Stéphanie Delaune
Stéphanie Delaune
Univ Rennes, CNRS, IRISA
Verifierad e-postadress på irisa.fr - Startsida
Citeras av
Citeras av
Verifying Privacy-type Properties of Electronic Voting Protocols
S Delaune, S Kremer, M Ryan
Journal of Computer Security, 2008
A survey of algebraic properties used in cryptographic protocols
V Cortier, S Delaune, P Lafourcade
Journal of Computer Security 14 (1), 1-43, 2006
Coercion-resistance and receipt-freeness in electronic voting
S Delaune, S Kremer, M Ryan
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006
The finite variant property: How to get rid of some algebraic properties
H Comon-Lundh, S Delaune
Term Rewriting and Applications: 16th International Conference, RTA 2005 …, 2005
A method for proving observational equivalence
V Cortier, S Delaune
2009 22nd IEEE Computer Security Foundations Symposium, 266-276, 2009
Trace equivalence decision: Negative tests and non-determinism
V Cheval, H Comon-Lundh, S Delaune
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Automatic verification of privacy properties in the applied pi calculus
S Delaune, M Ryan, B Smyth
Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST …, 2008
Safely composing security protocols
V Cortier, S Delaune
Formal Methods in System Design 34, 1-36, 2009
Formal analysis of protocols based on TPM state registers
S Delaune, S Kremer, MD Ryan, G Steel
2011 IEEE 24th Computer Security Foundations Symposium, 66-80, 2011
Formal analysis of PKCS# 11
S Delaune, S Kremer, G Steel
2008 21st IEEE Computer Security Foundations Symposium, 331-344, 2008
Deciding equivalence-based properties using constraint solving
V Cheval, V Cortier, S Delaune
Theoretical Computer Science 492, 1-39, 2013
Computing knowledge in security protocols under convergent equational theories
Ş Ciobâcă, S Delaune, S Kremer
Journal of Automated Reasoning 48 (2), 219-262, 2012
YAPA: A generic tool for computing intruder knowledge
M Baudet, V Cortier, S Delaune
ACM Transactions on Computational Logic (TOCL) 14 (1), 1-32, 2013
A formal analysis of authentication in the TPM
S Delaune, S Kremer, MD Ryan, G Steel
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster.
S Delaune, S Kremer, M Ryan
Towards trustworthy elections 6000, 289-309, 2010
A theory of dictionary attacks and its complexity
S Delaune, F Jacquemard
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2-15, 2004
Formal analysis of privacy for vehicular mix-zones
M Dahl, S Delaune, G Steel
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
Formal security analysis of PKCS# 11 and proprietary extensions
S Delaune, S Kremer, G Steel
Journal of Computer Security 18 (6), 1211-1245, 2010
Epistemic logic for the applied pi calculus
R Chadha, S Delaune, S Kremer
Formal Techniques for Distributed Systems: Joint 11th IFIP WG 6.1 …, 2009
Partial order reduction for security protocols
D Baelde, S Delaune, L Hirschi
arXiv preprint arXiv:1504.04768, 2015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20