BibTeX records: Ralf Küsters

download as .bib file

@article{DBLP:journals/corr/abs-2402-18970,
  author       = {Mayar Elfares and
                  Pascal Reisert and
                  Zhiming Hu and
                  Wenwu Tang and
                  Ralf K{\"{u}}sters and
                  Andreas Bulling},
  title        = {PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure
                  Multi-Party Computation},
  journal      = {CoRR},
  volume       = {abs/2402.18970},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.18970},
  doi          = {10.48550/ARXIV.2402.18970},
  eprinttype    = {arXiv},
  eprint       = {2402.18970},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-18970.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosseyniKW24,
  author       = {Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Tim W{\"{u}}rtele},
  title        = {Formal Security Analysis of the OpenID {FAPI} 2.0: Accompanying a
                  Standardization Process},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/078},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HosseyniKW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RiviniusRHK23,
  author       = {Marc Rivinius and
                  Pascal Reisert and
                  Sebastian Hasler and
                  Ralf K{\"{u}}sters},
  title        = {Convolutions in Overdrive: Maliciously Secure Convolutions for {MPC}},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {3},
  pages        = {321--353},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0084},
  doi          = {10.56553/POPETS-2023-0084},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/RiviniusRHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ReisertRKK23,
  author       = {Pascal Reisert and
                  Marc Rivinius and
                  Toomas Krips and
                  Ralf K{\"{u}}sters},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Overdrive LowGear 2.0: Reduced-Bandwidth {MPC} without Sacrifice},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {372--386},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582809},
  doi          = {10.1145/3579856.3582809},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ReisertRKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BhargavanBHKPSWW23,
  author       = {Karthikeyan Bhargavan and
                  Abhishek Bichhawat and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Klaas Pruiksma and
                  Guido Schmitz and
                  Clara Waldmann and
                  Tim W{\"{u}}rtele},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Layered Symbolic Security Analysis in {\textdollar}{\textbackslash}textsf
                  \{DY\}{\^{}}{\textbackslash}star {\textdollar}},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_1},
  doi          = {10.1007/978-3-031-51479-1\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BhargavanBHKPSWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WabarthaLHRK23,
  author       = {Carmen Wabartha and
                  Julian Liedtke and
                  Nicolas Huber and
                  Daniel Rausch and
                  Ralf K{\"{u}}sters},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with
                  Seat-Allocations},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {209--228},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_11},
  doi          = {10.1007/978-3-031-50594-2\_11},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WabarthaLHRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HelmschmidtHKPWW23,
  author       = {Florian Helmschmidt and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Klaas Pruiksma and
                  Clara Waldmann and
                  Tim W{\"{u}}rtele},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {The Grant Negotiation and Authorization Protocol: Attacking, Fixing,
                  and Verifying an Emerging Standard},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {222--242},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_12},
  doi          = {10.1007/978-3-031-51479-1\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HelmschmidtHKPWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrafKR23,
  author       = {Mike Graf and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {{AUC:} Accountable Universal Composability},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1148--1167},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179384},
  doi          = {10.1109/SP46215.2023.10179384},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GrafKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiviniusRHK23,
  author       = {Marc Rivinius and
                  Pascal Reisert and
                  Sebastian Hasler and
                  Ralf K{\"{u}}sters},
  title        = {Convolutions in Overdrive: Maliciously Secure Convolutions for {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/359},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiviniusRHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaslerKKRR23,
  author       = {Sebastian Hasler and
                  Toomas Krips and
                  Ralf K{\"{u}}sters and
                  Pascal Reisert and
                  Marc Rivinius},
  title        = {Overdrive LowGear 2.0: Reduced-Bandwidth {MPC} without Sacrifice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/462},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaslerKKRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WabarthaLHRK23,
  author       = {Carmen Wabartha and
                  Julian Liedtke and
                  Nicolas Huber and
                  Daniel Rausch and
                  Ralf K{\"{u}}sters},
  title        = {Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with
                  Seat-Allocations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1289},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1289},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WabarthaLHRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HelmschmidtHKPWW23,
  author       = {Florian Helmschmidt and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Klaas Pruiksma and
                  Clara Waldmann and
                  Tim W{\"{u}}rtele},
  title        = {The Grant Negotiation and Authorization Protocol: Attacking, Fixing,
                  and Verifying an Emerging Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1325},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1325},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HelmschmidtHKPWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavanBHKPSWW23,
  author       = {Karthikeyan Bhargavan and
                  Abhishek Bichhawat and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Klaas Pruiksma and
                  Guido Schmitz and
                  Clara Waldmann and
                  Tim W{\"{u}}rtele},
  title        = {Layered Symbolic Security Analysis in DY{\textdollar}{\^{}}{\textbackslash}star{\textdollar}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1329},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1329},
  timestamp    = {Mon, 09 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanBHKPSWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrafKREBF23,
  author       = {Mike Graf and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch and
                  Simon Egger and
                  Marvin Bechtold and
                  Marcel Flinspach},
  title        = {Accountable Bulletin Boards: Definition and Provably Secure Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1869},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1869},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GrafKREBF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaslerRRK23,
  author       = {Sebastian Hasler and
                  Pascal Reisert and
                  Marc Rivinius and
                  Ralf K{\"{u}}sters},
  title        = {Multipars: Reduced-Communication {MPC} over Z2k},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1932},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1932},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HaslerRRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuberKKL00R022,
  author       = {Nicolas Huber and
                  Ralf K{\"{u}}sters and
                  Toomas Krips and
                  Julian Liedtke and
                  Johannes M{\"{u}}ller and
                  Daniel Rausch and
                  Pascal Reisert and
                  Andreas Vogt},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Kryvos: Publicly Tally-Hiding Verifiable E-Voting},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1443--1457},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560701},
  doi          = {10.1145/3548606.3560701},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuberKKL00R022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/AmrouchABBBDEEG22,
  author       = {Hussam Amrouch and
                  Jens Anders and
                  Steffen Becker and
                  Maik Betka and
                  Gerd Bleher and
                  Peter Domanski and
                  Nourhan Elhamawy and
                  Thomas Ertl and
                  Athanasios Gatzastras and
                  Paul R. Genssler and
                  Sebastian Hasler and
                  Martin Heinrich and
                  Andr{\'{e}} van Hoorn and
                  Hanieh Jafarzadeh and
                  Ingmar Kallfass and
                  Florian Klemme and
                  Steffen Koch and
                  Ralf K{\"{u}}sters and
                  Andr{\'{e}}s Lalama and
                  Rapha{\"{e}}l Latty and
                  Yiwen Liao and
                  Natalia Lylina and
                  Zahra Paria Najafi{-}Haghi and
                  Dirk Pfl{\"{u}}ger and
                  Ilia Polian and
                  Jochen Rivoir and
                  Matthias Sauer and
                  Denis Schwachhofer and
                  Steffen Templin and
                  Christian Volmer and
                  Stefan Wagner and
                  Daniel Weiskopf and
                  Hans{-}Joachim Wunderlich and
                  Bin Yang and
                  Martin Zimmermann},
  editor       = {Cristiana Bolchini and
                  Ingrid Verbauwhede and
                  Ioana Vatajelu},
  title        = {Intelligent Methods for Test and Reliability},
  booktitle    = {2022 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2022, Antwerp, Belgium, March 14-23, 2022},
  pages        = {969--974},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/DATE54114.2022.9774526},
  doi          = {10.23919/DATE54114.2022.9774526},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/AmrouchABBBDEEG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RauschKC22,
  author       = {Daniel Rausch and
                  Ralf K{\"{u}}sters and
                  C{\'{e}}line Chevalier},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Embedding the {UC} Model into the {IITM} Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {242--272},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_9},
  doi          = {10.1007/978-3-031-07085-3\_9},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RauschKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gazeml/ElfaresHRBK22,
  author       = {Mayar Elfares and
                  Zhiming Hu and
                  Pascal Reisert and
                  Andreas Bulling and
                  Ralf K{\"{u}}sters},
  editor       = {Ismini Lourentzou and
                  Joy T. Wu and
                  Satyananda Kashyap and
                  Alexandros Karargyris and
                  Leo Anthony Celi and
                  Ban Kawas and
                  Sachin S. Talathi},
  title        = {Federated Learning for Appearance-based Gaze Estimation in the Wild},
  booktitle    = {Proceedings of The 1st Gaze Meets {ML} workshop, in conjunction with
                  the Annual Conference on Neural Information Processing Systems, 03
                  December 2022, New Orleans, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {210},
  pages        = {20--36},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v210/elfares23a.html},
  timestamp    = {Wed, 06 Sep 2023 17:05:54 +0200},
  biburl       = {https://dblp.org/rec/conf/gazeml/ElfaresHRBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BeckertBGKKKMMN22,
  author       = {Bernhard Beckert and
                  Jurlind Budurushi and
                  Armin Grunwald and
                  Robert Krimmer and
                  Oksana Kulyk and
                  Ralf K{\"{u}}sters and
                  Andreas Mayer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Stephan Neumann and
                  Melanie Volkamer},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Recent Developments in the Context of Online Elections and Digital
                  Polls in Germany},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {213--217},
  publisher    = {Gesellschaft f{\"{u}}r Informatik, Bonn},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_16},
  doi          = {10.18420/SICHERHEIT2022\_16},
  timestamp    = {Tue, 04 Jul 2023 17:42:02 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BeckertBGKKKMMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/0001HKSWW22,
  author       = {Quoc Huy Do and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz and
                  Nils Wenzler and
                  Tim W{\"{u}}rtele},
  title        = {A Formal Security Analysis of the {W3C} Web Payment APIs: Attacks
                  and Verification},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {215--234},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833681},
  doi          = {10.1109/SP46214.2022.9833681},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/0001HKSWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RiviniusR0K22,
  author       = {Marc Rivinius and
                  Pascal Reisert and
                  Daniel Rausch and
                  Ralf K{\"{u}}sters},
  title        = {Publicly Accountable Robust Multi-Party Computation},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2430--2449},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833608},
  doi          = {10.1109/SP46214.2022.9833608},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RiviniusR0K22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-07330,
  author       = {Mayar Elfares and
                  Zhiming Hu and
                  Pascal Reisert and
                  Andreas Bulling and
                  Ralf K{\"{u}}sters},
  title        = {Federated Learning for Appearance-based Gaze Estimation in the Wild},
  journal      = {CoRR},
  volume       = {abs/2211.07330},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.07330},
  doi          = {10.48550/ARXIV.2211.07330},
  eprinttype    = {arXiv},
  eprint       = {2211.07330},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-07330.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauschKC22,
  author       = {Daniel Rausch and
                  Ralf K{\"{u}}sters and
                  C{\'{e}}line Chevalier},
  title        = {Embedding the {UC} Model into the {IITM} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/224},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RauschKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiviniusRRK22,
  author       = {Marc Rivinius and
                  Pascal Reisert and
                  Daniel Rausch and
                  Ralf K{\"{u}}sters},
  title        = {Publicly Accountable Robust Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/436},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiviniusRRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReisertRKK22,
  author       = {Pascal Reisert and
                  Marc Rivinius and
                  Toomas Krips and
                  Ralf K{\"{u}}sters},
  title        = {Arithmetic Tuples for {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/667},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReisertRKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuberKKL00R022,
  author       = {Nicolas Huber and
                  Ralf K{\"{u}}sters and
                  Toomas Krips and
                  Julian Liedtke and
                  Johannes M{\"{u}}ller and
                  Daniel Rausch and
                  Pascal Reisert and
                  Andreas Vogt},
  title        = {Kryvos: Publicly Tally-Hiding Verifiable E-Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1132},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1132},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuberKKL00R022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrafKR22,
  author       = {Mike Graf and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {{AUC:} Accountable Universal Composability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1606},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1606},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GrafKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BhargavanB0HKSW21,
  author       = {Karthikeyan Bhargavan and
                  Abhishek Bichhawat and
                  Quoc Huy Do and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz and
                  Tim W{\"{u}}rtele},
  editor       = {Daniel Dougherty and
                  Jos{\'{e}} Meseguer and
                  Sebastian Alexander M{\"{o}}dersheim and
                  Paul D. Rowe},
  title        = {A Tutorial-Style Introduction to DY*},
  booktitle    = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman
                  on the Occasion of his 66.66th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {13066},
  pages        = {77--97},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91631-2\_4},
  doi          = {10.1007/978-3-030-91631-2\_4},
  timestamp    = {Thu, 21 Sep 2023 09:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BhargavanB0HKSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/00010R0KS21,
  author       = {Mike Graf and
                  Daniel Rausch and
                  Viktoria Ronge and
                  Christoph Egger and
                  Ralf K{\"{u}}sters and
                  Dominique Schr{\"{o}}der},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {A Security Framework for Distributed Ledgers},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1043--1064},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485362},
  doi          = {10.1145/3460120.3485362},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/00010R0KS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhargavanB0HKSW21,
  author       = {Karthikeyan Bhargavan and
                  Abhishek Bichhawat and
                  Quoc Huy Do and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz and
                  Tim W{\"{u}}rtele},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {An In-Depth Symbolic Security Analysis of the {ACME} Standard},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2601--2617},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484588},
  doi          = {10.1145/3460120.3484588},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhargavanB0HKSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BhargavanBDHKSW21,
  author       = {Karthikeyan Bhargavan and
                  Abhishek Bichhawat and
                  Quoc Huy Do and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz and
                  Tim W{\"{u}}rtele},
  title        = {DY*: {A} Modular Symbolic Verification Framework for Executable Cryptographic
                  Protocol Code},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {523--542},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00042},
  doi          = {10.1109/EUROSP51992.2021.00042},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BhargavanBDHKSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2021,
  editor       = {Avishek Adhikari and
                  Ralf K{\"{u}}sters and
                  Bart Preneel},
  title        = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference
                  on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92518-5},
  doi          = {10.1007/978-3-030-92518-5},
  isbn         = {978-3-030-92517-8},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EggerGKRRS21,
  author       = {Christoph Egger and
                  Mike Graf and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch and
                  Viktoria Ronge and
                  Dominique Schr{\"{o}}der},
  title        = {A Security Framework for Distributed Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/145},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EggerGKRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoHKSWW21,
  author       = {Quoc Huy Do and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz and
                  Nils Wenzler and
                  Tim W{\"{u}}rtele},
  title        = {A Formal Security Analysis of the {W3C} Web Payment APIs: Attacks
                  and Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1012},
  timestamp    = {Fri, 10 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoHKSWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HertelHKKLR21,
  author       = {Fabian Hertel and
                  Nicolas Huber and
                  Jonas Kittelberger and
                  Ralf K{\"{u}}sters and
                  Julian Liedtke and
                  Daniel Rausch},
  title        = {Extending the Tally-Hiding Ordinos System: Implementations for Borda,
                  Hare-Niemeyer, Condorcet, and Instant-Runoff Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1420},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1420},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HertelHKKLR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavanBDHKSW21,
  author       = {Karthikeyan Bhargavan and
                  Abhishek Bichhawat and
                  Quoc Huy Do and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz and
                  Tim W{\"{u}}rtele},
  title        = {An In-Depth Symbolic Security Analysis of the {ACME} Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1457},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1457},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanBDHKSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KustersTR20,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal and
                  Daniel Rausch},
  title        = {The {IITM} Model: {A} Simple and Expressive Model for Universal Composability},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1461--1584},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09352-1},
  doi          = {10.1007/S00145-020-09352-1},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KustersTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KustersTR20a,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal and
                  Daniel Rausch},
  title        = {Joint State Composition Theorems for Public-Key Encryption and Digital
                  Signature Functionalities with Local Computation},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1585--1658},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09353-0},
  doi          = {10.1007/S00145-020-09353-0},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KustersTR20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KustersL00020,
  author       = {Ralf K{\"{u}}sters and
                  Julian Liedtke and
                  Johannes M{\"{u}}ller and
                  Daniel Rausch and
                  Andreas Vogt},
  title        = {Ordinos: {A} Verifiable Tally-Hiding E-Voting System},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {216--235},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00022},
  doi          = {10.1109/EUROSP48549.2020.00022},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KustersL00020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GrafK020,
  author       = {Mike Graf and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger
                  Fabric},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {236--255},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00023},
  doi          = {10.1109/EUROSP48549.2020.00023},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/GrafK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/evoteid/2020,
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Oksana Kulyk and
                  David Duenas{-}Cid and
                  Mikhel Solvak},
  title        = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
                  2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12455},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60347-2},
  doi          = {10.1007/978-3-030-60347-2},
  isbn         = {978-3-030-60346-5},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersRS20,
  author       = {Ralf K{\"{u}}sters and
                  Daniel Rausch and
                  Mike Simon},
  title        = {Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger
                  Fabric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/386},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersLMRV20,
  author       = {Ralf K{\"{u}}sters and
                  Julian Liedtke and
                  Johannes M{\"{u}}ller and
                  Daniel Rausch and
                  Andreas Vogt},
  title        = {Ordinos: {A} Verifiable Tally-Hiding E-Voting System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/405},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersLMRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischKK019,
  author       = {Jan Camenisch and
                  Stephan Krenn and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {iUC: Flexible Universal Composability Made Simple},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {191--221},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_7},
  doi          = {10.1007/978-3-030-34618-8\_7},
  timestamp    = {Fri, 22 Nov 2019 13:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CamenischKK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FettHK19,
  author       = {Daniel Fett and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters},
  title        = {An Extensive Formal Security Analysis of the OpenID Financial-Grade
                  {API}},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {453--471},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00067},
  doi          = {10.1109/SP.2019.00067},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FettHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2019,
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  V{\'{e}}ronique Cortier and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Uwe Serd{\"{u}}lt and
                  David Duenas{-}Cid},
  title        = {Electronic Voting - 4th International Joint Conference, E-Vote-ID
                  2019, Bregenz, Austria, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11759},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30625-0},
  doi          = {10.1007/978-3-030-30625-0},
  isbn         = {978-3-030-30624-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-11520,
  author       = {Daniel Fett and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters},
  title        = {An Extensive Formal Security Analysis of the OpenID Financial-grade
                  {API}},
  journal      = {CoRR},
  volume       = {abs/1901.11520},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.11520},
  eprinttype    = {arXiv},
  eprint       = {1901.11520},
  timestamp    = {Mon, 04 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-11520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/CamenischKLS19,
  author       = {Jan Camenisch and
                  Ralf K{\"{u}}sters and
                  Anna Lysyanskaya and
                  Alessandra Scafuro},
  title        = {Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl
                  Seminar 19042)},
  journal      = {Dagstuhl Reports},
  volume       = {9},
  number       = {1},
  pages        = {88--103},
  year         = {2019},
  url          = {https://doi.org/10.4230/DagRep.9.1.88},
  doi          = {10.4230/DAGREP.9.1.88},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKKR19,
  author       = {Jan Camenisch and
                  Stephan Krenn and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {iUC: Flexible Universal Composability Made Simple},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1073},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischKKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2018,
  editor       = {Lujo Bauer and
                  Ralf K{\"{u}}sters},
  title        = {Principles of Security and Trust - 7th International Conference, {POST}
                  2018, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10804},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89722-6},
  doi          = {10.1007/978-3-319-89722-6},
  isbn         = {978-3-319-89721-9},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FettKS17,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {The Web {SSO} Standard OpenID Connect: In-depth Formal Security Analysis
                  and Security Guidelines},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {189--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.20},
  doi          = {10.1109/CSF.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FettKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersR17,
  author       = {Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {A Framework for Universally Composable Diffie-Hellman Key Exchange},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {881--900},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.63},
  doi          = {10.1109/SP.2017.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KustersR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/Kusters017,
  author       = {Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Cryptographic Security Analysis of E-voting Systems: Achievements,
                  Misconceptions, and Limitations},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {21--41},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_2},
  doi          = {10.1007/978-3-319-68687-5\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/Kusters017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FettKS17,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {The Web {SSO} Standard OpenID Connect: In-Depth Formal Security Analysis
                  and Security Guidelines},
  journal      = {CoRR},
  volume       = {abs/1704.08539},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.08539},
  eprinttype    = {arXiv},
  eprint       = {1704.08539},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FettKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersR17,
  author       = {Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {A Framework for Universally Composable Diffie-Hellman Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischEKK016,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Stephan Krenn and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Universal Composition with Responsive Environments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {807--840},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_27},
  doi          = {10.1007/978-3-662-53890-6\_27},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CamenischEKK016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FettKS16,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {A Comprehensive Formal Security Analysis of OAuth 2.0},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1204--1215},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978385},
  doi          = {10.1145/2976749.2978385},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FettKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersMST16,
  author       = {Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Enrico Scapin and
                  Tomasz Truderung},
  title        = {sElect: {A} Lightweight Verifiable Remote Voting System},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {341--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.31},
  doi          = {10.1109/CSF.2016.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersMST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KustersT16,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Security Analysis of Re-Encryption {RPC} Mix Nets},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {227--242},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.27},
  doi          = {10.1109/EUROSP.2016.27},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KustersT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CortierGKMT16,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {SoK: Verifiability Notions for E-Voting Protocols},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {779--798},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.52},
  doi          = {10.1109/SP.2016.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CortierGKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FettKS16,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {A Comprehensive Formal Security Analysis of OAuth 2.0},
  journal      = {CoRR},
  volume       = {abs/1601.01229},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.01229},
  eprinttype    = {arXiv},
  eprint       = {1601.01229},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FettKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEKKR16,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Stephan Krenn and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {Universal Composition with Responsive Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischEKKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGKMT16,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {Verifiability Notions for E-Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/287},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersMST16,
  author       = {Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Enrico Scapin and
                  Tomasz Truderung},
  title        = {sElect: {A} Lightweight Verifiable Remote Voting System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/438},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersMST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FettKS15,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{SPRESSO:} {A} Secure, Privacy-Respecting Single Sign-On System for
                  the Web},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1358--1369},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813726},
  doi          = {10.1145/2810103.2813726},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FettKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTBBKM15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Bernhard Beckert and
                  Daniel Bruns and
                  Michael Kirsten and
                  Martin Mohr},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {A Hybrid Approach for Proving Noninterference of Java Programs},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {305--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.28},
  doi          = {10.1109/CSF.2015.28},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTBBKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FettKS15,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Analyzing the BrowserID {SSO} System with Primary Identity Providers
                  Using an Expressive Model of the Web},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {43--65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_3},
  doi          = {10.1007/978-3-319-24174-6\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FettKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FettKS15,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {{SPRESSO:} {A} Secure, Privacy-Respecting Single Sign-On System for
                  the Web},
  journal      = {CoRR},
  volume       = {abs/1508.01719},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.01719},
  eprinttype    = {arXiv},
  eprint       = {1508.01719},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FettKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Security Analysis of Re-Encryption {RPC} Mix Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTBBKM15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Bernhard Beckert and
                  Daniel Bruns and
                  Michael Kirsten and
                  Martin Mohr},
  title        = {A Hybrid Approach for Proving Noninterference of Java Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTBBKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/KustersT14,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Security in e-voting},
  journal      = {it Inf. Technol.},
  volume       = {56},
  number       = {6},
  pages        = {300--306},
  year         = {2014},
  url          = {http://www.degruyter.com/view/j/itit.2014.56.issue-6/itit-2014-1062/itit-2014-1062.xml},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/KustersT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/KustersSTG14,
  author       = {Ralf K{\"{u}}sters and
                  Enrico Scapin and
                  Tomasz Truderung and
                  Juergen Graf},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Extending and Applying a Framework for the Cryptographic Verification
                  of Java Programs},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {220--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_12},
  doi          = {10.1007/978-3-642-54792-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/KustersSTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersT014,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {343--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.29},
  doi          = {10.1109/SP.2014.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KustersT014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FettKS14,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {An Expressive Model for the Web Infrastructure: Definition and Application
                  to the Browser {ID} {SSO} System},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {673--688},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.49},
  doi          = {10.1109/SP.2014.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FettKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/Kusters14,
  author       = {Ralf K{\"{u}}sters},
  editor       = {Orna Grumberg and
                  Helmut Seidl and
                  Maximilian Irlbeck},
  title        = {E-Voting Systems},
  booktitle    = {Software Systems Safety},
  series       = {{NATO} Science for Peace and Security Series, {D:} Information and
                  Communication Security},
  volume       = {36},
  pages        = {135--164},
  publisher    = {{IOS} Press},
  year         = {2014},
  url          = {https://doi.org/10.3233/978-1-61499-385-8-135},
  doi          = {10.3233/978-1-61499-385-8-135},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/Kusters14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FettKS14,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {An Expressive Model for the Web Infrastructure: Definition and Application
                  to the BrowserID {SSO} System},
  journal      = {CoRR},
  volume       = {abs/1403.1866},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.1866},
  eprinttype    = {arXiv},
  eprint       = {1403.1866},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FettKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FettKS14a,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {Analyzing the BrowserID {SSO} System with Primary Identity Providers
                  Using an Expressive Model of the Web},
  journal      = {CoRR},
  volume       = {abs/1411.7210},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.7210},
  eprinttype    = {arXiv},
  eprint       = {1411.7210},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FettKS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersSTG14,
  author       = {Ralf K{\"{u}}sters and
                  Enrico Scapin and
                  Tomasz Truderung and
                  Juergen Graf},
  title        = {Extending and Applying a Framework for the Cryptographic Verification
                  of Java Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersSTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT014,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT13,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {The {IITM} Model: a Simple and Expressive Model for Universal Composability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KustersT012,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A game-based definition of coercion resistance and its applications},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {709--764},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0444},
  doi          = {10.3233/JCS-2012-0444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KustersT012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTG12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Juergen Graf},
  editor       = {Stephen Chong},
  title        = {A Framework for the Cryptographic Verification of Java-Like Programs},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {198--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.9},
  doi          = {10.1109/CSF.2012.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersTV12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Clash Attacks on the Verifiability of E-Voting Systems},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {395--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.32},
  doi          = {10.1109/SP.2012.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KustersTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Clash Attacks on the Verifiability of E-Voting Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTG12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Juergen Graf},
  title        = {A Framework for the Cryptographic Verification of Java-like Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/vi/Kusters2011,
  author       = {Ralf K{\"{u}}sters and
                  Thomas Wilke},
  title        = {Moderne Kryptographie - Eine Einf{\"{u}}hrung},
  publisher    = {Vieweg + Teubner},
  year         = {2011},
  isbn         = {978-3-519-00509-4},
  timestamp    = {Wed, 04 Jan 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/vi/Kusters2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/KustersT11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Reducing Protocol Analysis with {XOR} to the XOR-Free Case in the
                  Horn Theory Based Approach},
  journal      = {J. Autom. Reason.},
  volume       = {46},
  number       = {3-4},
  pages        = {325--352},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10817-010-9188-8},
  doi          = {10.1007/S10817-010-9188-8},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/KustersT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KustersT11,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Composition theorems without pre-established session identifiers},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046715},
  doi          = {10.1145/2046707.2046715},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KustersT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KustersT11,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  editor       = {Aggelos Kiayias},
  title        = {Ideal Key Derivation and Encryption in Simulation-Based Security},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {161--179},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_12},
  doi          = {10.1007/978-3-642-19074-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KustersT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersTV11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Verifiability, Privacy, and Coercion-Resistance: New Insights from
                  a Case Study},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {538--553},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.21},
  doi          = {10.1109/SP.2011.21},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KustersTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-0238,
  author       = {Alexander Borgida and
                  Ralf K{\"{u}}sters},
  title        = {What's in an Attribute? Consequences for the Least Common Subsumer},
  journal      = {CoRR},
  volume       = {abs/1106.0238},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.0238},
  eprinttype    = {arXiv},
  eprint       = {1106.0238},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-0238.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Comon-LundhKM11,
  author       = {Hubert Comon{-}Lundh and
                  Ralf K{\"{u}}sters and
                  Catherine Meadows},
  title        = {Security and Rewriting (Dagstuhl Seminar 11332)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {8},
  pages        = {53--66},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.8.53},
  doi          = {10.4230/DAGREP.1.8.53},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Comon-LundhKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT11,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Composition Theorems Without Pre-Established Session Identifiers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Verifiability, Privacy, and Coercion-Resistance: New Insights from
                  a Case Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/KahlerKW10,
  author       = {Detlef K{\"{a}}hler and
                  Ralf K{\"{u}}sters and
                  Thomas Wilke},
  title        = {Deciding strategy properties of contract-signing protocols},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {11},
  number       = {3},
  pages        = {17:1--17:42},
  year         = {2010},
  url          = {https://doi.org/10.1145/1740582.1740585},
  doi          = {10.1145/1740582.1740585},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/KahlerKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Accountability: definition and relationship to verifiability},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {526--535},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866366},
  doi          = {10.1145/1866307.1866366},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A Game-Based Definition of Coercion-Resistance and Its Applications},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {122--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.16},
  doi          = {10.1109/CSF.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Proving Coercion-Resistance of Scantegrity {II}},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {281--295},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_20},
  doi          = {10.1007/978-3-642-17650-0\_20},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KustersST10,
  author       = {Ralf K{\"{u}}sters and
                  Henning Schnoor and
                  Tomasz Truderung},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {A Formal Definition of Online Abuse-Freeness},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {484--497},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_28},
  doi          = {10.1007/978-3-642-16161-2\_28},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KustersST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Accountability: Definition and Relationship to Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT10,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Ideal Key Derivation and Encryption in Simulation-based Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV10a,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Proving Coercion-Resistance of Scantegrity {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KustersT09,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Computational soundness for key exchange protocols with symmetric
                  encryption},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653674},
  doi          = {10.1145/1653662.1653674},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KustersT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersT09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {157--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.17},
  doi          = {10.1109/CSF.2009.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersT09a,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Universally Composable Symmetric Encryption},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {293--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.18},
  doi          = {10.1109/CSF.2009.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersT09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersT09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {An Epistemic Approach to Coercion-Resistance for Electronic Voting
                  Protocols},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {251--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.13},
  doi          = {10.1109/SP.2009.13},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KustersT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/KustersTV09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  editor       = {Peter Y. A. Ryan and
                  Berry Schoenmakers},
  title        = {Improving and Simplifying a Variant of Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {E-Voting and Identity, Second International Conference, VoteID 2009,
                  Luxembourg, September 7-8, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5767},
  pages        = {37--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04135-8\_3},
  doi          = {10.1007/978-3-642-04135-8\_3},
  timestamp    = {Thu, 27 Feb 2020 13:11:16 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/KustersTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-0802,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {An Epistemic Approach to Coercion-Resistance for Electronic Voting
                  Protocols},
  journal      = {CoRR},
  volume       = {abs/0903.0802},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.0802},
  eprinttype    = {arXiv},
  eprint       = {0903.0802},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0903-0802.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT09,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Universally Composable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT09a,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Computational Soundness for Key Exchange Protocols with Symmetric
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A Game-Based Definition of Coercion-Resistance and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/DeganoKVZ08,
  author       = {Pierpaolo Degano and
                  Ralf K{\"{u}}sters and
                  Luca Vigan{\`{o}} and
                  Steve Zdancewic},
  title        = {Joint workshop on foundations of computer security and automated reasoning
                  for security protocol analysis {(FCS-ARSPA} '06)},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {129},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.11.003},
  doi          = {10.1016/J.IC.2007.11.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/DeganoKVZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesDHK08,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  title        = {Conditional reactive simulatability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {155--169},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0046-6},
  doi          = {10.1007/S10207-007-0046-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesDHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KustersDMR08,
  author       = {Ralf K{\"{u}}sters and
                  Anupam Datta and
                  John C. Mitchell and
                  Ajith Ramanathan},
  title        = {On the Relationships between Notions of Simulation-Based Security},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {4},
  pages        = {492--546},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-008-9019-9},
  doi          = {10.1007/S00145-008-9019-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KustersDMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ChevalierKRT08,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Complexity results for security protocols with Diffie-Hellman exponentiation
                  and commuting public key encryption},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {9},
  number       = {4},
  pages        = {24:1--24:52},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380572.1380573},
  doi          = {10.1145/1380572.1380573},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ChevalierKRT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KustersT08,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Reducing protocol analysis with {XOR} to the XOR-free case in the
                  horn theory based approach},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455788},
  doi          = {10.1145/1455770.1455788},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KustersT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersT08,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Joint State Theorems for Public-Key Encryption and Digital Signature
                  Functionalities with Local Computation},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {270--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.18},
  doi          = {10.1109/CSF.2008.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0808-0634,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Reducing Protocol Analysis with {XOR} to the XOR-free Case in the
                  Horn Theory Based Approach},
  journal      = {CoRR},
  volume       = {abs/0808.0634},
  year         = {2008},
  url          = {http://arxiv.org/abs/0808.0634},
  eprinttype    = {arXiv},
  eprint       = {0808.0634},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0808-0634.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT08,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Joint State Theorems for Public-Key Encryption and Digital Signature
                  Functionalities with Local Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/KustersW07,
  author       = {Ralf K{\"{u}}sters and
                  Thomas Wilke},
  title        = {Transducer-based analysis of cryptographic protocols},
  journal      = {Inf. Comput.},
  volume       = {205},
  number       = {12},
  pages        = {1741--1776},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ic.2007.08.003},
  doi          = {10.1016/J.IC.2007.08.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/KustersW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KurtzKW07,
  author       = {Klaas Ole K{\"{u}}rtz and
                  Ralf K{\"{u}}sters and
                  Thomas Wilke},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Selecting theories and nonce generation for recursive protocols},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314445},
  doi          = {10.1145/1314436.1314445},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KurtzKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierKW07,
  author       = {V{\'{e}}ronique Cortier and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {A Cryptographic Model for Branching Time Security Properties - The
                  Case of Contract Signing Protocols},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {422--437},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_28},
  doi          = {10.1007/978-3-540-74835-9\_28},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BackesDK07,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Ralf K{\"{u}}sters},
  editor       = {Vikraman Arvind and
                  Sanjiva Prasad},
  title        = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography},
  booktitle    = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
                  Computer Science, 27th International Conference, New Delhi, India,
                  December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4855},
  pages        = {108--120},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77050-3\_9},
  doi          = {10.1007/978-3-540-77050-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BackesDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/KahlerKT07,
  author       = {Detlef K{\"{a}}hler and
                  Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Infinite State AMC-Model Checking for Cryptographic Protocols},
  booktitle    = {22nd {IEEE} Symposium on Logic in Computer Science {(LICS} 2007),
                  10-12 July 2007, Wroclaw, Poland, Proceedings},
  pages        = {181--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/LICS.2007.26},
  doi          = {10.1109/LICS.2007.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/KahlerKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/KustersT07,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  editor       = {Wolfgang Thomas and
                  Pascal Weil},
  title        = {On the Automatic Analysis of Recursive Security Protocols with {XOR}},
  booktitle    = {{STACS} 2007, 24th Annual Symposium on Theoretical Aspects of Computer
                  Science, Aachen, Germany, February 22-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4393},
  pages        = {646--657},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70918-3\_55},
  doi          = {10.1007/978-3-540-70918-3\_55},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/KustersT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDK07,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Ralf K{\"{u}}sters},
  title        = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKW07,
  author       = {V{\'{e}}ronique Cortier and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {A Cryptographic Model for Branching Time Security Properties - the
                  Case of Contract Signing Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Kusters06,
  author       = {Ralf K{\"{u}}sters},
  title        = {Simulation-Based Security with Inexhaustible Interactive Turing Machines},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {309--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.30},
  doi          = {10.1109/CSFW.2006.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Kusters06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesDHK06,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Conditional Reactive Simulatability},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {424--443},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_26},
  doi          = {10.1007/11863908\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesDHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  editor       = {S. Arun{-}Kumar and
                  Naveen Garg},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  booktitle    = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical
                  Computer Science, 26th International Conference, Kolkata, India, December
                  13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4337},
  pages        = {176--187},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11944836\_18},
  doi          = {10.1007/11944836\_18},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KahlerKW06,
  author       = {Detlef K{\"{a}}hler and
                  Ralf K{\"{u}}sters and
                  Thomas Wilke},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {A Dolev-Yao-Based Definition of Abuse-Free Protocols},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_9},
  doi          = {10.1007/11787006\_9},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/KahlerKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0610014,
  author       = {Max Tuengerthal and
                  Ralf K{\"{u}}sters and
                  Mathieu Turuani},
  title        = {Implementing a Unification Algorithm for Protocol Analysis with {XOR}},
  journal      = {CoRR},
  volume       = {abs/cs/0610014},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0610014},
  eprinttype    = {arXiv},
  eprint       = {cs/0610014},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0610014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDHK06,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  title        = {Conditional Reactive Simulatability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kusters06,
  author       = {Ralf K{\"{u}}sters},
  title        = {Simulation-Based Security with Inexhaustible Interactive Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kusters06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaKMR06,
  author       = {Anupam Datta and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell and
                  Ajith Ramanathan},
  title        = {On the Relationships Between Notions of Simulation-Based Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaKMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Kusters05,
  author       = {Ralf K{\"{u}}sters},
  title        = {On the decidability of cryptographic protocols with open-ended data
                  structures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {1-2},
  pages        = {49--70},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0050-z},
  doi          = {10.1007/S10207-004-0050-Z},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Kusters05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sLogica/KustersM05,
  author       = {Ralf K{\"{u}}sters and
                  Ralf Molitor},
  title        = {Structural Subsumption and Least Common Subsumers in a Description
                  Logic with Existential and Number Restrictions},
  journal      = {Stud Logica},
  volume       = {81},
  number       = {2},
  pages        = {227--259},
  year         = {2005},
  url          = {https://doi.org/10.1007/s11225-005-3705-5},
  doi          = {10.1007/S11225-005-3705-5},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sLogica/KustersM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChevalierKRT05,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {An {NP} decision procedure for protocol insecurity with {XOR}},
  journal      = {Theor. Comput. Sci.},
  volume       = {338},
  number       = {1-3},
  pages        = {247--274},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.tcs.2005.01.015},
  doi          = {10.1016/J.TCS.2005.01.015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ChevalierKRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/KahlerK05,
  author       = {Detlef K{\"{a}}hler and
                  Ralf K{\"{u}}sters},
  editor       = {Mart{\'{\i}}n Abadi and
                  Luca de Alfaro},
  title        = {Constraint Solving for Contract-Signing Protocols},
  booktitle    = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference,
                  {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3653},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11539452\_20},
  doi          = {10.1007/11539452\_20},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/KahlerK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/KahlerKW05,
  author       = {Detlef K{\"{a}}hler and
                  Ralf K{\"{u}}sters and
                  Thomas Wilke},
  editor       = {Volker Diekert and
                  Bruno Durand},
  title        = {Deciding Properties of Contract-Signing Protocols},
  booktitle    = {{STACS} 2005, 22nd Annual Symposium on Theoretical Aspects of Computer
                  Science, Stuttgart, Germany, February 24-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3404},
  pages        = {158--169},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31856-9\_13},
  doi          = {10.1007/978-3-540-31856-9\_13},
  timestamp    = {Wed, 19 May 2021 12:05:43 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/KahlerKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DattaKMR05,
  author       = {Anupam Datta and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell and
                  Ajith Ramanathan},
  editor       = {Joe Kilian},
  title        = {On the Relationships Between Notions of Simulation-Based Security},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {476--494},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_26},
  doi          = {10.1007/978-3-540-30576-7\_26},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DattaKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005fmse,
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-231-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2005fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/KustersW04,
  author       = {Ralf K{\"{u}}sters and
                  Thomas Wilke},
  editor       = {Volker Diekert and
                  Michel Habib},
  title        = {Automata-Based Analysis of Recursive Cryptographic Protocols},
  booktitle    = {{STACS} 2004, 21st Annual Symposium on Theoretical Aspects of Computer
                  Science, Montpellier, France, March 25-27, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2996},
  pages        = {382--393},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24749-4\_34},
  doi          = {10.1007/978-3-540-24749-4\_34},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/KustersW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ChevalierKRT05,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Deciding the Security of Protocols with Commuting Public Key Encryption},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {55--66},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.019},
  doi          = {10.1016/J.ENTCS.2004.05.019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ChevalierKRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/ChevalierKRTV03,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani and
                  Laurent Vigneron},
  editor       = {Matthias Baaz and
                  Johann A. Makowsky},
  title        = {Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number
                  of Sessions},
  booktitle    = {Computer Science Logic, 17th International Workshop, {CSL} 2003, 12th
                  Annual Conference of the EACSL, and 8th Kurt G{\"{o}}del Colloquium,
                  {KGC} 2003, Vienna, Austria, August 25-30, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2803},
  pages        = {128--141},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45220-1\_13},
  doi          = {10.1007/978-3-540-45220-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/ChevalierKRTV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ChevalierKRT03,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Paritosh K. Pandya and
                  Jaikumar Radhakrishnan},
  title        = {Deciding the Security of Protocols with Diffie-Hellman Exponentiation
                  and Products in Exponents},
  booktitle    = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical
                  Computer Science, 23rd Conference, Mumbai, India, December 15-17,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2914},
  pages        = {124--135},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24597-1\_11},
  doi          = {10.1007/978-3-540-24597-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/ChevalierKRT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ChevalierKRT03,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {An {NP} Decision Procedure for Protocol Insecurity with {XOR}},
  booktitle    = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003),
                  22-25 June 2003, Ottawa, Canada, Proceedings},
  pages        = {261--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/LICS.2003.1210066},
  doi          = {10.1109/LICS.2003.1210066},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ChevalierKRT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/BrandtTK03,
  author       = {Sebastian Brandt and
                  Anni{-}Yasmin Turhan and
                  Ralf K{\"{u}}sters},
  editor       = {Moshe Y. Vardi and
                  Andrei Voronkov},
  title        = {Extensions of Non-standard Inferences to Descriptions Logics with
                  Transitive Roles},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 10th
                  International Conference, {LPAR} 2003, Almaty, Kazakhstan, September
                  22-26, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2850},
  pages        = {122--136},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39813-4\_8},
  doi          = {10.1007/978-3-540-39813-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/BrandtTK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/dlog/BaaderKW03,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters and
                  Frank Wolter},
  editor       = {Franz Baader and
                  Diego Calvanese and
                  Deborah L. McGuinness and
                  Daniele Nardi and
                  Peter F. Patel{-}Schneider},
  title        = {Extensions to Description Logics},
  booktitle    = {The Description Logic Handbook: Theory, Implementation, and Applications},
  pages        = {219--261},
  publisher    = {Cambridge University Press},
  year         = {2003},
  timestamp    = {Mon, 20 Nov 2017 13:02:05 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BaaderKW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aicom/KustersM02,
  author       = {Ralf K{\"{u}}sters and
                  Ralf Molitor},
  title        = {Approximating most specific concepts in description logics with existential
                  restrictions},
  journal      = {{AI} Commun.},
  volume       = {15},
  number       = {1},
  pages        = {47--59},
  year         = {2002},
  url          = {http://content.iospress.com/articles/ai-communications/aic253},
  timestamp    = {Fri, 15 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aicom/KustersM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/Kusters02,
  author       = {Ralf K{\"{u}}sters},
  editor       = {Lubos Brim and
                  Petr Jancar and
                  Mojm{\'{\i}}r Kret{\'{\i}}nsk{\'{y}} and
                  Anton{\'{\i}}n Kucera},
  title        = {On the Decidability of Cryptographic Protocols with Open-Ended Data
                  Structures},
  booktitle    = {{CONCUR} 2002 - Concurrency Theory, 13th International Conference,
                  Brno, Czech Republic, August 20-23, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2421},
  pages        = {515--530},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45694-5\_34},
  doi          = {10.1007/3-540-45694-5\_34},
  timestamp    = {Fri, 30 Aug 2019 10:02:28 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/Kusters02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/BaaderK02,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters},
  editor       = {Ian Horrocks and
                  Sergio Tessaris},
  title        = {Unification in a Description Logic with Inconsistency and Transitive
                  Closure of Roles},
  booktitle    = {Proceedings of the 2002 International Workshop on Description Logics
                  (DL2002), Toulouse, France, April 19-21, 2002},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {53},
  publisher    = {CEUR-WS.org},
  year         = {2002},
  url          = {https://ceur-ws.org/Vol-53/BaaderKuesters-unification.ps},
  timestamp    = {Fri, 10 Mar 2023 16:23:16 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BaaderK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/BrandtKT02,
  author       = {Sebastian Brandt and
                  Ralf K{\"{u}}sters and
                  Anni{-}Yasmin Turhan},
  editor       = {Ian Horrocks and
                  Sergio Tessaris},
  title        = {Approximating ALCN-Concept Descriptions},
  booktitle    = {Proceedings of the 2002 International Workshop on Description Logics
                  (DL2002), Toulouse, France, April 19-21, 2002},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {53},
  publisher    = {CEUR-WS.org},
  year         = {2002},
  url          = {https://ceur-ws.org/Vol-53/BrandtKuesters+-approx.ps},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BrandtKT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/KustersW02,
  author       = {Ralf K{\"{u}}sters and
                  Thomas Wilke},
  editor       = {Manindra Agrawal and
                  Anil Seth},
  title        = {Deciding the First Level of the {\(\mathrm{\mu}\)}-Calculus Alternation
                  Hierarchy},
  booktitle    = {{FST} {TCS} 2002: Foundations of Software Technology and Theoretical
                  Computer Science, 22nd Conference Kanpur, India, December 12-14, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2556},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36206-1\_22},
  doi          = {10.1007/3-540-36206-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/KustersW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kr/BrandtKT02,
  author       = {Sebastian Brandt and
                  Ralf K{\"{u}}sters and
                  Anni{-}Yasmin Turhan},
  editor       = {Dieter Fensel and
                  Fausto Giunchiglia and
                  Deborah L. McGuinness and
                  Mary{-}Anne Williams},
  title        = {Approximation and Difference in Description Logics},
  booktitle    = {Proceedings of the Eights International Conference on Principles and
                  Knowledge Representation and Reasoning (KR-02), Toulouse, France,
                  April 22-25, 2002},
  pages        = {203--214},
  publisher    = {Morgan Kaufmann},
  year         = {2002},
  timestamp    = {Thu, 28 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kr/BrandtKT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Kusters01,
  author       = {Ralf K{\"{u}}sters},
  title        = {Non-Standard Inferences in Description Logics},
  series       = {Lecture Notes in Computer Science},
  volume       = {2100},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44613-3},
  doi          = {10.1007/3-540-44613-3},
  urn          = {urn:nbn:de:1111-20061009494},
  isbn         = {3-540-42397-4},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Kusters01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/KustersB01,
  author       = {Ralf K{\"{u}}sters and
                  Alexander Borgida},
  title        = {What's in an Attribute? Consequences for the Least Common Subsumer},
  journal      = {J. Artif. Intell. Res.},
  volume       = {14},
  pages        = {167--203},
  year         = {2001},
  url          = {https://doi.org/10.1613/jair.702},
  doi          = {10.1613/JAIR.702},
  timestamp    = {Mon, 21 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jair/KustersB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Kusters01,
  author       = {Ralf K{\"{u}}sters},
  editor       = {Erich Gr{\"{a}}del and
                  Wolfgang Thomas and
                  Thomas Wilke},
  title        = {Memoryless Determinacy of Parity Games},
  booktitle    = {Automata, Logics, and Infinite Games: {A} Guide to Current Research
                  [outcome of a Dagstuhl seminar, February 2001]},
  series       = {Lecture Notes in Computer Science},
  volume       = {2500},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-36387-4\_6},
  doi          = {10.1007/3-540-36387-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Kusters01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/BaaderK01,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters},
  editor       = {Carole A. Goble and
                  Deborah L. McGuinness and
                  Ralf M{\"{o}}ller and
                  Peter F. Patel{-}Schneider},
  title        = {Unification in a Description Logic with Transitive Closure of Roles},
  booktitle    = {Working Notes of the 2001 International Description Logics Workshop
                  (DL-2001), Stanford, CA, USA, August 1-3, 2001},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {49},
  publisher    = {CEUR-WS.org},
  year         = {2001},
  url          = {https://ceur-ws.org/Vol-49/BaaderKuesters-36start.ps},
  timestamp    = {Fri, 10 Mar 2023 16:23:16 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BaaderK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/BaaderBK01,
  author       = {Franz Baader and
                  Sebastian Brandt and
                  Ralf K{\"{u}}sters},
  editor       = {Bernhard Nebel},
  title        = {Matching under Side Conditions in Description Logics},
  booktitle    = {Proceedings of the Seventeenth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2001, Seattle, Washington, USA, August 4-10,
                  2001},
  pages        = {213--218},
  publisher    = {Morgan Kaufmann},
  year         = {2001},
  timestamp    = {Tue, 20 Aug 2019 16:18:14 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/BaaderBK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/KustersM01,
  author       = {Ralf K{\"{u}}sters and
                  Ralf Molitor},
  editor       = {Bernhard Nebel},
  title        = {Computing Least Common Subsumers in {ALEN}},
  booktitle    = {Proceedings of the Seventeenth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2001, Seattle, Washington, USA, August 4-10,
                  2001},
  pages        = {219--224},
  publisher    = {Morgan Kaufmann},
  year         = {2001},
  timestamp    = {Fri, 23 May 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/KustersM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ki/KustersM01,
  author       = {Ralf K{\"{u}}sters and
                  Ralf Molitor},
  editor       = {Franz Baader and
                  Gerhard Brewka and
                  Thomas Eiter},
  title        = {Approximating Most Specific Concepts in Description Logics with Existential
                  Restrictions},
  booktitle    = {{KI} 2001: Advances in Artificial Intelligence, Joint German/Austrian
                  Conference on AI, Vienna, Austria, September 19-21, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2174},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45422-5\_4},
  doi          = {10.1007/3-540-45422-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ki/KustersM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/BaaderK01,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters},
  editor       = {Robert Nieuwenhuis and
                  Andrei Voronkov},
  title        = {Unification in a Description Logic with Transitive Closure of Roles},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 8th
                  International Conference, {LPAR} 2001, Havana, Cuba, December 3-7,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2250},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45653-8\_15},
  doi          = {10.1007/3-540-45653-8\_15},
  timestamp    = {Sun, 02 Oct 2022 16:11:18 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/BaaderK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/BorgidaK00,
  author       = {Alexander Borgida and
                  Ralf K{\"{u}}sters},
  editor       = {Franz Baader and
                  Ulrike Sattler},
  title        = {What's not in a name: Some Properties of a Purely Structural Approach
                  to Integrating Large {DL} Knowledge Bases},
  booktitle    = {Proceedings of the 2000 International Workshop on Description Logics
                  (DL2000), Aachen, Germany, August 17-19, 2000},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {33},
  pages        = {65--78},
  publisher    = {CEUR-WS.org},
  year         = {2000},
  url          = {https://ceur-ws.org/Vol-33/Borgida65-78.ps},
  timestamp    = {Fri, 10 Mar 2023 16:23:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BorgidaK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kr/BaaderK00,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters},
  editor       = {Anthony G. Cohn and
                  Fausto Giunchiglia and
                  Bart Selman},
  title        = {Matching Concept Descriptions with Existential Restrictions},
  booktitle    = {{KR} 2000, Principles of Knowledge Representation and Reasoning Proceedings
                  of the Seventh International Conference, Breckenridge, Colorado, USA,
                  April 11-15, 2000},
  pages        = {261--272},
  publisher    = {Morgan Kaufmann},
  year         = {2000},
  timestamp    = {Tue, 20 Jun 2023 09:03:42 +0200},
  biburl       = {https://dblp.org/rec/conf/kr/BaaderK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kr/BaaderKM00,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters and
                  Ralf Molitor},
  editor       = {Anthony G. Cohn and
                  Fausto Giunchiglia and
                  Bart Selman},
  title        = {Rewriting Concepts Using Terminologies},
  booktitle    = {{KR} 2000, Principles of Knowledge Representation and Reasoning Proceedings
                  of the Seventh International Conference, Breckenridge, Colorado, USA,
                  April 11-15, 2000},
  pages        = {297--308},
  publisher    = {Morgan Kaufmann},
  year         = {2000},
  timestamp    = {Fri, 18 May 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kr/BaaderKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/BaaderKBM99,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters and
                  Alexander Borgida and
                  Deborah L. McGuinness},
  title        = {Matching in Description Logics},
  journal      = {J. Log. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {411--447},
  year         = {1999},
  url          = {https://doi.org/10.1093/logcom/9.3.411},
  doi          = {10.1093/LOGCOM/9.3.411},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/logcom/BaaderKBM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/BaaderK99,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters},
  editor       = {Patrick Lambrix and
                  Alexander Borgida and
                  Maurizio Lenzerini and
                  Ralf M{\"{o}}ller and
                  Peter F. Patel{-}Schneider},
  title        = {Matching in Description Logics with Existential Restrictions},
  booktitle    = {Proceedings of the 1999 International Workshop on Description Logics
                  (DL'99), Link{\"{o}}ping, Sweden, July 30 - August 1, 1999},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {22},
  publisher    = {CEUR-WS.org},
  year         = {1999},
  url          = {https://ceur-ws.org/Vol-22/baaderkuesters.ps},
  timestamp    = {Fri, 10 Mar 2023 16:23:16 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BaaderK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/BaaderKM99,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters and
                  Ralf Molitor},
  editor       = {Thomas Dean},
  title        = {Computing Least Common Subsumers in Description Logics with Existential
                  Restrictions},
  booktitle    = {Proceedings of the Sixteenth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 99, Stockholm, Sweden, July 31 - August 6, 1999.
                  2 Volumes, 1450 pages},
  pages        = {96--103},
  publisher    = {Morgan Kaufmann},
  year         = {1999},
  url          = {http://ijcai.org/Proceedings/99-1/Papers/015.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:18:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/BaaderKM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/BaaderK98,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters},
  editor       = {Enrico Franconi and
                  Giuseppe De Giacomo and
                  Robert M. MacGregor and
                  Werner Nutt and
                  Christopher A. Welty},
  title        = {Least Common Subsumer Computation w.r.t. cyclic ALN-Terminologies},
  booktitle    = {Proceedings of the 1998 International Workshop on Description Logics
                  (DL'98), IRST, Povo - Trento, Italy, June 6-8, 1998},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {11},
  publisher    = {CEUR-WS.org},
  year         = {1998},
  url          = {https://ceur-ws.org/Vol-11/BaaderKuesters.ps},
  timestamp    = {Fri, 10 Mar 2023 16:23:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BaaderK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/BaaderKM98,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters and
                  Ralf Molitor},
  editor       = {Enrico Franconi and
                  Giuseppe De Giacomo and
                  Robert M. MacGregor and
                  Werner Nutt and
                  Christopher A. Welty},
  title        = {Structural Subsumption Considered from an Automata-Theoretic Point
                  of View},
  booktitle    = {Proceedings of the 1998 International Workshop on Description Logics
                  (DL'98), IRST, Povo - Trento, Italy, June 6-8, 1998},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {11},
  publisher    = {CEUR-WS.org},
  year         = {1998},
  url          = {https://ceur-ws.org/Vol-11/BaaderKuestersMolitor.ps},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dlog/BaaderKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ki/BaaderK98,
  author       = {Franz Baader and
                  Ralf K{\"{u}}sters},
  editor       = {Otthein Herzog and
                  Andreas G{\"{u}}nter},
  title        = {Computing the Least Common Subsumer and the Most Specific Concept
                  in the Presence of Cyclic ALN-Concept Descriptions},
  booktitle    = {{KI-98:} Advances in Artificial Intelligence, 22nd Annual German Conference
                  on Artificial Intelligence, Bremen, Germany, September 15-17, 1998,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1504},
  pages        = {129--140},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0095434},
  doi          = {10.1007/BFB0095434},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ki/BaaderK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kr/Kusters98,
  author       = {Ralf K{\"{u}}sters},
  editor       = {Anthony G. Cohn and
                  Lenhart K. Schubert and
                  Stuart C. Shapiro},
  title        = {Characterizing the Semantics of Terminological Cycles in {ALN} Using
                  Finite Automata},
  booktitle    = {Proceedings of the Sixth International Conference on Principles of
                  Knowledge Representation and Reasoning (KR'98), Trento, Italy, June
                  2-5, 1998},
  pages        = {499--511},
  publisher    = {Morgan Kaufmann},
  year         = {1998},
  timestamp    = {Tue, 20 Jun 2023 09:03:42 +0200},
  biburl       = {https://dblp.org/rec/conf/kr/Kusters98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlog/Kusters97,
  author       = {Ralf K{\"{u}}sters},
  editor       = {Ronald J. Brachman and
                  Francesco M. Donini and
                  Enrico Franconi and
                  Ian Horrocks and
                  Alon Y. Levy and
                  Marie{-}Christine Rousset},
  title        = {Characterizing the semantics of terminological cycles with the help
                  of finite automata},
  booktitle    = {Proceedings of the 1997 International Workshop on Description Logics,
                  Universit{\'{e}} Paris-Sud, Centre d'Orsay, Laboratoire de Recherche
                  en Informatique LRI, France},
  series       = {{URA-CNRS}},
  volume       = {410},
  year         = {1997},
  url          = {http://dl.kr.org/dl97/proceedings/kuesters.ps.gz},
  timestamp    = {Tue, 12 Apr 2022 14:46:29 +0200},
  biburl       = {https://dblp.org/rec/conf/dlog/Kusters97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics