Follow
Steve Kremer
Title
Cited by
Cited by
Year
Verifying privacy-type properties of electronic voting protocols
S Delaune, S Kremer, M Ryan
Journal of Computer Security 17 (4), 435-487, 2009
4412009
An intensive survey of fair non-repudiation protocols
S Kremer, O Markowitch, J Zhou
Computer communications 25 (17), 1606-1621, 2002
4262002
An efficient strong designated verifier signature scheme
S Saeednia, S Kremer, O Markowitch
Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004
3822004
Analysis of an electronic voting protocol in the applied pi calculus
S Kremer, M Ryan
European Symposium on Programming, 186-200, 2005
3422005
Election verifiability in electronic voting protocols
S Kremer, M Ryan, B Smyth
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
2622010
Coercion-resistance and receipt-freeness in electronic voting
S Delaune, S Kremer, M Ryan
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006
2342006
A game-based verification of non-repudiation and fair exchange protocols
S Kremer, JF Raskin
Journal of Computer Security 11 (3), 399-430, 2003
2152003
Automated verification of equivalence properties of cryptographic protocols
R Chadha, V Cheval, Ş Ciobâcă, S Kremer
ACM Transactions on Computational Logic (TOCL) 17 (4), 23, 2016
1992016
Automated verification of equivalence properties of cryptographic protocols
R Chadha, Ş Ciobâcă, S Kremer
European Symposium on Programming, 108-127, 2012
199*2012
A survey of symbolic methods in computational analysis of cryptographic systems
V Cortier, S Kremer, B Warinschi
Journal of Automated Reasoning 46, 225-259, 2011
1492011
Game analysis of abuse-free contract signing
S Kremer, JF Raskin
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 206-220, 2002
1162002
Automated analysis of security protocols with global state
S Kremer, R Künnemann
Journal of Computer Security 24 (5), 583-616, 2016
1022016
Formal analysis of multiparty contract signing
R Chadha, S Kremer, A Scedrov
Journal of Automated Reasoning 36 (1), 39-83, 2006
982006
An optimistic non-repudiation protocol with transparent trusted third party
O Markowitch, S Kremer
International Conference on Information Security, 363-378, 2001
962001
DEEPSEC: deciding equivalence properties in security protocols theory and practice
V Cheval, S Kremer, I Rakotonirina
2018 IEEE symposium on security and privacy (SP), 529-546, 2018
932018
An extensive formal analysis of multi-factor authentication protocols
C Jacomme, S Kremer
ACM Transactions on Privacy and Security (TOPS) 24 (2), 1-34, 2021
882021
Computationally sound implementations of equational theories against passive adversaries
M Baudet, V Cortier, S Kremer
International Colloquium on Automata, Languages, and Programming, 652-663, 2005
822005
Optimistic non-repudiable information exchange
S Kremer, O Markowitch
Symposium on Information Theory in the Benelux, 139-146, 2000
812000
A multi-party optimistic non-repudiation protocol
O Markowitch, S Kremer
International Conference on Information Security and Cryptology, 109-122, 2000
802000
Formal analysis of PKCS# 11
S Delaune, S Kremer, G Steel
2008 21st IEEE Computer Security Foundations Symposium, 331-344, 2008
792008
The system can't perform the operation now. Try again later.
Articles 1–20