Steve Kremer
Cited by
Cited by
Verifying privacy-type properties of electronic voting protocols
S Delaune, S Kremer, M Ryan
Journal of Computer Security 17 (4), 435-487, 2009
An intensive survey of fair non-repudiation protocols
S Kremer, O Markowitch, J Zhou
Computer communications 25 (17), 1606-1621, 2002
An efficient strong designated verifier signature scheme
S Saeednia, S Kremer, O Markowitch
Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004
Analysis of an electronic voting protocol in the applied pi calculus
S Kremer, M Ryan
European Symposium on Programming, 186-200, 2005
Election verifiability in electronic voting protocols
S Kremer, M Ryan, B Smyth
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
Coercion-resistance and receipt-freeness in electronic voting
S Delaune, S Kremer, M Ryan
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006
A game-based verification of non-repudiation and fair exchange protocols
S Kremer, JF Raskin
Journal of Computer Security 11 (3), 399-430, 2003
Automated verification of equivalence properties of cryptographic protocols
R Chadha, V Cheval, Ş Ciobâcă, S Kremer
ACM Transactions on Computational Logic (TOCL) 17 (4), 23, 2016
Automated verification of equivalence properties of cryptographic protocols
R Chadha, Ş Ciobâcă, S Kremer
European Symposium on Programming, 108-127, 2012
A survey of symbolic methods in computational analysis of cryptographic systems
V Cortier, S Kremer, B Warinschi
Journal of Automated Reasoning 46, 225-259, 2011
Game analysis of abuse-free contract signing
S Kremer, JF Raskin
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 206-220, 2002
Automated analysis of security protocols with global state
S Kremer, R Künnemann
Journal of Computer Security 24 (5), 583-616, 2016
Formal analysis of multiparty contract signing
R Chadha, S Kremer, A Scedrov
Journal of Automated Reasoning 36 (1), 39-83, 2006
An optimistic non-repudiation protocol with transparent trusted third party
O Markowitch, S Kremer
International Conference on Information Security, 363-378, 2001
DEEPSEC: deciding equivalence properties in security protocols theory and practice
V Cheval, S Kremer, I Rakotonirina
2018 IEEE symposium on security and privacy (SP), 529-546, 2018
Computationally sound implementations of equational theories against passive adversaries
M Baudet, V Cortier, S Kremer
International Colloquium on Automata, Languages, and Programming, 652-663, 2005
Optimistic non-repudiable information exchange
S Kremer, O Markowitch
Symposium on Information Theory in the Benelux, 139-146, 2000
A multi-party optimistic non-repudiation protocol
O Markowitch, S Kremer
International Conference on Information Security and Cryptology, 109-122, 2000
An extensive formal analysis of multi-factor authentication protocols
C Jacomme, S Kremer
ACM Transactions on Privacy and Security (TOPS) 24 (2), 1-34, 2021
Formal analysis of protocols based on TPM state registers
S Delaune, S Kremer, MD Ryan, G Steel
2011 IEEE 24th Computer Security Foundations Symposium, 66-80, 2011
The system can't perform the operation now. Try again later.
Articles 1–20