Items where Author is "Kremer, Steve"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 10.

Cheval, Vincent and Cremers, Cas and Dax, Alexander and Hirschi, Lucca and Jacomme, Charlie and Kremer, Steve
(2023) Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
In: USENIX 2023.
Conference: USENIX-Security Usenix Security Symposium

Cheval, Vincent and Jacomme, Charlie and Kremer, Steve and Künnemann, Robert
(2022) SAPIC+: protocol verifiers of the world, unite!
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017) A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Kremer, Steve and Künnemann, Robert
(2016) Automated analysis of security protocols with global state.
Journal of Computer Security.

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
In: Proceedings of the 4th International Conference on Principles of Security and Trust (POST).

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
UNSPECIFIED
.

Kremer, Steve and Künnemann, Robert
(2014) Automated Analysis of Security Protocols with Global State.
In: Proc. 35th IEEE Symposium on Security and Privacy (S&P'14).

Kremer, Steve and Künnemann, Robert and Steel, Graham
(2013) Universally Composable Key-Management.
In: European Symposium on Research in Computer Security.

Delaune, Stephanie and Kremer, Steve and Ryan, Mark D. and Steel, Graham
(2011) Formal analysis of protocols based on TPM state registers.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Kremer, Steve and Steel, Graham and Warinschi, Bogdan
(2011) Security for Key Management Interfaces.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

This list was generated on Wed Nov 13 16:01:12 2024 CET.