Steve Kremer

From MaRDI portal
Person:437023

Available identifiers

zbMath Open kremer.steveMaRDI QIDQ437023

List of research outcomes





PublicationDate of PublicationType
DeepSec: deciding equivalence properties for security protocols -- improved theory and practice2024-07-03Paper
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields2022-12-08Paper
When are three voters enough for privacy properties?2022-08-19Paper
The Hitchhiker's guide to decidability and complexity of equivalence properties in security protocols2021-07-08Paper
Universal equivalence and majority of probabilistic programs over finite fields2021-01-21Paper
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols2020-08-03Paper
On Communication Models When Verifying Equivalence Properties2020-08-03Paper
Automated Verification of Equivalence Properties of Cryptographic Protocols2017-07-13Paper
Composition of password-based protocols2014-06-30Paper
Dynamic Tags for Security Protocols2014-06-23Paper
Practical Everlasting Privacy2013-08-06Paper
Simulation based security in the applied pi calculus2012-10-24Paper
Security Protocols, Constraint Systems, and Group Theories2012-09-05Paper
Transforming password protocols to compose2012-08-31Paper
Reducing equational theories for the decision of static equivalence2012-07-17Paper
Computing knowledge in security protocols under convergent equational theories2012-07-17Paper
Automated Verification of Equivalence Properties of Cryptographic Protocols2012-06-22Paper
A survey of symbolic methods in computational analysis of cryptographic systems2011-06-03Paper
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster2010-06-17Paper
Reducing equational theories for the decision of static equivalence2010-01-14Paper
Computing Knowledge in Security Protocols under Convergent Equational Theories2009-07-28Paper
Computationally sound implementations of equational theories against passive adversaries2009-04-16Paper
From One Session to Many: Dynamic Tags for Security Protocols2009-01-27Paper
Proving Group Protocols Secure Against Eavesdroppers2008-11-27Paper
Symbolic Bisimulation for the Applied Pi Calculus2008-04-24Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions2008-04-17Paper
Juggling with pattern matching2007-02-13Paper
Formal analysis of multiparty contract signing2007-01-30Paper
Automata, Languages and Programming2006-01-10Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Programming Languages and Systems2005-09-13Paper
https://portal.mardi4nfdi.de/entity/Q44484152004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44133432003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q47912732003-02-06Paper
https://portal.mardi4nfdi.de/entity/Q47885712003-01-29Paper
https://portal.mardi4nfdi.de/entity/Q27628942002-01-13Paper

Research outcomes over time

This page was built for person: Steve Kremer