dblp.uni-trier.dewww.uni-trier.de

Stéphanie Delaune

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
22EEVéronique Cortier, Stéphanie Delaune: Safely composing security protocols. Formal Methods in System Design 34(1): 1-36 (2009)
2008
21EEStéphanie Delaune, Steve Kremer, Mark Ryan: Composition of Password-Based Protocols. CSF 2008: 239-251
20EEStéphanie Delaune, Steve Kremer, Graham Steel: Formal Analysis of PKCS#11. CSF 2008: 331-344
19EEMyrto Arapinis, Stéphanie Delaune, Steve Kremer: From One Session to Many: Dynamic Tags for Security Protocols. LPAR 2008: 128-142
18EEStéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen: Symbolic protocol analysis for monoidal equational theories. Inf. Comput. 206(2-4): 312-351 (2008)
2007
17EEVéronique Cortier, Stéphanie Delaune, Graham Steel: A Formal Theory of Key Conjuring. CSF 2007: 79-96
16EEStéphanie Delaune, Steve Kremer, Mark Ryan: Symbolic Bisimulation for the Applied Pi Calculus. FSTTCS 2007: 133-145
15EEVéronique Cortier, Jérémie Delaitre, Stéphanie Delaune: Safely Composing Security Protocols. FSTTCS 2007: 352-363
14EEMathilde Arnaud, Véronique Cortier, Stéphanie Delaune: Combining Algorithms for Deciding Knowledge in Security Protocols. FroCos 2007: 103-117
13EEVéronique Cortier, Stéphanie Delaune: Deciding Knowledge in Security Protocols for Monoidal Equational Theories. LPAR 2007: 196-210
12EEStéphanie Delaune, Hai Lin, Christopher Lynch: Protocol Verification Via Rigid/Flexible Resolution. LPAR 2007: 242-256
11EESergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune: Deducibility Constraints, Equational Theory and Electronic Money. Rewriting, Computation and Proof 2007: 196-212
10EESergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune: Associative-Commutative Deducibility Constraints. STACS 2007: 634-645
2006
9EEStéphanie Delaune, Steve Kremer, Mark Ryan: Coercion-Resistance and Receipt-Freeness in Electronic Voting. CSFW 2006: 28-42
8EEStéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen: Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. ICALP (2) 2006: 132-143
7EEStéphanie Delaune: Easy intruder deduction problems with homomorphisms. Inf. Process. Lett. 97(6): 213-218 (2006)
6EEStéphanie Delaune, Florent Jacquemard: Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. J. Autom. Reasoning 36(1-2): 85-124 (2006)
5EEVéronique Cortier, Stéphanie Delaune, Pascal Lafourcade: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1): 1-43 (2006)
4EEStéphanie Delaune: An undecidability result for AGh. Theor. Comput. Sci. 368(1-2): 161-167 (2006)
2005
3EEHubert Comon-Lundh, Stéphanie Delaune: The Finite Variant Property: How to Get Rid of Some Algebraic Properties. RTA 2005: 294-307
2004
2EEStéphanie Delaune, Florent Jacquemard: A decision procedure for the verification of security protocols with explicit destructors. ACM Conference on Computer and Communications Security 2004: 278-287
1EEStéphanie Delaune, Florent Jacquemard: A Theory of Dictionary Attacks and its Complexity. CSFW 2004: 2-15

Coauthor Index

1Myrto Arapinis [19]
2Mathilde Arnaud [14]
3Sergiu Bursuc [10] [11]
4Hubert Comon-Lundh (Hubert Comon) [3] [10] [11]
5Véronique Cortier [5] [13] [14] [15] [17] [22]
6Jérémie Delaitre [15]
7Florent Jacquemard [1] [2] [6]
8Steve Kremer [9] [16] [19] [20] [21]
9Pascal Lafourcade [5] [8] [18]
10Hai Lin [12]
11Denis Lugiez [8] [18]
12Christopher Lynch [12]
13Mark Ryan (Mark Dermot Ryan) [9] [16] [21]
14Graham Steel [17] [20]
15Ralf Treinen [8] [18]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)