![]() | 2009 | |
---|---|---|
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Max Tuengerthal: Computational soundness for key exchange protocols with symmetric encryption. ACM Conference on Computer and Communications Security 2009: 91-100 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Tomasz Truderung: Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. CSF 2009: 157-171 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Max Tuengerthal: Universally Composable Symmetric Encryption. CSF 2009: 293-307 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Tomasz Truderung: An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. IEEE Symposium on Security and Privacy 2009: 251-266 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Tomasz Truderung, Andreas Vogt: Improving and Simplifying a Variant of Prêt à Voter. VOTE-ID 2009: 37-53 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Tomasz Truderung: An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols CoRR abs/0903.0802: (2009) |
2008 | ||
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Tomasz Truderung: Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. ACM Conference on Computer and Communications Security 2008: 129-138 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Max Tuengerthal: Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. CSF 2008: 270-284 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani: Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Trans. Comput. Log. 9(4): (2008) |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Tomasz Truderung: Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach CoRR abs/0808.0634: (2008) |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Pierpaolo Degano, Ralf Küsters, Luca Viganò, Steve Zdancewic: Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06). Inf. Comput. 206(2-4): 129 (2008) |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters: Conditional reactive simulatability. Int. J. Inf. Sec. 7(2): 155-169 (2008) |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan: On the Relationships between Notions of Simulation-Based Security. J. Cryptology 21(4): 492-546 (2008) |
2007 | ||
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Véronique Cortier, Ralf Küsters, Bogdan Warinschi: A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. ESORICS 2007: 422-437 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke: Selecting theories and nonce generation for recursive protocols. FMSE 2007: 61-70 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Backes, Markus Dürmuth, Ralf Küsters: On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. FSTTCS 2007: 108-120 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Detlef Kähler, Ralf Küsters, Tomasz Truderung: Infinite State AMC-Model Checking for Cryptographic Protocols. LICS 2007: 181-192 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Tomasz Truderung: On the Automatic Analysis of Recursive Security Protocols with XOR. STACS 2007: 646-657 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Thomas Wilke: Transducer-based analysis of cryptographic protocols. Inf. Comput. 205(12): 1741-1776 (2007) |
2006 | ||
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters: Simulation-Based Security with Inexhaustible Interactive Turing Machines. CSFW 2006: 309-320 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters: Conditional Reactive Simulatability. ESORICS 2006: 424-443 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi: Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. FSTTCS 2006: 176-187 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Detlef Kähler, Ralf Küsters, Thomas Wilke: A Dolev-Yao-Based Definition of Abuse-Free Protocols. ICALP (2) 2006: 95-106 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Max Tuengerthal, Ralf Küsters, Mathieu Turuani: Implementing a Unification Algorithm for Protocol Analysis with XOR CoRR abs/cs/0610014: (2006) |
2005 | ||
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Detlef Kähler, Ralf Küsters: Constraint Solving for Contract-Signing Protocols. CONCUR 2005: 233-247 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Detlef Kähler, Ralf Küsters, Thomas Wilke: Deciding Properties of Contract-Signing Protocols. STACS 2005: 158-169 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan: On the Relationships Between Notions of Simulation-Based Security. TCC 2005: 476-494 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani: Deciding the Security of Protocols with Commuting Public Key Encryption. Electr. Notes Theor. Comput. Sci. 125(1): 55-66 (2005) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters: On the decidability of cryptographic protocols with open-ended data structures. Int. J. Inf. Sec. 4(1-2): 49-70 (2005) |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Ralf Molitor: Structural Subsumption and Least Common Subsumers in a Description Logic with Existential and Number Restrictions. Studia Logica 81(2): 227-259 (2005) |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani: An NP decision procedure for protocol insecurity with XOR. Theor. Comput. Sci. 338(1-3): 247-274 (2005) |
2004 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Thomas Wilke: Automata-Based Analysis of Recursive Cryptographic Protocols. STACS 2004: 382-393 |
2003 | ||
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron: Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. CSL 2003: 128-141 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters, Frank Wolter: Extensions to Description Logics. Description Logic Handbook 2003: 219-261 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani: Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. FSTTCS 2003: 124-135 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani: An NP Decision Procedure for Protocol Insecurity with XOR. LICS 2003: 261-270 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Sebastian Brandt, Anni-Yasmin Turhan, Ralf Küsters: Extensions of Non-standard Inferences to Descriptions Logics with Transitive Roles. LPAR 2003: 122-136 |
2002 | ||
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters: On the Decidability of Cryptographic Protocols with Open-Ended Data Structures. CONCUR 2002: 515-530 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Thomas Wilke: Deciding the First Level of the µ-Calculus Alternation Hierarchy. FSTTCS 2002: 241-252 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Sebastian Brandt, Ralf Küsters, Anni-Yasmin Turhan: Approximation and Difference in Description Logics. KR 2002: 203-214 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Ralf Molitor: Approximating most specific concepts in description logics with existential restrictions. AI Commun. 15(1): 47-59 (2002) |
2001 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters: Non-Standard Inferences in Description Logics Springer 2001 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters: Memoryless Determinacy of Parity Games. Automata, Logics, and Infinite Games 2001: 95-106 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters: Unification in a Description Logic with Transitive Closure of Roles. Description Logics 2001 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Sebastian Brandt, Ralf Küsters: Matching under Side Conditions in Description Logics. IJCAI 2001: 213-218 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Ralf Molitor: Computing Least Common Subsumers in ALEN. IJCAI 2001: 219-224 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Ralf Molitor: Approximating Most Specific Concepts in Description Logics with Existential Restrictions. KI/ÖGAI 2001: 33-47 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters: Unification in a Description Logic with Transitive Closure of Roles. LPAR 2001: 217-232 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters, Alexander Borgida: What's in an Attribute? Consequences for the Least Common Subsumer. J. Artif. Intell. Res. (JAIR) 14: 167-203 (2001) |
2000 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Alexander Borgida, Ralf Küsters: What's not in a name: Some Properties of a Purely Structural Approach to Integrating Large DL Knowledge Bases. Description Logics 2000: 65-78 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters: Matching Concept Descriptions with Existential Restrictions. KR 2000: 261-272 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters, Ralf Molitor: Rewriting Concepts Using Terminologies. KR 2000: 297-308 |
1999 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters: Matching in Description Logics with Existential Restrictions. Description Logics 1999 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters, Ralf Molitor: Computing Least Common Subsumers in Description Logics with Existential Restrictions. IJCAI 1999: 96-103 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters, Alexander Borgida, Deborah L. McGuinness: Matching in Description Logics. J. Log. Comput. 9(3): 411-447 (1999) |
1998 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters: Least Common Subsumer Computation w.r.t. cyclic ALN-Terminologies. Description Logics 1998 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters, Ralf Molitor: Structural Subsumption Considered from an Automata-Theoretic Point of View. Description Logics 1998 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Franz Baader, Ralf Küsters: Computing the Least Common Subsumer and the Most Specific Concept in the Presence of Cyclic ALN-Concept Descriptions. KI 1998: 129-140 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters: Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata. KR 1998: 499-511 |
1997 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Küsters: Characterizing the semantics of terminological cycles with the help of finite automata. Description Logics 1997 |