Serveur d'exploration sur la recherche en informatique en Lorraine - Corpus (Hal)

Index « Auteurs » - entrée « Steve Kremer »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
Stephen Wismath < Steve Kremer < Steve Robbins  Facettes :

List of bibliographic references

Number of relevant bibliographic references: 24.
[0-20] [0 - 20][0 - 24][20-23][20-40]
Ident.Authors (with country if any)Title
000510 (2011) Véronique Cortier ; Steve Kremer ; Bogdan WarinschiA Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.
000511 (2009) Véronique Cortier ; Steve Kremer ; Bogdan WarinschiA Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
001052 (2014-05-18) Steve Kremer ; Robert KünnemannAutomated Analysis of Security Protocols with Global State
001078 (2012) Rohit Chadha ; Vincent Cheval ; Stefan Ciobaca ; Steve KremerAutomated Verification of Equivalence Properties of Cryptographic Protocols
001082 (2014-03-05) Steve Kremer ; Robert KünnemannAutomated analysis of security protocols with global state
001090 (2012-03-26) Rohit Chadha ; Stefan Ciobaca ; Steve KremerAutomated verification of equivalence properties of cryptographic protocols
001091 (2016) Rohit Chadha ; Vincent Cheval ; Tefan Ciobâc ; Steve KremerAutomated verification of equivalence properties of cryptographic protocols
001719 (2013) Céline Chevalier ; Stéphanie Delaune ; Steve Kremer ; Mark D. RyanComposition of Password-based Protocols
001747 (2009) Mathieu Baudet ; Véronique Cortier ; Steve KremerComputationally Sound Implementations of Equational Theories against Passive Adversaries
001748 (2005-07) Mathieu Baudet ; Véronique Cortier ; Steve KremerComputationally Sound Implementations of Equational Theories against Passive Adversaries
001749 (2006-12) Véronique Cortier ; Steve Kremer ; Ralf Kuesters ; Bogdan WarinschiComputationally Sound Symbolic Secrecy in the Presence of Hash Functions
001788 (2012) Stefan Ciobaca ; Stéphanie Delaune ; Steve KremerComputing knowledge in security protocols under convergent equational theories
001D68 (2014-06-19) Myrto Arapinis ; Stéphanie Delaune ; Steve KremerDynamic Tags for Security Protocols
002378 (2014-09-13) Véronique Cortier ; Steve KremerFormal Models and Techniques for Analyzing Security Protocols: A Tutorial
002379 (2011) Véronique Cortier ; Steve KremerFormal Models and Techniques for Analyzing Security Protocols
003C40 (2013-03-16) Myrto Arapinis ; Véronique Cortier ; Steve Kremer ; Mark D. RyanPractical Everlasting Privacy
003C87 (2014) Martin Abadi ; Steve KremerPrinciples of Security and Trust
004032 (2012) Steve Kremer ; Antoine Mercier ; Ralf TreinenReducing Equational Theories for the Decision of Static Equivalence
004432 (2012-06-26) Stéphanie Delaune ; Steve Kremer ; Daniel PasailaSecurity protocols, constraint systems, and group theories
004D54 (2016-03) Steve Kremer ; Peter R NneTo Du or not to Du: A Security Analysis of Du-Vote
004F49 (2011-12-12) Céline Chevalier ; Stéphanie Delaune ; Steve KremerTransforming Password Protocols to Compose

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Hal/Corpus
HfdIndexSelect -h $EXPLOR_AREA/Data/Hal/Corpus/Author.i -k "Steve Kremer" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Hal/Corpus/Author.i  \
                -Sk "Steve Kremer" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Hal/Corpus/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Hal
   |étape=   Corpus
   |type=    indexItem
   |index=    Author.i
   |clé=    Steve Kremer
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022