Stéphanie Delaune

From MaRDI portal
Revision as of 10:46, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:391120

Available identifiers

zbMath Open delaune.stephanieMaRDI QIDQ391120

List of research outcomes

PublicationDate of PublicationType
New algorithm for exhausting optimal permutations for generalized Feistel networks2023-08-14Paper
One vote is enough for analysing privacy2023-07-21Paper
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols2022-12-22Paper
POR for security protocol equivalences. Beyond action-determinism2022-08-25Paper
Efficiently deciding equivalence for standard primitives and phases2022-08-25Paper
Checking trace equivalence: how to get rid of nonces?2022-08-19Paper
A Symbolic Framework to Analyse Physical Proximity in Security Protocols2022-07-21Paper
https://portal.mardi4nfdi.de/entity/Q49933302021-06-15Paper
A decidable class of security protocols for both reachability and equivalence properties2021-06-09Paper
Typing Messages for Free in Security Protocols2019-11-22Paper
Partial Order Reduction for Security Protocols2017-09-12Paper
A procedure for deciding symbolic equivalence between sets of constraint systems2017-08-08Paper
From Security Protocols to Pushdown Automata2017-07-12Paper
https://portal.mardi4nfdi.de/entity/Q52700902017-06-22Paper
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols2017-02-22Paper
YAPA2015-09-17Paper
Modeling and verifying ad hoc routing protocols2014-10-20Paper
Deducibility constraints and blind signatures2014-10-20Paper
Typing Messages for Free in Security Protocols: The Case of Equivalence Properties2014-09-15Paper
Composition of password-based protocols2014-06-30Paper
Dynamic Tags for Security Protocols2014-06-23Paper
Deciding equivalence-based properties using constraint solving2014-01-10Paper
From Security Protocols to Pushdown Automata2013-08-07Paper
Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks2013-08-06Paper
Simulation based security in the applied pi calculus2012-10-24Paper
Security Protocols, Constraint Systems, and Group Theories2012-09-05Paper
https://portal.mardi4nfdi.de/entity/Q29116252012-08-31Paper
Formal Analysis of Privacy for Anonymous Location Based Services2012-08-22Paper
Computing knowledge in security protocols under convergent equational theories2012-07-17Paper
Decidability and combination results for two notions of knowledge in security protocols2012-07-17Paper
Analysing Routing Protocols: Four Nodes Topologies Are Sufficient2012-06-29Paper
Deciding Security for Protocols with Recursive Tests2011-07-29Paper
Automating Security Analysis: Symbolic Equivalence of Constraint Systems2010-09-14Paper
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster2010-06-17Paper
Deducibility Constraints2010-01-14Paper
Easy intruder deduction problems with homomorphisms2009-12-18Paper
Computing Knowledge in Security Protocols under Convergent Equational Theories2009-07-28Paper
Safely composing security protocols2009-07-06Paper
YAPA: A Generic Tool for Computing Intruder Knowledge2009-06-30Paper
Deducibility Constraints, Equational Theory and Electronic Money2009-03-06Paper
From One Session to Many: Dynamic Tags for Security Protocols2009-01-27Paper
Combining Algorithms for Deciding Knowledge in Security Protocols2008-09-16Paper
Deciding Knowledge in Security Protocols for Monoidal Equational Theories2008-05-15Paper
Protocol Verification Via Rigid/Flexible Resolution2008-05-15Paper
Symbolic Bisimulation for the Applied Pi Calculus2008-04-24Paper
Safely Composing Security Protocols2008-04-24Paper
Symbolic protocol analysis for monoidal equational theories2008-04-16Paper
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or2007-09-11Paper
Associative-Commutative Deducibility Constraints2007-09-03Paper
Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks2007-01-30Paper
An undecidability result for AGh2007-01-22Paper
Term Rewriting and Applications2005-11-11Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Stéphanie Delaune