Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tomasz Truderung
@article{DBLP:journals/corr/abs-2304-09456, author = {Johannes M{\"{u}}ller and Tomasz Truderung}, title = {A Protocol for Cast-as-Intended Verifiability with a Second Device}, journal = {CoRR}, volume = {abs/2304.09456}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.09456}, doi = {10.48550/ARXIV.2304.09456}, eprinttype = {arXiv}, eprint = {2304.09456}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-09456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/BrelleT17, author = {Achim Brelle and Tomasz Truderung}, editor = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann}, title = {Cast-as-Intended Mechanism with Return Codes Based on PETs}, booktitle = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10615}, pages = {264--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68687-5\_16}, doi = {10.1007/978-3-319-68687-5\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/voteid/BrelleT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrelleT17, author = {Achim Brelle and Tomasz Truderung}, title = {Cast-as-Intended Mechanism with Return Codes Based on PETs}, journal = {CoRR}, volume = {abs/1707.03632}, year = {2017}, url = {http://arxiv.org/abs/1707.03632}, eprinttype = {arXiv}, eprint = {1707.03632}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrelleT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersMST16, author = {Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Enrico Scapin and Tomasz Truderung}, title = {sElect: {A} Lightweight Verifiable Remote Voting System}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {341--354}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.31}, doi = {10.1109/CSF.2016.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersMST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KustersT16, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Security Analysis of Re-Encryption {RPC} Mix Nets}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {227--242}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.27}, doi = {10.1109/EUROSP.2016.27}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KustersT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {SoK: Verifiability Notions for E-Voting Protocols}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {779--798}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.52}, doi = {10.1109/SP.2016.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {Verifiability Notions for E-Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2016}, url = {http://eprint.iacr.org/2016/287}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersMST16, author = {Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Enrico Scapin and Tomasz Truderung}, title = {sElect: {A} Lightweight Verifiable Remote Voting System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2016}, url = {http://eprint.iacr.org/2016/438}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KustersMST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersTBBKM15, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {A Hybrid Approach for Proving Noninterference of Java Programs}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {305--319}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.28}, doi = {10.1109/CSF.2015.28}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KustersTBBKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT15, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Security Analysis of Re-Encryption {RPC} Mix Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2015}, url = {http://eprint.iacr.org/2015/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTBBKM15, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr}, title = {A Hybrid Approach for Proving Noninterference of Java Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2015}, url = {http://eprint.iacr.org/2015/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTBBKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/KustersT14, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Security in e-voting}, journal = {it Inf. Technol.}, volume = {56}, number = {6}, pages = {300--306}, year = {2014}, url = {http://www.degruyter.com/view/j/itit.2014.56.issue-6/itit-2014-1062/itit-2014-1062.xml}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/KustersT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/KustersSTG14, author = {Ralf K{\"{u}}sters and Enrico Scapin and Tomasz Truderung and Juergen Graf}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Extending and Applying a Framework for the Cryptographic Verification of Java Programs}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {220--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_12}, doi = {10.1007/978-3-642-54792-8\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/KustersSTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersT014, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {343--358}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.29}, doi = {10.1109/SP.2014.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KustersT014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersSTG14, author = {Ralf K{\"{u}}sters and Enrico Scapin and Tomasz Truderung and Juergen Graf}, title = {Extending and Applying a Framework for the Cryptographic Verification of Java Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2014}, url = {http://eprint.iacr.org/2014/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersSTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT014, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2014}, url = {http://eprint.iacr.org/2014/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KustersT012, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {A game-based definition of coercion resistance and its applications}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {709--764}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0444}, doi = {10.3233/JCS-2012-0444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KustersT012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersTG12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Juergen Graf}, editor = {Stephen Chong}, title = {A Framework for the Cryptographic Verification of Java-Like Programs}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {198--212}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.9}, doi = {10.1109/CSF.2012.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersTV12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Clash Attacks on the Verifiability of E-Voting Systems}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {395--409}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.32}, doi = {10.1109/SP.2012.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KustersTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Clash Attacks on the Verifiability of E-Voting Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2012}, url = {http://eprint.iacr.org/2012/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTG12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Juergen Graf}, title = {A Framework for the Cryptographic Verification of Java-like Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2012}, url = {http://eprint.iacr.org/2012/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/KustersT11, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Reducing Protocol Analysis with {XOR} to the XOR-Free Case in the Horn Theory Based Approach}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {325--352}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9188-8}, doi = {10.1007/S10817-010-9188-8}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/KustersT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersTV11, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {538--553}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.21}, doi = {10.1109/SP.2011.21}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KustersTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV11, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2011}, url = {http://eprint.iacr.org/2011/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Accountability: definition and relationship to verifiability}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {526--535}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866366}, doi = {10.1145/1866307.1866366}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {A Game-Based Definition of Coercion-Resistance and Its Applications}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {122--136}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.16}, doi = {10.1109/CSF.2010.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Proving Coercion-Resistance of Scantegrity {II}}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {281--295}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_20}, doi = {10.1007/978-3-642-17650-0\_20}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KustersST10, author = {Ralf K{\"{u}}sters and Henning Schnoor and Tomasz Truderung}, editor = {Sushil Jajodia and Jianying Zhou}, title = {A Formal Definition of Online Abuse-Freeness}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {484--497}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_28}, doi = {10.1007/978-3-642-16161-2\_28}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KustersST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Accountability: Definition and Relationship to Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2010}, url = {http://eprint.iacr.org/2010/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV10a, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Proving Coercion-Resistance of Scantegrity {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2010}, url = {http://eprint.iacr.org/2010/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KustersT09, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {157--171}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.17}, doi = {10.1109/CSF.2009.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KustersT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KustersT09, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {251--266}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.13}, doi = {10.1109/SP.2009.13}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/KustersT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/KustersTV09, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, editor = {Peter Y. A. Ryan and Berry Schoenmakers}, title = {Improving and Simplifying a Variant of Pr{\^{e}}t {\`{a}} Voter}, booktitle = {E-Voting and Identity, Second International Conference, VoteID 2009, Luxembourg, September 7-8, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5767}, pages = {37--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04135-8\_3}, doi = {10.1007/978-3-642-04135-8\_3}, timestamp = {Thu, 27 Feb 2020 13:11:16 +0100}, biburl = {https://dblp.org/rec/conf/voteid/KustersTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0903-0802, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols}, journal = {CoRR}, volume = {abs/0903.0802}, year = {2009}, url = {http://arxiv.org/abs/0903.0802}, eprinttype = {arXiv}, eprint = {0903.0802}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0903-0802.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV09, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {A Game-Based Definition of Coercion-Resistance and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2009}, url = {http://eprint.iacr.org/2009/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KustersT08, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Reducing protocol analysis with {XOR} to the XOR-free case in the horn theory based approach}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {129--138}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455788}, doi = {10.1145/1455770.1455788}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KustersT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0808-0634, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Reducing Protocol Analysis with {XOR} to the XOR-free Case in the Horn Theory Based Approach}, journal = {CoRR}, volume = {abs/0808.0634}, year = {2008}, url = {http://arxiv.org/abs/0808.0634}, eprinttype = {arXiv}, eprint = {0808.0634}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0808-0634.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/KahlerKT07, author = {Detlef K{\"{a}}hler and Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Infinite State AMC-Model Checking for Cryptographic Protocols}, booktitle = {22nd {IEEE} Symposium on Logic in Computer Science {(LICS} 2007), 10-12 July 2007, Wroclaw, Poland, Proceedings}, pages = {181--192}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/LICS.2007.26}, doi = {10.1109/LICS.2007.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/KahlerKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/KustersT07, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, editor = {Wolfgang Thomas and Pascal Weil}, title = {On the Automatic Analysis of Recursive Security Protocols with {XOR}}, booktitle = {{STACS} 2007, 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4393}, pages = {646--657}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70918-3\_55}, doi = {10.1007/978-3-540-70918-3\_55}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/KustersT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Truderung05, author = {Tomasz Truderung}, editor = {Robert Nieuwenhuis}, title = {Regular Protocols and Attacks with Regular Knowledge}, booktitle = {Automated Deduction - CADE-20, 20th International Conference on Automated Deduction, Tallinn, Estonia, July 22-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3632}, pages = {377--391}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11532231\_28}, doi = {10.1007/11532231\_28}, timestamp = {Sun, 02 Oct 2022 15:55:55 +0200}, biburl = {https://dblp.org/rec/conf/cade/Truderung05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Truderung05, author = {Tomasz Truderung}, editor = {Mart{\'{\i}}n Abadi and Luca de Alfaro}, title = {Selecting Theories and Recursive Protocols}, booktitle = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference, {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3653}, pages = {217--232}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11539452\_19}, doi = {10.1007/11539452\_19}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/Truderung05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/RychlikowskiT04, author = {Pawel Rychlikowski and Tomasz Truderung}, editor = {Jerzy Marcinkowski and Andrzej Tarlecki}, title = {Set Constraints on Regular Terms}, booktitle = {Computer Science Logic, 18th International Workshop, {CSL} 2004, 13th Annual Conference of the EACSL, Karpacz, Poland, September 20-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3210}, pages = {458--472}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30124-0\_35}, doi = {10.1007/978-3-540-30124-0\_35}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/RychlikowskiT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/MarcinkowskiT02, author = {Jerzy Marcinkowski and Tomasz Truderung}, editor = {Julian C. Bradfield}, title = {Optimal Complexity Bounds for Positive {LTL} Games}, booktitle = {Computer Science Logic, 16th International Workshop, {CSL} 2002, 11th Annual Conference of the EACSL, Edinburgh, Scotland, UK, September 22-25, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2471}, pages = {262--275}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45793-3\_18}, doi = {10.1007/3-540-45793-3\_18}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/MarcinkowskiT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/RychlikowskiT01, author = {Pawel Rychlikowski and Tomasz Truderung}, title = {Polymorphic Directional Types for Logic Programming}, booktitle = {Proceedings of the 3rd international {ACM} {SIGPLAN} conference on Principles and practice of declarative programming, September 5-7, 2001, Florence, Italy}, pages = {61--72}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/773184.773192}, doi = {10.1145/773184.773192}, timestamp = {Tue, 06 Nov 2018 16:57:25 +0100}, biburl = {https://dblp.org/rec/conf/ppdp/RychlikowskiT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.