Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ralf Küsters
@article{DBLP:journals/corr/abs-2402-18970, author = {Mayar Elfares and Pascal Reisert and Zhiming Hu and Wenwu Tang and Ralf K{\"{u}}sters and Andreas Bulling}, title = {PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation}, journal = {CoRR}, volume = {abs/2402.18970}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.18970}, doi = {10.48550/ARXIV.2402.18970}, eprinttype = {arXiv}, eprint = {2402.18970}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-18970.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosseyniKW24, author = {Pedram Hosseyni and Ralf K{\"{u}}sters and Tim W{\"{u}}rtele}, title = {Formal Security Analysis of the OpenID {FAPI} 2.0: Accompanying a Standardization Process}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2024}, url = {https://eprint.iacr.org/2024/078}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HosseyniKW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RiviniusRHK23, author = {Marc Rivinius and Pascal Reisert and Sebastian Hasler and Ralf K{\"{u}}sters}, title = {Convolutions in Overdrive: Maliciously Secure Convolutions for {MPC}}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {3}, pages = {321--353}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0084}, doi = {10.56553/POPETS-2023-0084}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/RiviniusRHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ReisertRKK23, author = {Pascal Reisert and Marc Rivinius and Toomas Krips and Ralf K{\"{u}}sters}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Overdrive LowGear 2.0: Reduced-Bandwidth {MPC} without Sacrifice}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {372--386}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3582809}, doi = {10.1145/3579856.3582809}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ReisertRKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BhargavanBHKPSWW23, author = {Karthikeyan Bhargavan and Abhishek Bichhawat and Pedram Hosseyni and Ralf K{\"{u}}sters and Klaas Pruiksma and Guido Schmitz and Clara Waldmann and Tim W{\"{u}}rtele}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Layered Symbolic Security Analysis in {\textdollar}{\textbackslash}textsf \{DY\}{\^{}}{\textbackslash}star {\textdollar}}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {3--21}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_1}, doi = {10.1007/978-3-031-51479-1\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BhargavanBHKPSWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WabarthaLHRK23, author = {Carmen Wabartha and Julian Liedtke and Nicolas Huber and Daniel Rausch and Ralf K{\"{u}}sters}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {209--228}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_11}, doi = {10.1007/978-3-031-50594-2\_11}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/WabarthaLHRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HelmschmidtHKPWW23, author = {Florian Helmschmidt and Pedram Hosseyni and Ralf K{\"{u}}sters and Klaas Pruiksma and Clara Waldmann and Tim W{\"{u}}rtele}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {222--242}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_12}, doi = {10.1007/978-3-031-51479-1\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HelmschmidtHKPWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrafKR23, author = {Mike Graf and Ralf K{\"{u}}sters and Daniel Rausch}, title = {{AUC:} Accountable Universal Composability}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1148--1167}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179384}, doi = {10.1109/SP46215.2023.10179384}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GrafKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiviniusRHK23, author = {Marc Rivinius and Pascal Reisert and Sebastian Hasler and Ralf K{\"{u}}sters}, title = {Convolutions in Overdrive: Maliciously Secure Convolutions for {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2023}, url = {https://eprint.iacr.org/2023/359}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiviniusRHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaslerKKRR23, author = {Sebastian Hasler and Toomas Krips and Ralf K{\"{u}}sters and Pascal Reisert and Marc Rivinius}, title = {Overdrive LowGear 2.0: Reduced-Bandwidth {MPC} without Sacrifice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2023}, url = {https://eprint.iacr.org/2023/462}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaslerKKRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WabarthaLHRK23, author = {Carmen Wabartha and Julian Liedtke and Nicolas Huber and Daniel Rausch and Ralf K{\"{u}}sters}, title = {Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1289}, year = {2023}, url = {https://eprint.iacr.org/2023/1289}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WabarthaLHRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HelmschmidtHKPWW23, author = {Florian Helmschmidt and Pedram Hosseyni and Ralf K{\"{u}}sters and Klaas Pruiksma and Clara Waldmann and Tim W{\"{u}}rtele}, title = {The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1325}, year = {2023}, url = {https://eprint.iacr.org/2023/1325}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HelmschmidtHKPWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhargavanBHKPSWW23, author = {Karthikeyan Bhargavan and Abhishek Bichhawat and Pedram Hosseyni and Ralf K{\"{u}}sters and Klaas Pruiksma and Guido Schmitz and Clara Waldmann and Tim W{\"{u}}rtele}, title = {Layered Symbolic Security Analysis in DY{\textdollar}{\^{}}{\textbackslash}star{\textdollar}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1329}, year = {2023}, url = {https://eprint.iacr.org/2023/1329}, timestamp = {Mon, 09 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhargavanBHKPSWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrafKREBF23, author = {Mike Graf and Ralf K{\"{u}}sters and Daniel Rausch and Simon Egger and Marvin Bechtold and Marcel Flinspach}, title = {Accountable Bulletin Boards: Definition and Provably Secure Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1869}, year = {2023}, url = {https://eprint.iacr.org/2023/1869}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GrafKREBF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaslerRRK23, author = {Sebastian Hasler and Pascal Reisert and Marc Rivinius and Ralf K{\"{u}}sters}, title = {Multipars: Reduced-Communication {MPC} over Z2k}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1932}, year = {2023}, url = {https://eprint.iacr.org/2023/1932}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HaslerRRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuberKKL00R022, author = {Nicolas Huber and Ralf K{\"{u}}sters and Toomas Krips and Julian Liedtke and Johannes M{\"{u}}ller and Daniel Rausch and Pascal Reisert and Andreas Vogt}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Kryvos: Publicly Tally-Hiding Verifiable E-Voting}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1443--1457}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560701}, doi = {10.1145/3548606.3560701}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuberKKL00R022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/AmrouchABBBDEEG22, author = {Hussam Amrouch and Jens Anders and Steffen Becker and Maik Betka and Gerd Bleher and Peter Domanski and Nourhan Elhamawy and Thomas Ertl and Athanasios Gatzastras and Paul R. Genssler and Sebastian Hasler and Martin Heinrich and Andr{\'{e}} van Hoorn and Hanieh Jafarzadeh and Ingmar Kallfass and Florian Klemme and Steffen Koch and Ralf K{\"{u}}sters and Andr{\'{e}}s Lalama and Rapha{\"{e}}l Latty and Yiwen Liao and Natalia Lylina and Zahra Paria Najafi{-}Haghi and Dirk Pfl{\"{u}}ger and Ilia Polian and Jochen Rivoir and Matthias Sauer and Denis Schwachhofer and Steffen Templin and Christian Volmer and Stefan Wagner and Daniel Weiskopf and Hans{-}Joachim Wunderlich and Bin Yang and Martin Zimmermann}, editor = {Cristiana Bolchini and Ingrid Verbauwhede and Ioana Vatajelu}, title = {Intelligent Methods for Test and Reliability}, booktitle = {2022 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2022, Antwerp, Belgium, March 14-23, 2022}, pages = {969--974}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/DATE54114.2022.9774526}, doi = {10.23919/DATE54114.2022.9774526}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/AmrouchABBBDEEG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RauschKC22, author = {Daniel Rausch and Ralf K{\"{u}}sters and C{\'{e}}line Chevalier}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Embedding the {UC} Model into the {IITM} Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {242--272}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_9}, doi = {10.1007/978-3-031-07085-3\_9}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RauschKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gazeml/ElfaresHRBK22, author = {Mayar Elfares and Zhiming Hu and Pascal Reisert and Andreas Bulling and Ralf K{\"{u}}sters}, editor = {Ismini Lourentzou and Joy T. Wu and Satyananda Kashyap and Alexandros Karargyris and Leo Anthony Celi and Ban Kawas and Sachin S. Talathi}, title = {Federated Learning for Appearance-based Gaze Estimation in the Wild}, booktitle = {Proceedings of The 1st Gaze Meets {ML} workshop, in conjunction with the Annual Conference on Neural Information Processing Systems, 03 December 2022, New Orleans, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {210}, pages = {20--36}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v210/elfares23a.html}, timestamp = {Wed, 06 Sep 2023 17:05:54 +0200}, biburl = {https://dblp.org/rec/conf/gazeml/ElfaresHRBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BeckertBGKKKMMN22, author = {Bernhard Beckert and Jurlind Budurushi and Armin Grunwald and Robert Krimmer and Oksana Kulyk and Ralf K{\"{u}}sters and Andreas Mayer and J{\"{o}}rn M{\"{u}}ller{-}Quade and Stephan Neumann and Melanie Volkamer}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Recent Developments in the Context of Online Elections and Digital Polls in Germany}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {213--217}, publisher = {Gesellschaft f{\"{u}}r Informatik, Bonn}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_16}, doi = {10.18420/SICHERHEIT2022\_16}, timestamp = {Tue, 04 Jul 2023 17:42:02 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BeckertBGKKKMMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/0001HKSWW22, author = {Quoc Huy Do and Pedram Hosseyni and Ralf K{\"{u}}sters and Guido Schmitz and Nils Wenzler and Tim W{\"{u}}rtele}, title = {A Formal Security Analysis of the {W3C} Web Payment APIs: Attacks and Verification}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {215--234}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833681}, doi = {10.1109/SP46214.2022.9833681}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/0001HKSWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RiviniusR0K22, author = {Marc Rivinius and Pascal Reisert and Daniel Rausch and Ralf K{\"{u}}sters}, title = {Publicly Accountable Robust Multi-Party Computation}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2430--2449}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833608}, doi = {10.1109/SP46214.2022.9833608}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RiviniusR0K22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-07330, author = {Mayar Elfares and Zhiming Hu and Pascal Reisert and Andreas Bulling and Ralf K{\"{u}}sters}, title = {Federated Learning for Appearance-based Gaze Estimation in the Wild}, journal = {CoRR}, volume = {abs/2211.07330}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.07330}, doi = {10.48550/ARXIV.2211.07330}, eprinttype = {arXiv}, eprint = {2211.07330}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-07330.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauschKC22, author = {Daniel Rausch and Ralf K{\"{u}}sters and C{\'{e}}line Chevalier}, title = {Embedding the {UC} Model into the {IITM} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2022}, url = {https://eprint.iacr.org/2022/224}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RauschKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiviniusRRK22, author = {Marc Rivinius and Pascal Reisert and Daniel Rausch and Ralf K{\"{u}}sters}, title = {Publicly Accountable Robust Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2022}, url = {https://eprint.iacr.org/2022/436}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiviniusRRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReisertRKK22, author = {Pascal Reisert and Marc Rivinius and Toomas Krips and Ralf K{\"{u}}sters}, title = {Arithmetic Tuples for {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2022}, url = {https://eprint.iacr.org/2022/667}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReisertRKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuberKKL00R022, author = {Nicolas Huber and Ralf K{\"{u}}sters and Toomas Krips and Julian Liedtke and Johannes M{\"{u}}ller and Daniel Rausch and Pascal Reisert and Andreas Vogt}, title = {Kryvos: Publicly Tally-Hiding Verifiable E-Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1132}, year = {2022}, url = {https://eprint.iacr.org/2022/1132}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuberKKL00R022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrafKR22, author = {Mike Graf and Ralf K{\"{u}}sters and Daniel Rausch}, title = {{AUC:} Accountable Universal Composability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1606}, year = {2022}, url = {https://eprint.iacr.org/2022/1606}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GrafKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BhargavanB0HKSW21, author = {Karthikeyan Bhargavan and Abhishek Bichhawat and Quoc Huy Do and Pedram Hosseyni and Ralf K{\"{u}}sters and Guido Schmitz and Tim W{\"{u}}rtele}, editor = {Daniel Dougherty and Jos{\'{e}} Meseguer and Sebastian Alexander M{\"{o}}dersheim and Paul D. Rowe}, title = {A Tutorial-Style Introduction to DY*}, booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13066}, pages = {77--97}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91631-2\_4}, doi = {10.1007/978-3-030-91631-2\_4}, timestamp = {Thu, 21 Sep 2023 09:08:34 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BhargavanB0HKSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/00010R0KS21, author = {Mike Graf and Daniel Rausch and Viktoria Ronge and Christoph Egger and Ralf K{\"{u}}sters and Dominique Schr{\"{o}}der}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {A Security Framework for Distributed Ledgers}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1043--1064}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485362}, doi = {10.1145/3460120.3485362}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/00010R0KS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhargavanB0HKSW21, author = {Karthikeyan Bhargavan and Abhishek Bichhawat and Quoc Huy Do and Pedram Hosseyni and Ralf K{\"{u}}sters and Guido Schmitz and Tim W{\"{u}}rtele}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {An In-Depth Symbolic Security Analysis of the {ACME} Standard}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2601--2617}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484588}, doi = {10.1145/3460120.3484588}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhargavanB0HKSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BhargavanBDHKSW21, author = {Karthikeyan Bhargavan and Abhishek Bichhawat and Quoc Huy Do and Pedram Hosseyni and Ralf K{\"{u}}sters and Guido Schmitz and Tim W{\"{u}}rtele}, title = {DY*: {A} Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {523--542}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00042}, doi = {10.1109/EUROSP51992.2021.00042}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BhargavanBDHKSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2021, editor = {Avishek Adhikari and Ralf K{\"{u}}sters and Bart Preneel}, title = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92518-5}, doi = {10.1007/978-3-030-92518-5}, isbn = {978-3-030-92517-8}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EggerGKRRS21, author = {Christoph Egger and Mike Graf and Ralf K{\"{u}}sters and Daniel Rausch and Viktoria Ronge and Dominique Schr{\"{o}}der}, title = {A Security Framework for Distributed Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2021}, url = {https://eprint.iacr.org/2021/145}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EggerGKRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoHKSWW21, author = {Quoc Huy Do and Pedram Hosseyni and Ralf K{\"{u}}sters and Guido Schmitz and Nils Wenzler and Tim W{\"{u}}rtele}, title = {A Formal Security Analysis of the {W3C} Web Payment APIs: Attacks and Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2021}, url = {https://eprint.iacr.org/2021/1012}, timestamp = {Fri, 10 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoHKSWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HertelHKKLR21, author = {Fabian Hertel and Nicolas Huber and Jonas Kittelberger and Ralf K{\"{u}}sters and Julian Liedtke and Daniel Rausch}, title = {Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1420}, year = {2021}, url = {https://eprint.iacr.org/2021/1420}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HertelHKKLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhargavanBDHKSW21, author = {Karthikeyan Bhargavan and Abhishek Bichhawat and Quoc Huy Do and Pedram Hosseyni and Ralf K{\"{u}}sters and Guido Schmitz and Tim W{\"{u}}rtele}, title = {An In-Depth Symbolic Security Analysis of the {ACME} Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1457}, year = {2021}, url = {https://eprint.iacr.org/2021/1457}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BhargavanBDHKSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KustersTR20, author = {Ralf K{\"{u}}sters and Max Tuengerthal and Daniel Rausch}, title = {The {IITM} Model: {A} Simple and Expressive Model for Universal Composability}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1461--1584}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09352-1}, doi = {10.1007/S00145-020-09352-1}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KustersTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KustersTR20a, author = {Ralf K{\"{u}}sters and Max Tuengerthal and Daniel Rausch}, title = {Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1585--1658}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09353-0}, doi = {10.1007/S00145-020-09353-0}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KustersTR20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KustersL00020, author = {Ralf K{\"{u}}sters and Julian Liedtke and Johannes M{\"{u}}ller and Daniel Rausch and Andreas Vogt}, title = {Ordinos: {A} Verifiable Tally-Hiding E-Voting System}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {216--235}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00022}, doi = {10.1109/EUROSP48549.2020.00022}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KustersL00020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GrafK020, author = {Mike Graf and Ralf K{\"{u}}sters and Daniel Rausch}, title = {Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {236--255}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00023}, doi = {10.1109/EUROSP48549.2020.00023}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/GrafK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/evoteid/2020, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2}, doi = {10.1007/978-3-030-60347-2}, isbn = {978-3-030-60346-5}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersRS20, author = {Ralf K{\"{u}}sters and Daniel Rausch and Mike Simon}, title = {Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2020}, url = {https://eprint.iacr.org/2020/386}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KustersRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersLMRV20, author = {Ralf K{\"{u}}sters and Julian Liedtke and Johannes M{\"{u}}ller and Daniel Rausch and Andreas Vogt}, title = {Ordinos: {A} Verifiable Tally-Hiding E-Voting System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2020}, url = {https://eprint.iacr.org/2020/405}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersLMRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CamenischKK019, author = {Jan Camenisch and Stephan Krenn and Ralf K{\"{u}}sters and Daniel Rausch}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {iUC: Flexible Universal Composability Made Simple}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {191--221}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_7}, doi = {10.1007/978-3-030-34618-8\_7}, timestamp = {Fri, 22 Nov 2019 13:53:07 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CamenischKK019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FettHK19, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-Grade {API}}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {453--471}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00067}, doi = {10.1109/SP.2019.00067}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/FettHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2019, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Bernhard Beckert and Ralf K{\"{u}}sters and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11759}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30625-0}, doi = {10.1007/978-3-030-30625-0}, isbn = {978-3-030-30624-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-11520, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-grade {API}}, journal = {CoRR}, volume = {abs/1901.11520}, year = {2019}, url = {http://arxiv.org/abs/1901.11520}, eprinttype = {arXiv}, eprint = {1901.11520}, timestamp = {Mon, 04 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-11520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/CamenischKLS19, author = {Jan Camenisch and Ralf K{\"{u}}sters and Anna Lysyanskaya and Alessandra Scafuro}, title = {Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042)}, journal = {Dagstuhl Reports}, volume = {9}, number = {1}, pages = {88--103}, year = {2019}, url = {https://doi.org/10.4230/DagRep.9.1.88}, doi = {10.4230/DAGREP.9.1.88}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischKLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischKKR19, author = {Jan Camenisch and Stephan Krenn and Ralf K{\"{u}}sters and Daniel Rausch}, title = {iUC: Flexible Universal Composability Made Simple}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1073}, year = {2019}, url = {https://eprint.iacr.org/2019/1073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischKKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2018, editor = {Lujo Bauer and Ralf K{\"{u}}sters}, title = {Principles of Security and Trust - 7th International Conference, {POST} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10804}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89722-6}, doi = {10.1007/978-3-319-89722-6}, isbn = {978-3-319-89721-9}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FettKS17, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, title = {The Web {SSO} Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {189--202}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.20}, doi = {10.1109/CSF.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FettKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersR17, author = {Ralf K{\"{u}}sters and Daniel Rausch}, title = {A Framework for Universally Composable Diffie-Hellman Key Exchange}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {881--900}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.63}, doi = {10.1109/SP.2017.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KustersR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/Kusters017, author = {Ralf K{\"{u}}sters and Johannes M{\"{u}}ller}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {21--41}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_2}, doi = {10.1007/978-3-319-68687-5\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/Kusters017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FettKS17, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, title = {The Web {SSO} Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines}, journal = {CoRR}, volume = {abs/1704.08539}, year = {2017}, url = {http://arxiv.org/abs/1704.08539}, eprinttype = {arXiv}, eprint = {1704.08539}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FettKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersR17, author = {Ralf K{\"{u}}sters and Daniel Rausch}, title = {A Framework for Universally Composable Diffie-Hellman Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2017}, url = {http://eprint.iacr.org/2017/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CamenischEKK016, author = {Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf K{\"{u}}sters and Daniel Rausch}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Universal Composition with Responsive Environments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {807--840}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_27}, doi = {10.1007/978-3-662-53890-6\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CamenischEKK016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FettKS16, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {A Comprehensive Formal Security Analysis of OAuth 2.0}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1204--1215}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978385}, doi = {10.1145/2976749.2978385}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FettKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersMST16, author = {Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Enrico Scapin and Tomasz Truderung}, title = {sElect: {A} Lightweight Verifiable Remote Voting System}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {341--354}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.31}, doi = {10.1109/CSF.2016.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersMST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KustersT16, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Security Analysis of Re-Encryption {RPC} Mix Nets}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {227--242}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.27}, doi = {10.1109/EUROSP.2016.27}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KustersT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {SoK: Verifiability Notions for E-Voting Protocols}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {779--798}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.52}, doi = {10.1109/SP.2016.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FettKS16, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, title = {A Comprehensive Formal Security Analysis of OAuth 2.0}, journal = {CoRR}, volume = {abs/1601.01229}, year = {2016}, url = {http://arxiv.org/abs/1601.01229}, eprinttype = {arXiv}, eprint = {1601.01229}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FettKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischEKKR16, author = {Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf K{\"{u}}sters and Daniel Rausch}, title = {Universal Composition with Responsive Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2016}, url = {http://eprint.iacr.org/2016/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischEKKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {Verifiability Notions for E-Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2016}, url = {http://eprint.iacr.org/2016/287}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersMST16, author = {Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Enrico Scapin and Tomasz Truderung}, title = {sElect: {A} Lightweight Verifiable Remote Voting System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2016}, url = {http://eprint.iacr.org/2016/438}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KustersMST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FettKS15, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{SPRESSO:} {A} Secure, Privacy-Respecting Single Sign-On System for the Web}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1358--1369}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813726}, doi = {10.1145/2810103.2813726}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FettKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersTBBKM15, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {A Hybrid Approach for Proving Noninterference of Java Programs}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {305--319}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.28}, doi = {10.1109/CSF.2015.28}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KustersTBBKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FettKS15, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Analyzing the BrowserID {SSO} System with Primary Identity Providers Using an Expressive Model of the Web}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {43--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_3}, doi = {10.1007/978-3-319-24174-6\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FettKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FettKS15, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, title = {{SPRESSO:} {A} Secure, Privacy-Respecting Single Sign-On System for the Web}, journal = {CoRR}, volume = {abs/1508.01719}, year = {2015}, url = {http://arxiv.org/abs/1508.01719}, eprinttype = {arXiv}, eprint = {1508.01719}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FettKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT15, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Security Analysis of Re-Encryption {RPC} Mix Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2015}, url = {http://eprint.iacr.org/2015/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTBBKM15, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr}, title = {A Hybrid Approach for Proving Noninterference of Java Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2015}, url = {http://eprint.iacr.org/2015/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTBBKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/KustersT14, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Security in e-voting}, journal = {it Inf. Technol.}, volume = {56}, number = {6}, pages = {300--306}, year = {2014}, url = {http://www.degruyter.com/view/j/itit.2014.56.issue-6/itit-2014-1062/itit-2014-1062.xml}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/KustersT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/KustersSTG14, author = {Ralf K{\"{u}}sters and Enrico Scapin and Tomasz Truderung and Juergen Graf}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Extending and Applying a Framework for the Cryptographic Verification of Java Programs}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {220--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_12}, doi = {10.1007/978-3-642-54792-8\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/KustersSTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersT014, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {343--358}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.29}, doi = {10.1109/SP.2014.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KustersT014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FettKS14, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, title = {An Expressive Model for the Web Infrastructure: Definition and Application to the Browser {ID} {SSO} System}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {673--688}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.49}, doi = {10.1109/SP.2014.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FettKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/Kusters14, author = {Ralf K{\"{u}}sters}, editor = {Orna Grumberg and Helmut Seidl and Maximilian Irlbeck}, title = {E-Voting Systems}, booktitle = {Software Systems Safety}, series = {{NATO} Science for Peace and Security Series, {D:} Information and Communication Security}, volume = {36}, pages = {135--164}, publisher = {{IOS} Press}, year = {2014}, url = {https://doi.org/10.3233/978-1-61499-385-8-135}, doi = {10.3233/978-1-61499-385-8-135}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/Kusters14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FettKS14, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, title = {An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID {SSO} System}, journal = {CoRR}, volume = {abs/1403.1866}, year = {2014}, url = {http://arxiv.org/abs/1403.1866}, eprinttype = {arXiv}, eprint = {1403.1866}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FettKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FettKS14a, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, title = {Analyzing the BrowserID {SSO} System with Primary Identity Providers Using an Expressive Model of the Web}, journal = {CoRR}, volume = {abs/1411.7210}, year = {2014}, url = {http://arxiv.org/abs/1411.7210}, eprinttype = {arXiv}, eprint = {1411.7210}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FettKS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersSTG14, author = {Ralf K{\"{u}}sters and Enrico Scapin and Tomasz Truderung and Juergen Graf}, title = {Extending and Applying a Framework for the Cryptographic Verification of Java Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2014}, url = {http://eprint.iacr.org/2014/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersSTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT014, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2014}, url = {http://eprint.iacr.org/2014/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT13, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {The {IITM} Model: a Simple and Expressive Model for Universal Composability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2013}, url = {http://eprint.iacr.org/2013/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KustersT012, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {A game-based definition of coercion resistance and its applications}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {709--764}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0444}, doi = {10.3233/JCS-2012-0444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KustersT012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersTG12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Juergen Graf}, editor = {Stephen Chong}, title = {A Framework for the Cryptographic Verification of Java-Like Programs}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {198--212}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.9}, doi = {10.1109/CSF.2012.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersTV12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Clash Attacks on the Verifiability of E-Voting Systems}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {395--409}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.32}, doi = {10.1109/SP.2012.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KustersTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Clash Attacks on the Verifiability of E-Voting Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2012}, url = {http://eprint.iacr.org/2012/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTG12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Juergen Graf}, title = {A Framework for the Cryptographic Verification of Java-like Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2012}, url = {http://eprint.iacr.org/2012/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/vi/Kusters2011, author = {Ralf K{\"{u}}sters and Thomas Wilke}, title = {Moderne Kryptographie - Eine Einf{\"{u}}hrung}, publisher = {Vieweg + Teubner}, year = {2011}, isbn = {978-3-519-00509-4}, timestamp = {Wed, 04 Jan 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/vi/Kusters2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/KustersT11, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Reducing Protocol Analysis with {XOR} to the XOR-Free Case in the Horn Theory Based Approach}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {325--352}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9188-8}, doi = {10.1007/S10817-010-9188-8}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/KustersT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KustersT11, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Composition theorems without pre-established session identifiers}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {41--50}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046715}, doi = {10.1145/2046707.2046715}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KustersT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KustersT11, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, editor = {Aggelos Kiayias}, title = {Ideal Key Derivation and Encryption in Simulation-Based Security}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {161--179}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_12}, doi = {10.1007/978-3-642-19074-2\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KustersT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersTV11, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {538--553}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.21}, doi = {10.1109/SP.2011.21}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KustersTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-0238, author = {Alexander Borgida and Ralf K{\"{u}}sters}, title = {What's in an Attribute? Consequences for the Least Common Subsumer}, journal = {CoRR}, volume = {abs/1106.0238}, year = {2011}, url = {http://arxiv.org/abs/1106.0238}, eprinttype = {arXiv}, eprint = {1106.0238}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-0238.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Comon-LundhKM11, author = {Hubert Comon{-}Lundh and Ralf K{\"{u}}sters and Catherine Meadows}, title = {Security and Rewriting (Dagstuhl Seminar 11332)}, journal = {Dagstuhl Reports}, volume = {1}, number = {8}, pages = {53--66}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.8.53}, doi = {10.4230/DAGREP.1.8.53}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Comon-LundhKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT11, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Composition Theorems Without Pre-Established Session Identifiers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2011}, url = {http://eprint.iacr.org/2011/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV11, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2011}, url = {http://eprint.iacr.org/2011/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/KahlerKW10, author = {Detlef K{\"{a}}hler and Ralf K{\"{u}}sters and Thomas Wilke}, title = {Deciding strategy properties of contract-signing protocols}, journal = {{ACM} Trans. Comput. Log.}, volume = {11}, number = {3}, pages = {17:1--17:42}, year = {2010}, url = {https://doi.org/10.1145/1740582.1740585}, doi = {10.1145/1740582.1740585}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/KahlerKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Accountability: definition and relationship to verifiability}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {526--535}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866366}, doi = {10.1145/1866307.1866366}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {A Game-Based Definition of Coercion-Resistance and Its Applications}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {122--136}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.16}, doi = {10.1109/CSF.2010.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Proving Coercion-Resistance of Scantegrity {II}}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {281--295}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_20}, doi = {10.1007/978-3-642-17650-0\_20}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KustersST10, author = {Ralf K{\"{u}}sters and Henning Schnoor and Tomasz Truderung}, editor = {Sushil Jajodia and Jianying Zhou}, title = {A Formal Definition of Online Abuse-Freeness}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {484--497}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_28}, doi = {10.1007/978-3-642-16161-2\_28}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KustersST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Accountability: Definition and Relationship to Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2010}, url = {http://eprint.iacr.org/2010/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT10, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Ideal Key Derivation and Encryption in Simulation-based Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2010}, url = {http://eprint.iacr.org/2010/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV10a, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Proving Coercion-Resistance of Scantegrity {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2010}, url = {http://eprint.iacr.org/2010/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KustersT09, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Computational soundness for key exchange protocols with symmetric encryption}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {91--100}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653674}, doi = {10.1145/1653662.1653674}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KustersT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersT09, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {157--171}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.17}, doi = {10.1109/CSF.2009.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersT09a, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Universally Composable Symmetric Encryption}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {293--307}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.18}, doi = {10.1109/CSF.2009.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersT09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersT09, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {251--266}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.13}, doi = {10.1109/SP.2009.13}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KustersT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/KustersTV09, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, editor = {Peter Y. A. Ryan and Berry Schoenmakers}, title = {Improving and Simplifying a Variant of Pr{\^{e}}t {\`{a}} Voter}, booktitle = {E-Voting and Identity, Second International Conference, VoteID 2009, Luxembourg, September 7-8, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5767}, pages = {37--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04135-8\_3}, doi = {10.1007/978-3-642-04135-8\_3}, timestamp = {Thu, 27 Feb 2020 13:11:16 +0100}, biburl = {https://dblp.org/rec/conf/voteid/KustersTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0903-0802, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols}, journal = {CoRR}, volume = {abs/0903.0802}, year = {2009}, url = {http://arxiv.org/abs/0903.0802}, eprinttype = {arXiv}, eprint = {0903.0802}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0903-0802.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT09, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Universally Composable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2009}, url = {http://eprint.iacr.org/2009/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT09a, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Computational Soundness for Key Exchange Protocols with Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2009}, url = {http://eprint.iacr.org/2009/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV09, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {A Game-Based Definition of Coercion-Resistance and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2009}, url = {http://eprint.iacr.org/2009/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/DeganoKVZ08, author = {Pierpaolo Degano and Ralf K{\"{u}}sters and Luca Vigan{\`{o}} and Steve Zdancewic}, title = {Joint workshop on foundations of computer security and automated reasoning for security protocol analysis {(FCS-ARSPA} '06)}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {129}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.11.003}, doi = {10.1016/J.IC.2007.11.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/DeganoKVZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesDHK08, author = {Michael Backes and Markus D{\"{u}}rmuth and Dennis Hofheinz and Ralf K{\"{u}}sters}, title = {Conditional reactive simulatability}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {155--169}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0046-6}, doi = {10.1007/S10207-007-0046-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesDHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KustersDMR08, author = {Ralf K{\"{u}}sters and Anupam Datta and John C. Mitchell and Ajith Ramanathan}, title = {On the Relationships between Notions of Simulation-Based Security}, journal = {J. Cryptol.}, volume = {21}, number = {4}, pages = {492--546}, year = {2008}, url = {https://doi.org/10.1007/s00145-008-9019-9}, doi = {10.1007/S00145-008-9019-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KustersDMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ChevalierKRT08, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption}, journal = {{ACM} Trans. Comput. Log.}, volume = {9}, number = {4}, pages = {24:1--24:52}, year = {2008}, url = {https://doi.org/10.1145/1380572.1380573}, doi = {10.1145/1380572.1380573}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ChevalierKRT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KustersT08, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Reducing protocol analysis with {XOR} to the XOR-free case in the horn theory based approach}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {129--138}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455788}, doi = {10.1145/1455770.1455788}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KustersT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersT08, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {270--284}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.18}, doi = {10.1109/CSF.2008.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0808-0634, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Reducing Protocol Analysis with {XOR} to the XOR-free Case in the Horn Theory Based Approach}, journal = {CoRR}, volume = {abs/0808.0634}, year = {2008}, url = {http://arxiv.org/abs/0808.0634}, eprinttype = {arXiv}, eprint = {0808.0634}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0808-0634.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT08, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2008}, url = {http://eprint.iacr.org/2008/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/KustersW07, author = {Ralf K{\"{u}}sters and Thomas Wilke}, title = {Transducer-based analysis of cryptographic protocols}, journal = {Inf. Comput.}, volume = {205}, number = {12}, pages = {1741--1776}, year = {2007}, url = {https://doi.org/10.1016/j.ic.2007.08.003}, doi = {10.1016/J.IC.2007.08.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/KustersW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KurtzKW07, author = {Klaas Ole K{\"{u}}rtz and Ralf K{\"{u}}sters and Thomas Wilke}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Selecting theories and nonce generation for recursive protocols}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {61--70}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314445}, doi = {10.1145/1314436.1314445}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KurtzKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierKW07, author = {V{\'{e}}ronique Cortier and Ralf K{\"{u}}sters and Bogdan Warinschi}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {422--437}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_28}, doi = {10.1007/978-3-540-74835-9\_28}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CortierKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BackesDK07, author = {Michael Backes and Markus D{\"{u}}rmuth and Ralf K{\"{u}}sters}, editor = {Vikraman Arvind and Sanjiva Prasad}, title = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography}, booktitle = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4855}, pages = {108--120}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77050-3\_9}, doi = {10.1007/978-3-540-77050-3\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/BackesDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/KahlerKT07, author = {Detlef K{\"{a}}hler and Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Infinite State AMC-Model Checking for Cryptographic Protocols}, booktitle = {22nd {IEEE} Symposium on Logic in Computer Science {(LICS} 2007), 10-12 July 2007, Wroclaw, Poland, Proceedings}, pages = {181--192}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/LICS.2007.26}, doi = {10.1109/LICS.2007.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/KahlerKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/KustersT07, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, editor = {Wolfgang Thomas and Pascal Weil}, title = {On the Automatic Analysis of Recursive Security Protocols with {XOR}}, booktitle = {{STACS} 2007, 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4393}, pages = {646--657}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70918-3\_55}, doi = {10.1007/978-3-540-70918-3\_55}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/KustersT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDK07, author = {Michael Backes and Markus D{\"{u}}rmuth and Ralf K{\"{u}}sters}, title = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2007}, url = {http://eprint.iacr.org/2007/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierKW07, author = {V{\'{e}}ronique Cortier and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {A Cryptographic Model for Branching Time Security Properties - the Case of Contract Signing Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2007}, url = {http://eprint.iacr.org/2007/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Kusters06, author = {Ralf K{\"{u}}sters}, title = {Simulation-Based Security with Inexhaustible Interactive Turing Machines}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {309--320}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.30}, doi = {10.1109/CSFW.2006.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Kusters06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesDHK06, author = {Michael Backes and Markus D{\"{u}}rmuth and Dennis Hofheinz and Ralf K{\"{u}}sters}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Conditional Reactive Simulatability}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {424--443}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_26}, doi = {10.1007/11863908\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesDHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, editor = {S. Arun{-}Kumar and Naveen Garg}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, booktitle = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4337}, pages = {176--187}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11944836\_18}, doi = {10.1007/11944836\_18}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KahlerKW06, author = {Detlef K{\"{a}}hler and Ralf K{\"{u}}sters and Thomas Wilke}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {A Dolev-Yao-Based Definition of Abuse-Free Protocols}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {95--106}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_9}, doi = {10.1007/11787006\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/KahlerKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0610014, author = {Max Tuengerthal and Ralf K{\"{u}}sters and Mathieu Turuani}, title = {Implementing a Unification Algorithm for Protocol Analysis with {XOR}}, journal = {CoRR}, volume = {abs/cs/0610014}, year = {2006}, url = {http://arxiv.org/abs/cs/0610014}, eprinttype = {arXiv}, eprint = {cs/0610014}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0610014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDHK06, author = {Michael Backes and Markus D{\"{u}}rmuth and Dennis Hofheinz and Ralf K{\"{u}}sters}, title = {Conditional Reactive Simulatability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2006}, url = {http://eprint.iacr.org/2006/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kusters06, author = {Ralf K{\"{u}}sters}, title = {Simulation-Based Security with Inexhaustible Interactive Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2006}, url = {http://eprint.iacr.org/2006/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kusters06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaKMR06, author = {Anupam Datta and Ralf K{\"{u}}sters and John C. Mitchell and Ajith Ramanathan}, title = {On the Relationships Between Notions of Simulation-Based Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2006}, url = {http://eprint.iacr.org/2006/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaKMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2006}, url = {http://eprint.iacr.org/2006/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Kusters05, author = {Ralf K{\"{u}}sters}, title = {On the decidability of cryptographic protocols with open-ended data structures}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {1-2}, pages = {49--70}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0050-z}, doi = {10.1007/S10207-004-0050-Z}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Kusters05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sLogica/KustersM05, author = {Ralf K{\"{u}}sters and Ralf Molitor}, title = {Structural Subsumption and Least Common Subsumers in a Description Logic with Existential and Number Restrictions}, journal = {Stud Logica}, volume = {81}, number = {2}, pages = {227--259}, year = {2005}, url = {https://doi.org/10.1007/s11225-005-3705-5}, doi = {10.1007/S11225-005-3705-5}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sLogica/KustersM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChevalierKRT05, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {An {NP} decision procedure for protocol insecurity with {XOR}}, journal = {Theor. Comput. Sci.}, volume = {338}, number = {1-3}, pages = {247--274}, year = {2005}, url = {https://doi.org/10.1016/j.tcs.2005.01.015}, doi = {10.1016/J.TCS.2005.01.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ChevalierKRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/KahlerK05, author = {Detlef K{\"{a}}hler and Ralf K{\"{u}}sters}, editor = {Mart{\'{\i}}n Abadi and Luca de Alfaro}, title = {Constraint Solving for Contract-Signing Protocols}, booktitle = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference, {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3653}, pages = {233--247}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11539452\_20}, doi = {10.1007/11539452\_20}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/KahlerK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/KahlerKW05, author = {Detlef K{\"{a}}hler and Ralf K{\"{u}}sters and Thomas Wilke}, editor = {Volker Diekert and Bruno Durand}, title = {Deciding Properties of Contract-Signing Protocols}, booktitle = {{STACS} 2005, 22nd Annual Symposium on Theoretical Aspects of Computer Science, Stuttgart, Germany, February 24-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3404}, pages = {158--169}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31856-9\_13}, doi = {10.1007/978-3-540-31856-9\_13}, timestamp = {Wed, 19 May 2021 12:05:43 +0200}, biburl = {https://dblp.org/rec/conf/stacs/KahlerKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DattaKMR05, author = {Anupam Datta and Ralf K{\"{u}}sters and John C. Mitchell and Ajith Ramanathan}, editor = {Joe Kilian}, title = {On the Relationships Between Notions of Simulation-Based Security}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {476--494}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_26}, doi = {10.1007/978-3-540-30576-7\_26}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DattaKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005fmse, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-231-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2005fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/KustersW04, author = {Ralf K{\"{u}}sters and Thomas Wilke}, editor = {Volker Diekert and Michel Habib}, title = {Automata-Based Analysis of Recursive Cryptographic Protocols}, booktitle = {{STACS} 2004, 21st Annual Symposium on Theoretical Aspects of Computer Science, Montpellier, France, March 25-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2996}, pages = {382--393}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24749-4\_34}, doi = {10.1007/978-3-540-24749-4\_34}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/KustersW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ChevalierKRT05, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Deciding the Security of Protocols with Commuting Public Key Encryption}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {55--66}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.019}, doi = {10.1016/J.ENTCS.2004.05.019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ChevalierKRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/ChevalierKRTV03, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani and Laurent Vigneron}, editor = {Matthias Baaz and Johann A. Makowsky}, title = {Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions}, booktitle = {Computer Science Logic, 17th International Workshop, {CSL} 2003, 12th Annual Conference of the EACSL, and 8th Kurt G{\"{o}}del Colloquium, {KGC} 2003, Vienna, Austria, August 25-30, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2803}, pages = {128--141}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45220-1\_13}, doi = {10.1007/978-3-540-45220-1\_13}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/ChevalierKRTV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/ChevalierKRT03, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Paritosh K. Pandya and Jaikumar Radhakrishnan}, title = {Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents}, booktitle = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 15-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2914}, pages = {124--135}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24597-1\_11}, doi = {10.1007/978-3-540-24597-1\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/ChevalierKRT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ChevalierKRT03, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {An {NP} Decision Procedure for Protocol Insecurity with {XOR}}, booktitle = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003), 22-25 June 2003, Ottawa, Canada, Proceedings}, pages = {261--270}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/LICS.2003.1210066}, doi = {10.1109/LICS.2003.1210066}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ChevalierKRT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/BrandtTK03, author = {Sebastian Brandt and Anni{-}Yasmin Turhan and Ralf K{\"{u}}sters}, editor = {Moshe Y. Vardi and Andrei Voronkov}, title = {Extensions of Non-standard Inferences to Descriptions Logics with Transitive Roles}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 10th International Conference, {LPAR} 2003, Almaty, Kazakhstan, September 22-26, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2850}, pages = {122--136}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39813-4\_8}, doi = {10.1007/978-3-540-39813-4\_8}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/BrandtTK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/dlog/BaaderKW03, author = {Franz Baader and Ralf K{\"{u}}sters and Frank Wolter}, editor = {Franz Baader and Diego Calvanese and Deborah L. McGuinness and Daniele Nardi and Peter F. Patel{-}Schneider}, title = {Extensions to Description Logics}, booktitle = {The Description Logic Handbook: Theory, Implementation, and Applications}, pages = {219--261}, publisher = {Cambridge University Press}, year = {2003}, timestamp = {Mon, 20 Nov 2017 13:02:05 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BaaderKW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aicom/KustersM02, author = {Ralf K{\"{u}}sters and Ralf Molitor}, title = {Approximating most specific concepts in description logics with existential restrictions}, journal = {{AI} Commun.}, volume = {15}, number = {1}, pages = {47--59}, year = {2002}, url = {http://content.iospress.com/articles/ai-communications/aic253}, timestamp = {Fri, 15 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aicom/KustersM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Kusters02, author = {Ralf K{\"{u}}sters}, editor = {Lubos Brim and Petr Jancar and Mojm{\'{\i}}r Kret{\'{\i}}nsk{\'{y}} and Anton{\'{\i}}n Kucera}, title = {On the Decidability of Cryptographic Protocols with Open-Ended Data Structures}, booktitle = {{CONCUR} 2002 - Concurrency Theory, 13th International Conference, Brno, Czech Republic, August 20-23, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2421}, pages = {515--530}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45694-5\_34}, doi = {10.1007/3-540-45694-5\_34}, timestamp = {Fri, 30 Aug 2019 10:02:28 +0200}, biburl = {https://dblp.org/rec/conf/concur/Kusters02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/BaaderK02, author = {Franz Baader and Ralf K{\"{u}}sters}, editor = {Ian Horrocks and Sergio Tessaris}, title = {Unification in a Description Logic with Inconsistency and Transitive Closure of Roles}, booktitle = {Proceedings of the 2002 International Workshop on Description Logics (DL2002), Toulouse, France, April 19-21, 2002}, series = {{CEUR} Workshop Proceedings}, volume = {53}, publisher = {CEUR-WS.org}, year = {2002}, url = {https://ceur-ws.org/Vol-53/BaaderKuesters-unification.ps}, timestamp = {Fri, 10 Mar 2023 16:23:16 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BaaderK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/BrandtKT02, author = {Sebastian Brandt and Ralf K{\"{u}}sters and Anni{-}Yasmin Turhan}, editor = {Ian Horrocks and Sergio Tessaris}, title = {Approximating ALCN-Concept Descriptions}, booktitle = {Proceedings of the 2002 International Workshop on Description Logics (DL2002), Toulouse, France, April 19-21, 2002}, series = {{CEUR} Workshop Proceedings}, volume = {53}, publisher = {CEUR-WS.org}, year = {2002}, url = {https://ceur-ws.org/Vol-53/BrandtKuesters+-approx.ps}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BrandtKT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/KustersW02, author = {Ralf K{\"{u}}sters and Thomas Wilke}, editor = {Manindra Agrawal and Anil Seth}, title = {Deciding the First Level of the {\(\mathrm{\mu}\)}-Calculus Alternation Hierarchy}, booktitle = {{FST} {TCS} 2002: Foundations of Software Technology and Theoretical Computer Science, 22nd Conference Kanpur, India, December 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2556}, pages = {241--252}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36206-1\_22}, doi = {10.1007/3-540-36206-1\_22}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/KustersW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kr/BrandtKT02, author = {Sebastian Brandt and Ralf K{\"{u}}sters and Anni{-}Yasmin Turhan}, editor = {Dieter Fensel and Fausto Giunchiglia and Deborah L. McGuinness and Mary{-}Anne Williams}, title = {Approximation and Difference in Description Logics}, booktitle = {Proceedings of the Eights International Conference on Principles and Knowledge Representation and Reasoning (KR-02), Toulouse, France, April 22-25, 2002}, pages = {203--214}, publisher = {Morgan Kaufmann}, year = {2002}, timestamp = {Thu, 28 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kr/BrandtKT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Kusters01, author = {Ralf K{\"{u}}sters}, title = {Non-Standard Inferences in Description Logics}, series = {Lecture Notes in Computer Science}, volume = {2100}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44613-3}, doi = {10.1007/3-540-44613-3}, urn = {urn:nbn:de:1111-20061009494}, isbn = {3-540-42397-4}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Kusters01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jair/KustersB01, author = {Ralf K{\"{u}}sters and Alexander Borgida}, title = {What's in an Attribute? Consequences for the Least Common Subsumer}, journal = {J. Artif. Intell. Res.}, volume = {14}, pages = {167--203}, year = {2001}, url = {https://doi.org/10.1613/jair.702}, doi = {10.1613/JAIR.702}, timestamp = {Mon, 21 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jair/KustersB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Kusters01, author = {Ralf K{\"{u}}sters}, editor = {Erich Gr{\"{a}}del and Wolfgang Thomas and Thomas Wilke}, title = {Memoryless Determinacy of Parity Games}, booktitle = {Automata, Logics, and Infinite Games: {A} Guide to Current Research [outcome of a Dagstuhl seminar, February 2001]}, series = {Lecture Notes in Computer Science}, volume = {2500}, pages = {95--106}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-36387-4\_6}, doi = {10.1007/3-540-36387-4\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Kusters01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/BaaderK01, author = {Franz Baader and Ralf K{\"{u}}sters}, editor = {Carole A. Goble and Deborah L. McGuinness and Ralf M{\"{o}}ller and Peter F. Patel{-}Schneider}, title = {Unification in a Description Logic with Transitive Closure of Roles}, booktitle = {Working Notes of the 2001 International Description Logics Workshop (DL-2001), Stanford, CA, USA, August 1-3, 2001}, series = {{CEUR} Workshop Proceedings}, volume = {49}, publisher = {CEUR-WS.org}, year = {2001}, url = {https://ceur-ws.org/Vol-49/BaaderKuesters-36start.ps}, timestamp = {Fri, 10 Mar 2023 16:23:16 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BaaderK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/BaaderBK01, author = {Franz Baader and Sebastian Brandt and Ralf K{\"{u}}sters}, editor = {Bernhard Nebel}, title = {Matching under Side Conditions in Description Logics}, booktitle = {Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, {IJCAI} 2001, Seattle, Washington, USA, August 4-10, 2001}, pages = {213--218}, publisher = {Morgan Kaufmann}, year = {2001}, timestamp = {Tue, 20 Aug 2019 16:18:14 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/BaaderBK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/KustersM01, author = {Ralf K{\"{u}}sters and Ralf Molitor}, editor = {Bernhard Nebel}, title = {Computing Least Common Subsumers in {ALEN}}, booktitle = {Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, {IJCAI} 2001, Seattle, Washington, USA, August 4-10, 2001}, pages = {219--224}, publisher = {Morgan Kaufmann}, year = {2001}, timestamp = {Fri, 23 May 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/KustersM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ki/KustersM01, author = {Ralf K{\"{u}}sters and Ralf Molitor}, editor = {Franz Baader and Gerhard Brewka and Thomas Eiter}, title = {Approximating Most Specific Concepts in Description Logics with Existential Restrictions}, booktitle = {{KI} 2001: Advances in Artificial Intelligence, Joint German/Austrian Conference on AI, Vienna, Austria, September 19-21, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2174}, pages = {33--47}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45422-5\_4}, doi = {10.1007/3-540-45422-5\_4}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ki/KustersM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/BaaderK01, author = {Franz Baader and Ralf K{\"{u}}sters}, editor = {Robert Nieuwenhuis and Andrei Voronkov}, title = {Unification in a Description Logic with Transitive Closure of Roles}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 8th International Conference, {LPAR} 2001, Havana, Cuba, December 3-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2250}, pages = {217--232}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45653-8\_15}, doi = {10.1007/3-540-45653-8\_15}, timestamp = {Sun, 02 Oct 2022 16:11:18 +0200}, biburl = {https://dblp.org/rec/conf/lpar/BaaderK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/BorgidaK00, author = {Alexander Borgida and Ralf K{\"{u}}sters}, editor = {Franz Baader and Ulrike Sattler}, title = {What's not in a name: Some Properties of a Purely Structural Approach to Integrating Large {DL} Knowledge Bases}, booktitle = {Proceedings of the 2000 International Workshop on Description Logics (DL2000), Aachen, Germany, August 17-19, 2000}, series = {{CEUR} Workshop Proceedings}, volume = {33}, pages = {65--78}, publisher = {CEUR-WS.org}, year = {2000}, url = {https://ceur-ws.org/Vol-33/Borgida65-78.ps}, timestamp = {Fri, 10 Mar 2023 16:23:17 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BorgidaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kr/BaaderK00, author = {Franz Baader and Ralf K{\"{u}}sters}, editor = {Anthony G. Cohn and Fausto Giunchiglia and Bart Selman}, title = {Matching Concept Descriptions with Existential Restrictions}, booktitle = {{KR} 2000, Principles of Knowledge Representation and Reasoning Proceedings of the Seventh International Conference, Breckenridge, Colorado, USA, April 11-15, 2000}, pages = {261--272}, publisher = {Morgan Kaufmann}, year = {2000}, timestamp = {Tue, 20 Jun 2023 09:03:42 +0200}, biburl = {https://dblp.org/rec/conf/kr/BaaderK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kr/BaaderKM00, author = {Franz Baader and Ralf K{\"{u}}sters and Ralf Molitor}, editor = {Anthony G. Cohn and Fausto Giunchiglia and Bart Selman}, title = {Rewriting Concepts Using Terminologies}, booktitle = {{KR} 2000, Principles of Knowledge Representation and Reasoning Proceedings of the Seventh International Conference, Breckenridge, Colorado, USA, April 11-15, 2000}, pages = {297--308}, publisher = {Morgan Kaufmann}, year = {2000}, timestamp = {Fri, 18 May 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kr/BaaderKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/BaaderKBM99, author = {Franz Baader and Ralf K{\"{u}}sters and Alexander Borgida and Deborah L. McGuinness}, title = {Matching in Description Logics}, journal = {J. Log. Comput.}, volume = {9}, number = {3}, pages = {411--447}, year = {1999}, url = {https://doi.org/10.1093/logcom/9.3.411}, doi = {10.1093/LOGCOM/9.3.411}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/logcom/BaaderKBM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/BaaderK99, author = {Franz Baader and Ralf K{\"{u}}sters}, editor = {Patrick Lambrix and Alexander Borgida and Maurizio Lenzerini and Ralf M{\"{o}}ller and Peter F. Patel{-}Schneider}, title = {Matching in Description Logics with Existential Restrictions}, booktitle = {Proceedings of the 1999 International Workshop on Description Logics (DL'99), Link{\"{o}}ping, Sweden, July 30 - August 1, 1999}, series = {{CEUR} Workshop Proceedings}, volume = {22}, publisher = {CEUR-WS.org}, year = {1999}, url = {https://ceur-ws.org/Vol-22/baaderkuesters.ps}, timestamp = {Fri, 10 Mar 2023 16:23:16 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BaaderK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/BaaderKM99, author = {Franz Baader and Ralf K{\"{u}}sters and Ralf Molitor}, editor = {Thomas Dean}, title = {Computing Least Common Subsumers in Description Logics with Existential Restrictions}, booktitle = {Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, {IJCAI} 99, Stockholm, Sweden, July 31 - August 6, 1999. 2 Volumes, 1450 pages}, pages = {96--103}, publisher = {Morgan Kaufmann}, year = {1999}, url = {http://ijcai.org/Proceedings/99-1/Papers/015.pdf}, timestamp = {Tue, 20 Aug 2019 16:18:16 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/BaaderKM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/BaaderK98, author = {Franz Baader and Ralf K{\"{u}}sters}, editor = {Enrico Franconi and Giuseppe De Giacomo and Robert M. MacGregor and Werner Nutt and Christopher A. Welty}, title = {Least Common Subsumer Computation w.r.t. cyclic ALN-Terminologies}, booktitle = {Proceedings of the 1998 International Workshop on Description Logics (DL'98), IRST, Povo - Trento, Italy, June 6-8, 1998}, series = {{CEUR} Workshop Proceedings}, volume = {11}, publisher = {CEUR-WS.org}, year = {1998}, url = {https://ceur-ws.org/Vol-11/BaaderKuesters.ps}, timestamp = {Fri, 10 Mar 2023 16:23:17 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BaaderK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/BaaderKM98, author = {Franz Baader and Ralf K{\"{u}}sters and Ralf Molitor}, editor = {Enrico Franconi and Giuseppe De Giacomo and Robert M. MacGregor and Werner Nutt and Christopher A. Welty}, title = {Structural Subsumption Considered from an Automata-Theoretic Point of View}, booktitle = {Proceedings of the 1998 International Workshop on Description Logics (DL'98), IRST, Povo - Trento, Italy, June 6-8, 1998}, series = {{CEUR} Workshop Proceedings}, volume = {11}, publisher = {CEUR-WS.org}, year = {1998}, url = {https://ceur-ws.org/Vol-11/BaaderKuestersMolitor.ps}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dlog/BaaderKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ki/BaaderK98, author = {Franz Baader and Ralf K{\"{u}}sters}, editor = {Otthein Herzog and Andreas G{\"{u}}nter}, title = {Computing the Least Common Subsumer and the Most Specific Concept in the Presence of Cyclic ALN-Concept Descriptions}, booktitle = {{KI-98:} Advances in Artificial Intelligence, 22nd Annual German Conference on Artificial Intelligence, Bremen, Germany, September 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1504}, pages = {129--140}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0095434}, doi = {10.1007/BFB0095434}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ki/BaaderK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kr/Kusters98, author = {Ralf K{\"{u}}sters}, editor = {Anthony G. Cohn and Lenhart K. Schubert and Stuart C. Shapiro}, title = {Characterizing the Semantics of Terminological Cycles in {ALN} Using Finite Automata}, booktitle = {Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR'98), Trento, Italy, June 2-5, 1998}, pages = {499--511}, publisher = {Morgan Kaufmann}, year = {1998}, timestamp = {Tue, 20 Jun 2023 09:03:42 +0200}, biburl = {https://dblp.org/rec/conf/kr/Kusters98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlog/Kusters97, author = {Ralf K{\"{u}}sters}, editor = {Ronald J. Brachman and Francesco M. Donini and Enrico Franconi and Ian Horrocks and Alon Y. Levy and Marie{-}Christine Rousset}, title = {Characterizing the semantics of terminological cycles with the help of finite automata}, booktitle = {Proceedings of the 1997 International Workshop on Description Logics, Universit{\'{e}} Paris-Sud, Centre d'Orsay, Laboratoire de Recherche en Informatique LRI, France}, series = {{URA-CNRS}}, volume = {410}, year = {1997}, url = {http://dl.kr.org/dl97/proceedings/kuesters.ps.gz}, timestamp = {Tue, 12 Apr 2022 14:46:29 +0200}, biburl = {https://dblp.org/rec/conf/dlog/Kusters97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.