|  | 2009 | 
|---|
| 61 |            | Ralf Küsters,
Max Tuengerthal:
Computational soundness for key exchange protocols with symmetric encryption.
ACM Conference on Computer and Communications Security 2009: 91-100 | 
| 60 |            | Ralf Küsters,
Tomasz Truderung:
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation.
CSF 2009: 157-171 | 
| 59 |            | Ralf Küsters,
Max Tuengerthal:
Universally Composable Symmetric Encryption.
CSF 2009: 293-307 | 
| 58 |            | Ralf Küsters,
Tomasz Truderung:
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.
IEEE Symposium on Security and Privacy 2009: 251-266 | 
| 57 |            | Ralf Küsters,
Tomasz Truderung,
Andreas Vogt:
Improving and Simplifying a Variant of Prêt à Voter.
VOTE-ID 2009: 37-53 | 
| 56 |            | Ralf Küsters,
Tomasz Truderung:
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
CoRR abs/0903.0802:  (2009) | 
|  | 2008 | 
|---|
| 55 |            | Ralf Küsters,
Tomasz Truderung:
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach.
ACM Conference on Computer and Communications Security 2008: 129-138 | 
| 54 |            | Ralf Küsters,
Max Tuengerthal:
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
CSF 2008: 270-284 | 
| 53 |            | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.
ACM Trans. Comput. Log. 9(4):  (2008) | 
| 52 |            | Ralf Küsters,
Tomasz Truderung:
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach
CoRR abs/0808.0634:  (2008) | 
| 51 |            | Pierpaolo Degano,
Ralf Küsters,
Luca Viganò,
Steve Zdancewic:
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06).
Inf. Comput. 206(2-4): 129 (2008) | 
| 50 |            | Michael Backes,
Markus Dürmuth,
Dennis Hofheinz,
Ralf Küsters:
Conditional reactive simulatability.
Int. J. Inf. Sec. 7(2): 155-169 (2008) | 
| 49 |            | Ralf Küsters,
Anupam Datta,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security.
J. Cryptology 21(4): 492-546 (2008) | 
|  | 2007 | 
|---|
| 48 |            | Véronique Cortier,
Ralf Küsters,
Bogdan Warinschi:
A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
ESORICS 2007: 422-437 | 
| 47 |            | Klaas Ole Kürtz,
Ralf Küsters,
Thomas Wilke:
Selecting theories and nonce generation for recursive protocols.
FMSE 2007: 61-70 | 
| 46 |            | Michael Backes,
Markus Dürmuth,
Ralf Küsters:
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
FSTTCS 2007: 108-120 | 
| 45 |            | Detlef Kähler,
Ralf Küsters,
Tomasz Truderung:
Infinite State AMC-Model Checking for Cryptographic Protocols.
LICS 2007: 181-192 | 
| 44 |            | Ralf Küsters,
Tomasz Truderung:
On the Automatic Analysis of Recursive Security Protocols with XOR.
STACS 2007: 646-657 | 
| 43 |            | Ralf Küsters,
Thomas Wilke:
Transducer-based analysis of cryptographic protocols.
Inf. Comput. 205(12): 1741-1776 (2007) | 
|  | 2006 | 
|---|
| 42 |            | Ralf Küsters:
Simulation-Based Security with Inexhaustible Interactive Turing Machines.
CSFW 2006: 309-320 | 
| 41 |            | Michael Backes,
Markus Dürmuth,
Dennis Hofheinz,
Ralf Küsters:
Conditional Reactive Simulatability.
ESORICS 2006: 424-443 | 
| 40 |            | Véronique Cortier,
Steve Kremer,
Ralf Küsters,
Bogdan Warinschi:
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions.
FSTTCS 2006: 176-187 | 
| 39 |            | Detlef Kähler,
Ralf Küsters,
Thomas Wilke:
A Dolev-Yao-Based Definition of Abuse-Free Protocols.
ICALP (2) 2006: 95-106 | 
| 38 |            | Max Tuengerthal,
Ralf Küsters,
Mathieu Turuani:
Implementing a Unification Algorithm for Protocol Analysis with XOR
CoRR abs/cs/0610014:  (2006) | 
|  | 2005 | 
|---|
| 37 |            | Vijay Atluri,
Pierangela Samarati,
Ralf Küsters,
John C. Mitchell:
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005
ACM 2005 | 
| 36 |            | Detlef Kähler,
Ralf Küsters:
Constraint Solving for Contract-Signing Protocols.
CONCUR 2005: 233-247 | 
| 35 |            | Detlef Kähler,
Ralf Küsters,
Thomas Wilke:
Deciding Properties of Contract-Signing Protocols.
STACS 2005: 158-169 | 
| 34 |            | Anupam Datta,
Ralf Küsters,
John C. Mitchell,
Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security.
TCC 2005: 476-494 | 
| 33 |            | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
Deciding the Security of Protocols with Commuting Public Key Encryption.
Electr. Notes Theor. Comput. Sci. 125(1): 55-66 (2005) | 
| 32 |            | Ralf Küsters:
On the decidability of cryptographic protocols with open-ended data structures.
Int. J. Inf. Sec. 4(1-2): 49-70 (2005) | 
| 31 |            | Ralf Küsters,
Ralf Molitor:
Structural Subsumption and Least Common Subsumers in a Description Logic with Existential and Number Restrictions.
Studia Logica 81(2): 227-259 (2005) | 
| 30 |            | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
An NP decision procedure for protocol insecurity with XOR.
Theor. Comput. Sci. 338(1-3): 247-274 (2005) | 
|  | 2004 | 
|---|
| 29 |            | Ralf Küsters,
Thomas Wilke:
Automata-Based Analysis of Recursive Cryptographic Protocols.
STACS 2004: 382-393 | 
|  | 2003 | 
|---|
| 28 |            | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani,
Laurent Vigneron:
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions.
CSL 2003: 128-141 | 
| 27 |            | Franz Baader,
Ralf Küsters,
Frank Wolter:
Extensions to Description Logics.
Description Logic Handbook 2003: 219-261 | 
| 26 |            | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
FSTTCS 2003: 124-135 | 
| 25 |            | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
An NP Decision Procedure for Protocol Insecurity with XOR.
LICS 2003: 261-270 | 
| 24 |            | Sebastian Brandt,
Anni-Yasmin Turhan,
Ralf Küsters:
Extensions of Non-standard Inferences to Descriptions Logics with Transitive Roles.
LPAR 2003: 122-136 | 
|  | 2002 | 
|---|
| 23 |            | Ralf Küsters:
On the Decidability of Cryptographic Protocols with Open-Ended Data Structures.
CONCUR 2002: 515-530 | 
| 22 |            | Ralf Küsters,
Thomas Wilke:
Deciding the First Level of the µ-Calculus Alternation Hierarchy.
FSTTCS 2002: 241-252 | 
| 21 |            | Sebastian Brandt,
Ralf Küsters,
Anni-Yasmin Turhan:
Approximation and Difference in Description Logics.
KR 2002: 203-214 | 
| 20 |            | Ralf Küsters,
Ralf Molitor:
Approximating most specific concepts in description logics with existential restrictions.
AI Commun. 15(1): 47-59 (2002) | 
|  | 2001 | 
|---|
| 19 |            | Ralf Küsters:
Non-Standard Inferences in Description Logics
Springer 2001 | 
| 18 |            | Ralf Küsters:
Memoryless Determinacy of Parity Games.
Automata, Logics, and Infinite Games 2001: 95-106 | 
| 17 |            | Franz Baader,
Ralf Küsters:
Unification in a Description Logic with Transitive Closure of Roles.
Description Logics 2001 | 
| 16 |            | Franz Baader,
Sebastian Brandt,
Ralf Küsters:
Matching under Side Conditions in Description Logics.
IJCAI 2001: 213-218 | 
| 15 |            | Ralf Küsters,
Ralf Molitor:
Computing Least Common Subsumers in ALEN.
IJCAI 2001: 219-224 | 
| 14 |            | Ralf Küsters,
Ralf Molitor:
Approximating Most Specific Concepts in Description Logics with Existential Restrictions.
KI/ÖGAI 2001: 33-47 | 
| 13 |            | Franz Baader,
Ralf Küsters:
Unification in a Description Logic with Transitive Closure of Roles.
LPAR 2001: 217-232 | 
| 12 |            | Ralf Küsters,
Alexander Borgida:
What's in an Attribute? Consequences for the Least Common Subsumer.
J. Artif. Intell. Res. (JAIR) 14: 167-203 (2001) | 
|  | 2000 | 
|---|
| 11 |            | Alexander Borgida,
Ralf Küsters:
What's not in a name: Some Properties of a Purely Structural Approach to Integrating Large DL Knowledge Bases.
Description Logics 2000: 65-78 | 
| 10 |            | Franz Baader,
Ralf Küsters:
Matching Concept Descriptions with Existential Restrictions.
KR 2000: 261-272 | 
| 9 |            | Franz Baader,
Ralf Küsters,
Ralf Molitor:
Rewriting Concepts Using Terminologies.
KR 2000: 297-308 | 
|  | 1999 | 
|---|
| 8 |            | Franz Baader,
Ralf Küsters:
Matching in Description Logics with Existential Restrictions.
Description Logics 1999 | 
| 7 |            | Franz Baader,
Ralf Küsters,
Ralf Molitor:
Computing Least Common Subsumers in Description Logics with Existential Restrictions.
IJCAI 1999: 96-103 | 
| 6 |            | Franz Baader,
Ralf Küsters,
Alexander Borgida,
Deborah L. McGuinness:
Matching in Description Logics.
J. Log. Comput. 9(3): 411-447 (1999) | 
|  | 1998 | 
|---|
| 5 |            | Franz Baader,
Ralf Küsters:
Least Common Subsumer Computation w.r.t. cyclic ALN-Terminologies.
Description Logics 1998 | 
| 4 |            | Franz Baader,
Ralf Küsters,
Ralf Molitor:
Structural Subsumption Considered from an Automata-Theoretic Point of View.
Description Logics 1998 | 
| 3 |            | Franz Baader,
Ralf Küsters:
Computing the Least Common Subsumer and the Most Specific Concept in the Presence of Cyclic ALN-Concept Descriptions.
KI 1998: 129-140 | 
| 2 |            | Ralf Küsters:
Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata.
KR 1998: 499-511 | 
|  | 1997 | 
|---|
| 1 |            | Ralf Küsters:
Characterizing the semantics of terminological cycles with the help of finite automata.
Description Logics 1997 |