Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Author="Kremer, Steve"
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Transforming password protocols to compose
Céline Chevalier
,
Stéphanie Delaune
,
Steve Kremer
Leibniz International Proceedings in Informatics (LIPIcs)
13
, 2011, pp. 204-216
Computationally sound implementations of equational theories against passive adversaries
Mathieu Baudet
,
Véronique Cortier
,
Steve Kremer
Information and Computation
207
(4), 2009, pp. 496-520
Simulation based security in the applied pi calculus
Stéphanie Delaune
,
Steve Kremer
,
Olivier Pereira
Leibniz International Proceedings in Informatics (LIPIcs)
4
, 2009, pp. 169-180
Symbolic bisimulation for the applied pi calculus
Stéphanie Delaune
,
Steve Kremer
,
Mark Ryan
Lecture Notes in Computer Science
4855
, 2007, pp. 133-145
Juggling with pattern matching
Jean Cardinal
,
Steve Kremer
,
Stefan Langerman
Theory of Computing Systems
39
(3), 2006, pp. 425-437
Computationally sound symbolic secrecy in the presence of hash functions
Véronique Cortier
,
Steve Kremer
,
Ralf Küsters
,
Bogdan Warinschi
Lecture Notes in Computer Science
4337
, 2006, pp. 176-187
Computationally sound implementations of equational theories against passive adversaries
Mathieu Baudet
,
Véronique Cortier
,
Steve Kremer
Lecture Notes in Computer Science
3580
, 2005, pp. 652-663