Stéphanie Delaune
Orcid: 0000-0002-9744-8834Affiliations:
- ENS Cachan, Paris, France
According to our database1,
Stéphanie Delaune
authored at least 100 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
ACM Trans. Priv. Secur., 2022
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols.
J. Comput. Secur., 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties.
J. Autom. Reason., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 34th International Workshop on Unification, 2020
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
J. Comput. Secur., 2019
Proceedings of the Principles of Security and Trust - 8th International Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proceedings of the 3rd International Conference on Formal Structures for Computation and Deduction, 2018
Proceedings of the 38th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols.
J. Log. Algebraic Methods Program., 2017
Inf. Comput., 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016
2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 26th International Conference on Concurrency Theory, 2015
2014
Proceedings of the Trustworthy Global Computing - 9th International Symposium, 2014
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
Proceedings of the CONCUR 2014 - Concurrency Theory - 25th International Conference, 2014
2013
Theor. Comput. Sci., 2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
2012
Proceedings of the Software Safety and Security - Tools for Analysis and Verification, 2012
Decidability and Combination Results for Two Notions of Knowledge in Security Protocols.
J. Autom. Reason., 2012
J. Autom. Reason., 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the Automated Reasoning - 6th International Joint Conference, 2012
2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
J. Comput. Secur., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Automated Reasoning, 5th International Joint Conference, 2010
2009
J. Comput. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Formal Techniques for Distributed Systems, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
Proceedings of the Logic for Programming, 2008
Proceedings of the Trust Management II, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
2007
Proceedings of the STACS 2007, 2007
Proceedings of the Logic for Programming, 2007
Proceedings of the Logic for Programming, 2007
Proceedings of the FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 2007
Proceedings of the Frontiers of Combining Systems, 6th International Symposium, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the Rewriting, 2007
2006
Vérification des protocoles cryptographiques et propriétés algébriques. (Verification of cryptographic protocols with algebraic properties).
PhD thesis, 2006
J. Comput. Secur., 2006
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks.
J. Autom. Reason., 2006
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and <i>Exclusive Or</i>.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005
2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
A decision procedure for the verification of security protocols with explicit destructors.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004