Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Eléments de l'association

Franche-Comté662
Steve Kremer26
Franche-Comté Sauf Steve Kremer" 645
Steve Kremer Sauf Franche-Comté" 9
Franche-Comté Et Steve Kremer 17
Franche-Comté Ou Steve Kremer 671
Corpus24195
\n\n\n\n \n

List of bibliographic references

Number of relevant bibliographic references: 17.
Ident.Authors (with country if any)Title
000126 Rohit Chadha [États-Unis] ; Vincent Cheval [France] ; Tefan Ciobâc [Roumanie, France] ; Steve Kremer [France]Automated verification of equivalence properties of cryptographic protocols
000590 Véronique Cortier [France] ; Fabienne Eigner [Allemagne] ; Steve Kremer [France] ; Matteo Maffei [Allemagne] ; Cyrille Wiedling [Belgique]Type-Based Verification of Electronic Voting Protocols
000951 Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
000A95 Myrto Arapinis [Royaume-Uni] ; Stéphanie Delaune [France] ; Steve Kremer [France]Dynamic Tags for Security Protocols
000B57 Steve Kremer [France] ; Robert Künnemann [France]Automated Analysis of Security Protocols with Global State
000C53 Steve Kremer [France] ; Robert Künnemann [Allemagne]Automated analysis of security protocols with global state
000D42 Martin Abadi [États-Unis] ; Steve Kremer [France]Principles of Security and Trust
001278 Myrto Arapinis [Royaume-Uni] ; Véronique Cortier [France] ; Steve Kremer [France] ; Mark D. Ryan [Royaume-Uni]Practical Everlasting Privacy
001378 Céline Chevalier [France] ; Stéphanie Delaune [France] ; Steve Kremer [France] ; Mark D. Ryan [Royaume-Uni]Composition of Password-based Protocols
001A52 Stéphanie Delaune [France] ; Steve Kremer [France] ; Daniel Pasaila [Canada]Security protocols, constraint systems, and group theories
001B76 Steve Kremer [France] ; Robert Kunnemann [France] ; Graham Steel [France]Universally Composable Key-Management
001C66 Steve Kremer [France] ; Antoine Mercier [France] ; Ralf Treinen [France]Reducing Equational Theories for the Decision of Static Equivalence
001C97 Rohit Chadha [États-Unis] ; Vincent Cheval [Royaume-Uni] ; Stefan Ciobaca [Roumanie] ; Steve Kremer [France]Automated Verification of Equivalence Properties of Cryptographic Protocols
002848 Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols
003D12 Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni]A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
004F30 Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [France]Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
005977 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally Sound Implementations of Equational Theories against Passive Adversaries

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022