Steve Kremer

From MaRDI portal
Person:437023

Available identifiers

zbMath Open kremer.steveMaRDI QIDQ437023

List of research outcomes

PublicationDate of PublicationType
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields2022-12-08Paper
When are three voters enough for privacy properties?2022-08-19Paper
The Hitchhiker's guide to decidability and complexity of equivalence properties in security protocols2021-07-08Paper
Universal equivalence and majority of probabilistic programs over finite fields2021-01-21Paper
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols2020-08-03Paper
On Communication Models When Verifying Equivalence Properties2020-08-03Paper
Automated Verification of Equivalence Properties of Cryptographic Protocols2017-07-13Paper
Composition of password-based protocols2014-06-30Paper
Dynamic Tags for Security Protocols2014-06-23Paper
Practical Everlasting Privacy2013-08-06Paper
https://portal.mardi4nfdi.de/entity/Q29201242012-10-24Paper
Security Protocols, Constraint Systems, and Group Theories2012-09-05Paper
https://portal.mardi4nfdi.de/entity/Q29116252012-08-31Paper
Reducing equational theories for the decision of static equivalence2012-07-17Paper
Computing knowledge in security protocols under convergent equational theories2012-07-17Paper
Automated Verification of Equivalence Properties of Cryptographic Protocols2012-06-22Paper
A survey of symbolic methods in computational analysis of cryptographic systems2011-06-03Paper
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster2010-06-17Paper
Reducing Equational Theories for the Decision of Static Equivalence2010-01-14Paper
Computing Knowledge in Security Protocols under Convergent Equational Theories2009-07-28Paper
Computationally sound implementations of equational theories against passive adversaries2009-04-16Paper
From One Session to Many: Dynamic Tags for Security Protocols2009-01-27Paper
Proving Group Protocols Secure Against Eavesdroppers2008-11-27Paper
Symbolic Bisimulation for the Applied Pi Calculus2008-04-24Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions2008-04-17Paper
Juggling with pattern matching2007-02-13Paper
Formal analysis of multiparty contract signing2007-01-30Paper
Automata, Languages and Programming2006-01-10Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Programming Languages and Systems2005-09-13Paper
https://portal.mardi4nfdi.de/entity/Q44484152004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44133432003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q47912732003-02-06Paper
https://portal.mardi4nfdi.de/entity/Q47885712003-01-29Paper
https://portal.mardi4nfdi.de/entity/Q27628942002-01-13Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Steve Kremer