Stéphanie Delaune
Stéphanie Delaune
Univ Rennes, CNRS, IRISA
Verifierad e-postadress på irisa.fr - Startsida
TitelCiteras avÅr
Verifying Privacy-type Properties of Electronic Voting Protocols
S Delaune, S Kremer, M Ryan
Journal of Computer Security, 2008
3352008
A survey of algebraic properties used in cryptographic protocols
V Cortier, S Delaune, P Lafourcade
Journal of Computer Security 14 (1), 1-43, 2006
2082006
Coercion-resistance and receipt-freeness in electronic voting
S Delaune, S Kremer, M Ryan
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006
1842006
The finite variant property: How to get rid of some algebraic properties
H Comon-Lundh, S Delaune
International Conference on Rewriting Techniques and Applications, 294-307, 2005
1672005
Safely composing security protocols
V Cortier, S Delaune
Formal Methods in System Design 34 (1), 1-36, 2009
812009
Trace equivalence decision: Negative tests and non-determinism
V Cheval, H Comon-Lundh, S Delaune
Proceedings of the 18th ACM conference on Computer and communications …, 2011
782011
A method for proving observational equivalence
V Cortier, S Delaune
2009 22nd IEEE Computer Security Foundations Symposium, 266-276, 2009
762009
Automatic verification of privacy properties in the applied pi calculus
S Delaune, M Ryan, B Smyth
IFIP International Conference on Trust Management, 263-278, 2008
762008
Formal analysis of protocols based on TPM state registers
S Delaune, S Kremer, MD Ryan, G Steel
2011 IEEE 24th Computer Security Foundations Symposium, 66-80, 2011
662011
Computing knowledge in security protocols under convergent equational theories
Ş Ciobâcă, S Delaune, S Kremer
International Conference on Automated Deduction, 355-370, 2009
662009
Formal analysis of PKCS# 11
S Delaune, S Kremer, G Steel
2008 21st IEEE Computer Security Foundations Symposium, 331-344, 2008
622008
Deciding equivalence-based properties using constraint solving
V Cheval, V Cortier, S Delaune
Theoretical Computer Science 492, 1-39, 2013
552013
A formal analysis of authentication in the TPM
S Delaune, S Kremer, MD Ryan, G Steel
International Workshop on Formal Aspects in Security and Trust, 111-125, 2010
512010
Verifying privacy-type properties of electronic voting protocols: A taster
S Delaune, S Kremer, M Ryan
Towards trustworthy elections, 289-309, 2010
502010
A decision procedure for the verification of security protocols with explicit destructors
S Delaune, F Jacquemard
Proceedings of the 11th ACM conference on Computer and communications …, 2004
502004
Formal analysis of privacy for vehicular mix-zones
M Dahl, S Delaune, G Steel
European Symposium on Research in Computer Security, 55-70, 2010
492010
YAPA: A generic tool for computing intruder knowledge
M Baudet, V Cortier, S Delaune
International Conference on Rewriting Techniques and Applications, 148-163, 2009
462009
Easy intruder deduction problems with homomorphisms
S Delaune
Information Processing Letters 97 (6), 213-218, 2006
462006
A theory of dictionary attacks and its complexity
S Delaune, F Jacquemard
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2-15, 2004
462004
Epistemic logic for the applied pi calculus
R Chadha, S Delaune, S Kremer
Formal Techniques for Distributed Systems, 182-197, 2009
442009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20