KremerRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DelauneKRS10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Dermot Ryan and Graham Steel}, title = {A Formal Analysis of Authentication in the {TPM}}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, pages = {111--125}, year = {2010}, crossref = {DBLP:conf/ifip1-7/2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_8}, doi = {10.1007/978-3-642-19751-2\_8}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DelauneKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10, author = {Ben Smyth and Mark Ryan and Steve Kremer and Mounira Kourjieh}, title = {Towards Automatic Analysis of Election Verifiability Properties}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, pages = {146--163}, year = {2010}, crossref = {DBLP:conf/ifip1-7/2010wits}, url = {https://doi.org/10.1007/978-3-642-16074-5\_11}, doi = {10.1007/978-3-642-16074-5\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/DelauneKR10, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Verifying Privacy-Type Properties of Electronic Voting Protocols: {A} Taster}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, pages = {289--309}, year = {2010}, crossref = {DBLP:conf/wote/2010lncs}, url = {https://doi.org/10.1007/978-3-642-12980-3\_18}, doi = {10.1007/978-3-642-12980-3\_18}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wote/DelauneKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BaudetCK09, author = {Mathieu Baudet and V{\'{e}}ronique Cortier and Steve Kremer}, title = {Computationally sound implementations of equational theories against passive adversaries}, journal = {Inf. Comput.}, volume = {207}, number = {4}, pages = {496--520}, year = {2009}, url = {https://doi.org/10.1016/j.ic.2008.12.005}, doi = {10.1016/J.IC.2008.12.005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BaudetCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKR09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Verifying privacy-type properties of electronic voting protocols}, journal = {J. Comput. Secur.}, volume = {17}, number = {4}, pages = {435--487}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0340}, doi = {10.3233/JCS-2009-0340}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/KremerMT09, author = {Steve Kremer and Antoine Mercier and Ralf Treinen}, title = {Reducing Equational Theories for the Decision of Static Equivalence}, booktitle = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, pages = {94--108}, year = {2009}, crossref = {DBLP:conf/asian/2009}, url = {https://doi.org/10.1007/978-3-642-10622-4\_8}, doi = {10.1007/978-3-642-10622-4\_8}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asian/KremerMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/CiobacaDK09, author = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and St{\'{e}}phanie Delaune and Steve Kremer}, title = {Computing Knowledge in Security Protocols under Convergent Equational Theories}, booktitle = {Automated Deduction - CADE-22, 22nd International Conference on Automated Deduction, Montreal, Canada, August 2-7, 2009. Proceedings}, pages = {355--370}, year = {2009}, crossref = {DBLP:conf/cade/2009}, url = {https://doi.org/10.1007/978-3-642-02959-2\_27}, doi = {10.1007/978-3-642-02959-2\_27}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/CiobacaDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/ChadhaDK09, author = {Rohit Chadha and St{\'{e}}phanie Delaune and Steve Kremer}, title = {Epistemic Logic for the Applied Pi Calculus}, booktitle = {Formal Techniques for Distributed Systems, Joint 11th {IFIP} {WG} 6.1 International Conference {FMOODS} 2009 and 29th {IFIP} {WG} 6.1 International Conference {FORTE} 2009, Lisboa, Portugal, June 9-12, 2009. Proceedings}, pages = {182--197}, year = {2009}, crossref = {DBLP:conf/forte/2009}, url = {https://doi.org/10.1007/978-3-642-02138-1\_12}, doi = {10.1007/978-3-642-02138-1\_12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/forte/ChadhaDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/DelauneKP09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Olivier Pereira}, title = {Simulation based security in the applied pi calculus}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2009, December 15-17, 2009, {IIT} Kanpur, India}, pages = {169--180}, year = {2009}, crossref = {DBLP:conf/fsttcs/2009}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2009.2316}, doi = {10.4230/LIPICS.FSTTCS.2009.2316}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/DelauneKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secco/2008, editor = {Steve Kremer and Prakash Panangaden}, title = {Proceedings of the 6th Workshop on Security Issues in Concurrency, SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {242}, number = {3}, publisher = {Elsevier}, year = {2009}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/242/issue/3}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secco/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/corr/abs-0910-4420, editor = {Michele Boreale and Steve Kremer}, title = {Proceedings 7th International Workshop on Security Issues in Concurrency, {SECCO} 2009, Bologna, Italy, 5th September 2009}, series = {{EPTCS}}, volume = {7}, year = {2009}, url = {https://doi.org/10.4204/EPTCS.7}, doi = {10.4204/EPTCS.7}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-4420.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelauneKP09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Olivier Pereira}, title = {Simulation based security in the applied pi calculus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2009}, url = {http://eprint.iacr.org/2009/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelauneKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/KremerMT08, author = {Steve Kremer and Antoine Mercier and Ralf Treinen}, title = {Proving Group Protocols Secure Against Eavesdroppers}, booktitle = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008, Sydney, Australia, August 12-15, 2008, Proceedings}, pages = {116--131}, year = {2008}, crossref = {DBLP:conf/cade/2008}, url = {https://doi.org/10.1007/978-3-540-71070-7\_9}, doi = {10.1007/978-3-540-71070-7\_9}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/KremerMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR08, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Composition of Password-Based Protocols}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {239--251}, year = {2008}, crossref = {DBLP:conf/csfw/2008}, url = {https://doi.org/10.1109/CSF.2008.6}, doi = {10.1109/CSF.2008.6}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKS08, author = {St{\'{e}}phanie Delaune and Steve Kremer and Graham Steel}, title = {Formal Analysis of PKCS{\#}11}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {331--344}, year = {2008}, crossref = {DBLP:conf/csfw/2008}, url = {https://doi.org/10.1109/CSF.2008.16}, doi = {10.1109/CSF.2008.16}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/ArapinisDK08, author = {Myrto Arapinis and St{\'{e}}phanie Delaune and Steve Kremer}, title = {From One Session to Many: Dynamic Tags for Security Protocols}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, {LPAR} 2008, Doha, Qatar, November 22-27, 2008. Proceedings}, pages = {128--142}, year = {2008}, crossref = {DBLP:conf/lpar/2008}, url = {https://doi.org/10.1007/978-3-540-89439-1\_9}, doi = {10.1007/978-3-540-89439-1\_9}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lpar/ArapinisDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KremerP09, author = {Steve Kremer and Prakash Panangaden}, title = {Preface}, booktitle = {Proceedings of the 6th Workshop on Security Issues in Concurrency, SecCo@CONCUR 2008, Toronto, ON, Canada, August 23, 2008}, pages = {1--2}, year = {2008}, crossref = {DBLP:conf/secco/2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.077}, doi = {10.1016/J.ENTCS.2009.07.077}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/KremerP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7421, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/07421/}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KremerM07, author = {Steve Kremer and Laurent Mazar{\'{e}}}, title = {Adaptive Soundness of Static Equivalence}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, pages = {610--625}, year = {2007}, crossref = {DBLP:conf/esorics/2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_40}, doi = {10.1007/978-3-540-74835-9\_40}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KremerM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/DelauneKR07, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Symbolic Bisimulation for the Applied Pi Calculus}, booktitle = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings}, pages = {133--145}, year = {2007}, crossref = {DBLP:conf/fsttcs/2007}, url = {https://doi.org/10.1007/978-3-540-77050-3\_11}, doi = {10.1007/978-3-540-77050-3\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/DelauneKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/Kremer07, author = {Steve Kremer}, title = {Computational Soundness of Equational Theories (Tutorial)}, booktitle = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, pages = {363--382}, year = {2007}, crossref = {DBLP:conf/tgc/2007}, url = {https://doi.org/10.1007/978-3-540-78663-4\_24}, doi = {10.1007/978-3-540-78663-4\_24}, timestamp = {Sat, 19 Oct 2019 20:09:31 +0200}, biburl = {https://dblp.org/rec/conf/tgc/Kremer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChenKR07, author = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {07421 Executive Summary -- Formal Protocol Verification Applied}, booktitle = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, year = {2007}, crossref = {DBLP:conf/dagstuhl/2007P7421}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1418}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChenKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChenKR07a, author = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {07421 Abstracts Collection -- Formal Protocol Verification Applied}, booktitle = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, year = {2007}, crossref = {DBLP:conf/dagstuhl/2007P7421}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1419}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChenKR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ChadhaKS06, author = {Rohit Chadha and Steve Kremer and Andre Scedrov}, title = {Formal Analysis of Multiparty Contract Signing}, journal = {J. Autom. Reason.}, volume = {36}, number = {1-2}, pages = {39--83}, year = {2006}, url = {https://doi.org/10.1007/s10817-005-9019-5}, doi = {10.1007/S10817-005-9019-5}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ChadhaKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/CardinalKL06, author = {Jean Cardinal and Steve Kremer and Stefan Langerman}, title = {Juggling with Pattern Matching}, journal = {Theory Comput. Syst.}, volume = {39}, number = {3}, pages = {425--437}, year = {2006}, url = {https://doi.org/10.1007/s00224-005-1239-x}, doi = {10.1007/S00224-005-1239-X}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mst/CardinalKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DelauneKR06, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Coercion-Resistance and Receipt-Freeness in Electronic Voting}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {28--42}, year = {2006}, crossref = {DBLP:conf/csfw/2006}, url = {https://doi.org/10.1109/CSFW.2006.8}, doi = {10.1109/CSFW.2006.8}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DelauneKR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, booktitle = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings}, pages = {176--187}, year = {2006}, crossref = {DBLP:conf/fsttcs/2006}, url = {https://doi.org/10.1007/11944836\_18}, doi = {10.1007/11944836\_18}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2006}, url = {http://eprint.iacr.org/2006/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/KremerR05, author = {Steve Kremer and Mark Ryan}, title = {Analysis of an Electronic Voting Protocol in the Applied Pi Calculus}, booktitle = {Programming Languages and Systems, 14th European Symposium on Programming, {ESOP} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, pages = {186--200}, year = {2005}, crossref = {DBLP:conf/esop/2005}, url = {https://doi.org/10.1007/978-3-540-31987-0\_14}, doi = {10.1007/978-3-540-31987-0\_14}, timestamp = {Fri, 27 Jan 2023 15:04:25 +0100}, biburl = {https://dblp.org/rec/conf/esop/KremerR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MukhamedovKR05, author = {Aybek Mukhamedov and Steve Kremer and Eike Ritter}, title = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, pages = {255--269}, year = {2005}, crossref = {DBLP:conf/fc/2005}, url = {https://doi.org/10.1007/11507840\_23}, doi = {10.1007/11507840\_23}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BaudetCK05, author = {Mathieu Baudet and V{\'{e}}ronique Cortier and Steve Kremer}, title = {Computationally Sound Implementations of Equational Theories Against Passive Adversaries}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, pages = {652--663}, year = {2005}, crossref = {DBLP:conf/icalp/2005}, url = {https://doi.org/10.1007/11523468\_53}, doi = {10.1007/11523468\_53}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BaudetCK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaudetCK05, author = {Mathieu Baudet and V{\'{e}}ronique Cortier and Steve Kremer}, title = {Computationally sound implementations of equational theories against passive adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2005}, url = {http://eprint.iacr.org/2005/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaudetCK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChadhaKS04, author = {Rohit Chadha and Steve Kremer and Andre Scedrov}, title = {Formal Analysis of Multi-Party Contract Signing}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {266--265}, year = {2004}, crossref = {DBLP:conf/csfw/2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.10}, doi = {10.1109/CSFW.2004.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChadhaKS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KremerR05, author = {Steve Kremer and Mark Ryan}, title = {Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, pages = {87--104}, year = {2004}, crossref = {DBLP:conf/secco/2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.043}, doi = {10.1016/J.ENTCS.2004.11.043}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/KremerR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KremerM03, author = {Steve Kremer and Olivier Markowitch}, title = {Fair multi-party non-repudiation protocols}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {4}, pages = {223--235}, year = {2003}, url = {https://doi.org/10.1007/s10207-003-0019-3}, doi = {10.1007/S10207-003-0019-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KremerM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KremerR03, author = {Steve Kremer and Jean{-}Fran{\c{c}}ois Raskin}, title = {A Game-based Verification of Non-repudiation and Fair Exchange Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {3}, pages = {399--430}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11307}, doi = {10.3233/JCS-2003-11307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KremerR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SaeedniaKM03, author = {Shahrokh Saeednia and Steve Kremer and Olivier Markowitch}, title = {An Efficient Strong Designated Verifier Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, pages = {40--54}, year = {2003}, crossref = {DBLP:conf/icisc/2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_4}, doi = {10.1007/978-3-540-24691-6\_4}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/SaeedniaKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KremerMZ02, author = {Steve Kremer and Olivier Markowitch and Jianying Zhou}, title = {An intensive survey of fair non-repudiation protocols}, journal = {Comput. Commun.}, volume = {25}, number = {17}, pages = {1606--1621}, year = {2002}, url = {https://doi.org/10.1016/S0140-3664(02)00049-X}, doi = {10.1016/S0140-3664(02)00049-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KremerMZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KremerR02, author = {Steve Kremer and Jean{-}Fran{\c{c}}ois Raskin}, title = {Game Analysis of Abuse-free Contract Signing}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {206}, year = {2002}, crossref = {DBLP:conf/csfw/2002}, url = {https://doi.org/10.1109/CSFW.2002.1021817}, doi = {10.1109/CSFW.2002.1021817}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KremerR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MarkowitchGK02, author = {Olivier Markowitch and Dieter Gollmann and Steve Kremer}, title = {On Fairness in Exchange Protocols}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, pages = {451--464}, year = {2002}, crossref = {DBLP:conf/icisc/2002}, url = {https://doi.org/10.1007/3-540-36552-4\_31}, doi = {10.1007/3-540-36552-4\_31}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MarkowitchGK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/KremerR01, author = {Steve Kremer and Jean{-}Fran{\c{c}}ois Raskin}, title = {A Game-Based Verification of Non-repudiation and Fair Exchange Protocols}, booktitle = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings}, pages = {551--565}, year = {2001}, crossref = {DBLP:conf/concur/2001}, url = {https://doi.org/10.1007/3-540-44685-0\_37}, doi = {10.1007/3-540-44685-0\_37}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/KremerR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KremerM01, author = {Steve Kremer and Olivier Markowitch}, title = {Selective Receipt in Certified E-mail}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, pages = {136--148}, year = {2001}, crossref = {DBLP:conf/indocrypt/2001}, url = {https://doi.org/10.1007/3-540-45311-3\_14}, doi = {10.1007/3-540-45311-3\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KremerM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MarkowitchK01, author = {Olivier Markowitch and Steve Kremer}, title = {An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, pages = {363--378}, year = {2001}, crossref = {DBLP:conf/isw/2001}, url = {https://doi.org/10.1007/3-540-45439-X\_25}, doi = {10.1007/3-540-45439-X\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/MarkowitchK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MarkowitchK00, author = {Olivier Markowitch and Steve Kremer}, title = {A Multi-party Optimistic Non-repudiation Protocol}, booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings}, pages = {109--122}, year = {2000}, crossref = {DBLP:conf/icisc/2000}, url = {https://doi.org/10.1007/3-540-45247-8\_9}, doi = {10.1007/3-540-45247-8\_9}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MarkowitchK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KremerM00, author = {Steve Kremer and Olivier Markowitch}, title = {A Multi-Party Non-Repudiation Protocol}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, pages = {271--280}, year = {2000}, crossref = {DBLP:conf/sec/2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/KremerM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2024, title = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco, CA, USA, May 19-23, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SP54263.2024}, doi = {10.1109/SP54263.2024}, isbn = {979-8-3503-3130-1}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/sp/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2023, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/uss/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2022, title = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022}, doi = {10.1109/CSF54842.2022}, isbn = {978-1-6654-8417-6}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2022, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22}, isbn = {978-1-939133-31-1}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/uss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2020scedrov, editor = {Vivek Nigam and Tajana Ban Kirigin and Carolyn L. Talcott and Joshua D. Guttman and Stepan L. Kuznetsov and Boon Thau Loo and Mitsuhiro Okada}, title = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {12300}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62077-6}, doi = {10.1007/978-3-030-62077-6}, isbn = {978-3-030-62076-9}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2020scedrov.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/lics/2020, editor = {Holger Hermanns and Lijun Zhang and Naoki Kobayashi and Dale Miller}, title = {{LICS} '20: 35th Annual {ACM/IEEE} Symposium on Logic in Computer Science, Saarbr{\"{u}}cken, Germany, July 8-11, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3373718}, doi = {10.1145/3373718}, isbn = {978-1-4503-7104-9}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/lics/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535}, doi = {10.1145/3319535}, isbn = {978-1-4503-6747-9}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2019, title = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8804915/proceeding}, isbn = {978-1-7281-1407-1}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019-1, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0}, doi = {10.1007/978-3-030-29959-0}, isbn = {978-3-030-29958-3}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosp/2019, title = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8790377/proceeding}, isbn = {978-1-7281-1148-3}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cav/2018-2, editor = {Hana Chockler and Georg Weissenbacher}, title = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10982}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96142-2}, doi = {10.1007/978-3-319-96142-2}, isbn = {978-3-319-96141-5}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2018, title = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8428826/proceeding}, isbn = {978-1-5386-6680-7}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2018, title = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8418581/proceeding}, isbn = {978-1-5386-4353-2}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/sp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2017, title = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8048777/proceeding}, isbn = {978-1-5386-3217-8}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2017-2, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9}, doi = {10.1007/978-3-319-66399-9}, isbn = {978-3-319-66398-2}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosp/2017, title = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/7961955/proceeding}, isbn = {978-1-5090-5762-7}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2017, editor = {Matteo Maffei and Mark Ryan}, title = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10204}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54455-6}, doi = {10.1007/978-3-662-54455-6}, isbn = {978-3-662-54454-9}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/post/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016-2, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3}, doi = {10.1007/978-3-319-45741-3}, isbn = {978-3-319-45740-6}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosp/2016, title = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7467055/proceeding}, isbn = {978-1-5090-1751-5}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/natosec/45, editor = {Javier Esparza and Orna Grumberg and Salomon Sickert}, title = {Dependable Software Systems Engineering}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {45}, publisher = {{IOS} Press}, year = {2016}, isbn = {978-1-61499-626-2}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/series/natosec/45.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2015, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7}, doi = {10.1007/978-3-662-46666-7}, isbn = {978-3-662-46665-0}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/post/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hcomp/2014, editor = {Jeffrey P. Bigham and David C. Parkes}, title = {Proceedings of the Seconf {AAAI} Conference on Human Computation and Crowdsourcing, {HCOMP} 2014, November 2-4, 2014, Pittsburgh, Pennsylvania, {USA}}, publisher = {{AAAI}}, year = {2014}, url = {https://ojs.aaai.org/index.php/HCOMP/issue/view/314}, isbn = {978-1-57735-682-0}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/hcomp/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2014, title = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6954656/proceeding}, isbn = {978-1-4799-4686-0}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/sp/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2013, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6}, doi = {10.1007/978-3-642-40203-6}, isbn = {978-3-642-40202-9}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2013, editor = {David A. Basin and John C. Mitchell}, title = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1}, doi = {10.1007/978-3-642-36830-1}, isbn = {978-3-642-36829-5}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/post/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cade/2012, editor = {Bernhard Gramlich and Dale Miller and Uli Sattler}, title = {Automated Reasoning - 6th International Joint Conference, {IJCAR} 2012, Manchester, UK, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7364}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31365-3}, doi = {10.1007/978-3-642-31365-3}, isbn = {978-3-642-31364-6}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/cade/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esop/2012, editor = {Helmut Seidl}, title = {Programming Languages and Systems - 21st European Symposium on Programming, {ESOP} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7211}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28869-2}, doi = {10.1007/978-3-642-28869-2}, isbn = {978-3-642-28868-5}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/esop/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2011, title = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5991608/proceeding}, isbn = {978-1-61284-644-6}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fsttcs/2011, editor = {Supratik Chakraborty and Amit Kumar}, title = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2011, December 12-14, 2011, Mumbai, India}, series = {LIPIcs}, volume = {13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2011}, url = {http://drops.dagstuhl.de/portals/extern/index.php?semnr=110010}, isbn = {978-3-939897-34-7}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ios/11/CK2011, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, publisher = {{IOS} Press}, year = {2011}, url = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols}, isbn = {978-1-60750-713-0}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CK2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2010, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3}, doi = {10.1007/978-3-642-15497-3}, isbn = {978-3-642-15496-6}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2010, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19751-2}, doi = {10.1007/978-3-642-19751-2}, isbn = {978-3-642-19750-5}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2010wits, editor = {Alessandro Armando and Gavin Lowe}, title = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16074-5}, doi = {10.1007/978-3-642-16074-5}, isbn = {978-3-642-16073-8}, timestamp = {Thu, 10 Oct 2024 16:48:43 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wote/2010lncs, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3}, doi = {10.1007/978-3-642-12980-3}, isbn = {978-3-642-12979-7}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/wote/2010lncs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asian/2009, editor = {Anupam Datta}, title = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4}, doi = {10.1007/978-3-642-10622-4}, isbn = {978-3-642-10621-7}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/asian/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cade/2009, editor = {Renate A. Schmidt}, title = {Automated Deduction - CADE-22, 22nd International Conference on Automated Deduction, Montreal, Canada, August 2-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5663}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02959-2}, doi = {10.1007/978-3-642-02959-2}, isbn = {978-3-642-02958-5}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/cade/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/forte/2009, editor = {David Lee and Ant{\'{o}}nia Lopes and Arnd Poetzsch{-}Heffter}, title = {Formal Techniques for Distributed Systems, Joint 11th {IFIP} {WG} 6.1 International Conference {FMOODS} 2009 and 29th {IFIP} {WG} 6.1 International Conference {FORTE} 2009, Lisboa, Portugal, June 9-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5522}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02138-1}, doi = {10.1007/978-3-642-02138-1}, isbn = {978-3-642-02137-4}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/forte/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fsttcs/2009, editor = {Ravi Kannan and K. Narayan Kumar}, title = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2009, December 15-17, 2009, {IIT} Kanpur, India}, series = {LIPIcs}, volume = {4}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2009}, isbn = {978-3-939897-13-2}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cade/2008, editor = {Alessandro Armando and Peter Baumgartner and Gilles Dowek}, title = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008, Sydney, Australia, August 12-15, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5195}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71070-7}, doi = {10.1007/978-3-540-71070-7}, isbn = {978-3-540-71069-1}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/cade/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2008, title = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4556666/proceeding}, isbn = {978-0-7695-3182-3}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/lpar/2008, editor = {Iliano Cervesato and Helmut Veith and Andrei Voronkov}, title = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, {LPAR} 2008, Doha, Qatar, November 22-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5330}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89439-1}, doi = {10.1007/978-3-540-89439-1}, isbn = {978-3-540-89438-4}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/lpar/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2007, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9}, doi = {10.1007/978-3-540-74835-9}, isbn = {978-3-540-74834-2}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fsttcs/2007, editor = {Vikraman Arvind and Sanjiva Prasad}, title = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4855}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77050-3}, doi = {10.1007/978-3-540-77050-3}, isbn = {978-3-540-77049-7}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tgc/2007, editor = {Gilles Barthe and C{\'{e}}dric Fournet}, title = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4912}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78663-4}, doi = {10.1007/978-3-540-78663-4}, isbn = {978-3-540-78662-7}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/tgc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2006, title = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/10965/proceeding}, isbn = {0-7695-2615-2}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fsttcs/2006, editor = {S. Arun{-}Kumar and Naveen Garg}, title = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4337}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11944836}, doi = {10.1007/11944836}, isbn = {3-540-49994-6}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esop/2005, editor = {Shmuel Sagiv}, title = {Programming Languages and Systems, 14th European Symposium on Programming, {ESOP} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3444}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b107380}, doi = {10.1007/B107380}, isbn = {3-540-25435-8}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/esop/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2005, editor = {Andrew S. Patrick and Moti Yung}, title = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137875}, doi = {10.1007/B137875}, isbn = {3-540-26656-9}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/fc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2005, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468}, doi = {10.1007/11523468}, isbn = {3-540-27580-0}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2004, title = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://ieeexplore.ieee.org/xpl/conhome/9168/proceeding}, isbn = {0-7695-2169-X}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secco/2004, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, publisher = {Elsevier}, year = {2005}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/128/issue/5}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/secco/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2003, editor = {Jong In Lim and Dong Hoon Lee}, title = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b96249}, doi = {10.1007/B96249}, isbn = {3-540-21376-7}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2002, title = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://ieeexplore.ieee.org/xpl/conhome/7957/proceeding}, isbn = {0-7695-1689-0}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2002, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36552-4}, doi = {10.1007/3-540-36552-4}, isbn = {3-540-00716-4}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/concur/2001, editor = {Kim Guldstrand Larsen and Mogens Nielsen}, title = {{CONCUR} 2001 - Concurrency Theory, 12th International Conference, Aalborg, Denmark, August 20-25, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2154}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44685-0}, doi = {10.1007/3-540-44685-0}, isbn = {3-540-42497-0}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/concur/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2001, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3}, doi = {10.1007/3-540-45311-3}, isbn = {3-540-43010-5}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2001, editor = {George I. Davida and Yair Frankel}, title = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X}, doi = {10.1007/3-540-45439-X}, isbn = {3-540-42662-0}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/isw/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2000, editor = {Dongho Won}, title = {Information Security and Cryptology - {ICISC} 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2015}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45247-8}, doi = {10.1007/3-540-45247-8}, isbn = {3-540-41782-6}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2000, editor = {Sihan Qing and Jan H. P. Eloff}, title = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, publisher = {Kluwer}, year = {2000}, isbn = {0-7923-7914-4}, timestamp = {Thu, 10 Oct 2024 16:48:44 +0200}, biburl = {https://dblp.org/rec/conf/sec/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.