Stéphanie Delaune
Stéphanie Delaune
Univ Rennes, CNRS, IRISA
Verified email at - Homepage
Cited by
Cited by
Verifying Privacy-type Properties of Electronic Voting Protocols
S Delaune, S Kremer, M Ryan
Journal of Computer Security, 2008
A survey of algebraic properties used in cryptographic protocols
V Cortier, S Delaune, P Lafourcade
Journal of Computer Security 14 (1), 1-43, 2006
The finite variant property: How to get rid of some algebraic properties
H Comon-Lundh, S Delaune
International Conference on Rewriting Techniques and Applications, 294-307, 2005
Coercion-resistance and receipt-freeness in electronic voting
S Delaune, S Kremer, M Ryan
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-42, 2006
A method for proving observational equivalence
V Cortier, S Delaune
2009 22nd IEEE Computer Security Foundations Symposium, 266-276, 2009
Automatic verification of privacy properties in the applied pi calculus
S Delaune, M Ryan, B Smyth
IFIP International Conference on Trust Management, 263-278, 2008
Trace equivalence decision: Negative tests and non-determinism
V Cheval, H Comon-Lundh, S Delaune
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Safely composing security protocols
V Cortier, S Delaune
Formal Methods in System Design 34, 1-36, 2009
Deciding equivalence-based properties using constraint solving
V Cheval, V Cortier, S Delaune
Theoretical Computer Science 492, 1-39, 2013
Formal analysis of protocols based on TPM state registers
S Delaune, S Kremer, MD Ryan, G Steel
2011 IEEE 24th Computer Security Foundations Symposium, 66-80, 2011
Formal analysis of PKCS# 11
S Delaune, S Kremer, G Steel
2008 21st IEEE Computer Security Foundations Symposium, 331-344, 2008
YAPA: A generic tool for computing intruder knowledge
M Baudet, V Cortier, S Delaune
ACM Transactions On Computational Logic (TOCL) 14 (1), 1-32, 2013
Computing knowledge in security protocols under convergent equational theories
Ş Ciobâcă, S Delaune, S Kremer
Journal of Automated Reasoning 48 (2), 219-262, 2012
A formal analysis of authentication in the TPM
S Delaune, S Kremer, MD Ryan, G Steel
International Workshop on Formal Aspects in Security and Trust, 111-125, 2010
Verifying privacy-type properties of electronic voting protocols: A taster
S Delaune, S Kremer, M Ryan
Towards Trustworthy Elections: New Directions in Electronic Voting, 289-309, 2010
A theory of dictionary attacks and its complexity
S Delaune, F Jacquemard
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 2-15, 2004
A method for verifying privacy-type properties: the unbounded case
L Hirschi, D Baelde, S Delaune
2016 IEEE Symposium on Security and Privacy (SP), 564-581, 2016
Formal analysis of privacy for vehicular mix-zones
M Dahl, S Delaune, G Steel
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
Formal security analysis of PKCS# 11 and proprietary extensions
S Delaune, S Kremer, G Steel
Journal of Computer Security 18 (6), 1211-1245, 2010
Modeling and verifying ad hoc routing protocols
M Arnaud, V Cortier, S Delaune
Information and Computation 238, 30-67, 2014
The system can't perform the operation now. Try again later.
Articles 1–20