2009 |
22 | EE | Véronique Cortier,
Stéphanie Delaune:
Safely composing security protocols.
Formal Methods in System Design 34(1): 1-36 (2009) |
2008 |
21 | EE | Stéphanie Delaune,
Steve Kremer,
Mark Ryan:
Composition of Password-Based Protocols.
CSF 2008: 239-251 |
20 | EE | Stéphanie Delaune,
Steve Kremer,
Graham Steel:
Formal Analysis of PKCS#11.
CSF 2008: 331-344 |
19 | EE | Myrto Arapinis,
Stéphanie Delaune,
Steve Kremer:
From One Session to Many: Dynamic Tags for Security Protocols.
LPAR 2008: 128-142 |
18 | EE | Stéphanie Delaune,
Pascal Lafourcade,
Denis Lugiez,
Ralf Treinen:
Symbolic protocol analysis for monoidal equational theories.
Inf. Comput. 206(2-4): 312-351 (2008) |
2007 |
17 | EE | Véronique Cortier,
Stéphanie Delaune,
Graham Steel:
A Formal Theory of Key Conjuring.
CSF 2007: 79-96 |
16 | EE | Stéphanie Delaune,
Steve Kremer,
Mark Ryan:
Symbolic Bisimulation for the Applied Pi Calculus.
FSTTCS 2007: 133-145 |
15 | EE | Véronique Cortier,
Jérémie Delaitre,
Stéphanie Delaune:
Safely Composing Security Protocols.
FSTTCS 2007: 352-363 |
14 | EE | Mathilde Arnaud,
Véronique Cortier,
Stéphanie Delaune:
Combining Algorithms for Deciding Knowledge in Security Protocols.
FroCos 2007: 103-117 |
13 | EE | Véronique Cortier,
Stéphanie Delaune:
Deciding Knowledge in Security Protocols for Monoidal Equational Theories.
LPAR 2007: 196-210 |
12 | EE | Stéphanie Delaune,
Hai Lin,
Christopher Lynch:
Protocol Verification Via Rigid/Flexible Resolution.
LPAR 2007: 242-256 |
11 | EE | Sergiu Bursuc,
Hubert Comon-Lundh,
Stéphanie Delaune:
Deducibility Constraints, Equational Theory and Electronic Money.
Rewriting, Computation and Proof 2007: 196-212 |
10 | EE | Sergiu Bursuc,
Hubert Comon-Lundh,
Stéphanie Delaune:
Associative-Commutative Deducibility Constraints.
STACS 2007: 634-645 |
2006 |
9 | EE | Stéphanie Delaune,
Steve Kremer,
Mark Ryan:
Coercion-Resistance and Receipt-Freeness in Electronic Voting.
CSFW 2006: 28-42 |
8 | EE | Stéphanie Delaune,
Pascal Lafourcade,
Denis Lugiez,
Ralf Treinen:
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or.
ICALP (2) 2006: 132-143 |
7 | EE | Stéphanie Delaune:
Easy intruder deduction problems with homomorphisms.
Inf. Process. Lett. 97(6): 213-218 (2006) |
6 | EE | Stéphanie Delaune,
Florent Jacquemard:
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks.
J. Autom. Reasoning 36(1-2): 85-124 (2006) |
5 | EE | Véronique Cortier,
Stéphanie Delaune,
Pascal Lafourcade:
A survey of algebraic properties used in cryptographic protocols.
Journal of Computer Security 14(1): 1-43 (2006) |
4 | EE | Stéphanie Delaune:
An undecidability result for AGh.
Theor. Comput. Sci. 368(1-2): 161-167 (2006) |
2005 |
3 | EE | Hubert Comon-Lundh,
Stéphanie Delaune:
The Finite Variant Property: How to Get Rid of Some Algebraic Properties.
RTA 2005: 294-307 |
2004 |
2 | EE | Stéphanie Delaune,
Florent Jacquemard:
A decision procedure for the verification of security protocols with explicit destructors.
ACM Conference on Computer and Communications Security 2004: 278-287 |
1 | EE | Stéphanie Delaune,
Florent Jacquemard:
A Theory of Dictionary Attacks and its Complexity.
CSFW 2004: 2-15 |