BibTeX records: Tomasz Truderung

download as .bib file

@article{DBLP:journals/corr/abs-2304-09456,
  author       = {Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {A Protocol for Cast-as-Intended Verifiability with a Second Device},
  journal      = {CoRR},
  volume       = {abs/2304.09456},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.09456},
  doi          = {10.48550/ARXIV.2304.09456},
  eprinttype    = {arXiv},
  eprint       = {2304.09456},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-09456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/BrelleT17,
  author       = {Achim Brelle and
                  Tomasz Truderung},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Nadja Braun Binder and
                  Norbert Kersting and
                  Olivier Pereira and
                  Carsten Sch{\"{u}}rmann},
  title        = {Cast-as-Intended Mechanism with Return Codes Based on PETs},
  booktitle    = {Electronic Voting - Second International Joint Conference, E-Vote-ID
                  2017, Bregenz, Austria, October 24-27, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10615},
  pages        = {264--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68687-5\_16},
  doi          = {10.1007/978-3-319-68687-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/BrelleT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrelleT17,
  author       = {Achim Brelle and
                  Tomasz Truderung},
  title        = {Cast-as-Intended Mechanism with Return Codes Based on PETs},
  journal      = {CoRR},
  volume       = {abs/1707.03632},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.03632},
  eprinttype    = {arXiv},
  eprint       = {1707.03632},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrelleT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersMST16,
  author       = {Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Enrico Scapin and
                  Tomasz Truderung},
  title        = {sElect: {A} Lightweight Verifiable Remote Voting System},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {341--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.31},
  doi          = {10.1109/CSF.2016.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersMST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KustersT16,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Security Analysis of Re-Encryption {RPC} Mix Nets},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {227--242},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.27},
  doi          = {10.1109/EUROSP.2016.27},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KustersT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CortierGKMT16,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {SoK: Verifiability Notions for E-Voting Protocols},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {779--798},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.52},
  doi          = {10.1109/SP.2016.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CortierGKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGKMT16,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {Verifiability Notions for E-Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/287},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersMST16,
  author       = {Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Enrico Scapin and
                  Tomasz Truderung},
  title        = {sElect: {A} Lightweight Verifiable Remote Voting System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/438},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersMST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTBBKM15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Bernhard Beckert and
                  Daniel Bruns and
                  Michael Kirsten and
                  Martin Mohr},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {A Hybrid Approach for Proving Noninterference of Java Programs},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {305--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.28},
  doi          = {10.1109/CSF.2015.28},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTBBKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Security Analysis of Re-Encryption {RPC} Mix Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTBBKM15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Bernhard Beckert and
                  Daniel Bruns and
                  Michael Kirsten and
                  Martin Mohr},
  title        = {A Hybrid Approach for Proving Noninterference of Java Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTBBKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/KustersT14,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Security in e-voting},
  journal      = {it Inf. Technol.},
  volume       = {56},
  number       = {6},
  pages        = {300--306},
  year         = {2014},
  url          = {http://www.degruyter.com/view/j/itit.2014.56.issue-6/itit-2014-1062/itit-2014-1062.xml},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/KustersT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/KustersSTG14,
  author       = {Ralf K{\"{u}}sters and
                  Enrico Scapin and
                  Tomasz Truderung and
                  Juergen Graf},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Extending and Applying a Framework for the Cryptographic Verification
                  of Java Programs},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {220--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_12},
  doi          = {10.1007/978-3-642-54792-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/KustersSTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersT014,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {343--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.29},
  doi          = {10.1109/SP.2014.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KustersT014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersSTG14,
  author       = {Ralf K{\"{u}}sters and
                  Enrico Scapin and
                  Tomasz Truderung and
                  Juergen Graf},
  title        = {Extending and Applying a Framework for the Cryptographic Verification
                  of Java Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersSTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT014,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KustersT012,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A game-based definition of coercion resistance and its applications},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {709--764},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0444},
  doi          = {10.3233/JCS-2012-0444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KustersT012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTG12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Juergen Graf},
  editor       = {Stephen Chong},
  title        = {A Framework for the Cryptographic Verification of Java-Like Programs},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {198--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.9},
  doi          = {10.1109/CSF.2012.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersTV12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Clash Attacks on the Verifiability of E-Voting Systems},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {395--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.32},
  doi          = {10.1109/SP.2012.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KustersTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Clash Attacks on the Verifiability of E-Voting Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTG12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Juergen Graf},
  title        = {A Framework for the Cryptographic Verification of Java-like Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/KustersT11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Reducing Protocol Analysis with {XOR} to the XOR-Free Case in the
                  Horn Theory Based Approach},
  journal      = {J. Autom. Reason.},
  volume       = {46},
  number       = {3-4},
  pages        = {325--352},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10817-010-9188-8},
  doi          = {10.1007/S10817-010-9188-8},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/KustersT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersTV11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Verifiability, Privacy, and Coercion-Resistance: New Insights from
                  a Case Study},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {538--553},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.21},
  doi          = {10.1109/SP.2011.21},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KustersTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Verifiability, Privacy, and Coercion-Resistance: New Insights from
                  a Case Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Accountability: definition and relationship to verifiability},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {526--535},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866366},
  doi          = {10.1145/1866307.1866366},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A Game-Based Definition of Coercion-Resistance and Its Applications},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {122--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.16},
  doi          = {10.1109/CSF.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Proving Coercion-Resistance of Scantegrity {II}},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {281--295},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_20},
  doi          = {10.1007/978-3-642-17650-0\_20},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KustersST10,
  author       = {Ralf K{\"{u}}sters and
                  Henning Schnoor and
                  Tomasz Truderung},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {A Formal Definition of Online Abuse-Freeness},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {484--497},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_28},
  doi          = {10.1007/978-3-642-16161-2\_28},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KustersST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Accountability: Definition and Relationship to Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV10a,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Proving Coercion-Resistance of Scantegrity {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersT09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {157--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.17},
  doi          = {10.1109/CSF.2009.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KustersT09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {An Epistemic Approach to Coercion-Resistance for Electronic Voting
                  Protocols},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {251--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.13},
  doi          = {10.1109/SP.2009.13},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KustersT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/KustersTV09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  editor       = {Peter Y. A. Ryan and
                  Berry Schoenmakers},
  title        = {Improving and Simplifying a Variant of Pr{\^{e}}t {\`{a}} Voter},
  booktitle    = {E-Voting and Identity, Second International Conference, VoteID 2009,
                  Luxembourg, September 7-8, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5767},
  pages        = {37--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04135-8\_3},
  doi          = {10.1007/978-3-642-04135-8\_3},
  timestamp    = {Thu, 27 Feb 2020 13:11:16 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/KustersTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-0802,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {An Epistemic Approach to Coercion-Resistance for Electronic Voting
                  Protocols},
  journal      = {CoRR},
  volume       = {abs/0903.0802},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.0802},
  eprinttype    = {arXiv},
  eprint       = {0903.0802},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0903-0802.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV09,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A Game-Based Definition of Coercion-Resistance and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KustersT08,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Reducing protocol analysis with {XOR} to the XOR-free case in the
                  horn theory based approach},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {129--138},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455788},
  doi          = {10.1145/1455770.1455788},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KustersT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0808-0634,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Reducing Protocol Analysis with {XOR} to the XOR-free Case in the
                  Horn Theory Based Approach},
  journal      = {CoRR},
  volume       = {abs/0808.0634},
  year         = {2008},
  url          = {http://arxiv.org/abs/0808.0634},
  eprinttype    = {arXiv},
  eprint       = {0808.0634},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0808-0634.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/KahlerKT07,
  author       = {Detlef K{\"{a}}hler and
                  Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Infinite State AMC-Model Checking for Cryptographic Protocols},
  booktitle    = {22nd {IEEE} Symposium on Logic in Computer Science {(LICS} 2007),
                  10-12 July 2007, Wroclaw, Poland, Proceedings},
  pages        = {181--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/LICS.2007.26},
  doi          = {10.1109/LICS.2007.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/KahlerKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/KustersT07,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  editor       = {Wolfgang Thomas and
                  Pascal Weil},
  title        = {On the Automatic Analysis of Recursive Security Protocols with {XOR}},
  booktitle    = {{STACS} 2007, 24th Annual Symposium on Theoretical Aspects of Computer
                  Science, Aachen, Germany, February 22-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4393},
  pages        = {646--657},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70918-3\_55},
  doi          = {10.1007/978-3-540-70918-3\_55},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/KustersT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Truderung05,
  author       = {Tomasz Truderung},
  editor       = {Robert Nieuwenhuis},
  title        = {Regular Protocols and Attacks with Regular Knowledge},
  booktitle    = {Automated Deduction - CADE-20, 20th International Conference on Automated
                  Deduction, Tallinn, Estonia, July 22-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3632},
  pages        = {377--391},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11532231\_28},
  doi          = {10.1007/11532231\_28},
  timestamp    = {Sun, 02 Oct 2022 15:55:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/Truderung05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/Truderung05,
  author       = {Tomasz Truderung},
  editor       = {Mart{\'{\i}}n Abadi and
                  Luca de Alfaro},
  title        = {Selecting Theories and Recursive Protocols},
  booktitle    = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference,
                  {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3653},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11539452\_19},
  doi          = {10.1007/11539452\_19},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/Truderung05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/RychlikowskiT04,
  author       = {Pawel Rychlikowski and
                  Tomasz Truderung},
  editor       = {Jerzy Marcinkowski and
                  Andrzej Tarlecki},
  title        = {Set Constraints on Regular Terms},
  booktitle    = {Computer Science Logic, 18th International Workshop, {CSL} 2004, 13th
                  Annual Conference of the EACSL, Karpacz, Poland, September 20-24,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3210},
  pages        = {458--472},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30124-0\_35},
  doi          = {10.1007/978-3-540-30124-0\_35},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/RychlikowskiT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/MarcinkowskiT02,
  author       = {Jerzy Marcinkowski and
                  Tomasz Truderung},
  editor       = {Julian C. Bradfield},
  title        = {Optimal Complexity Bounds for Positive {LTL} Games},
  booktitle    = {Computer Science Logic, 16th International Workshop, {CSL} 2002, 11th
                  Annual Conference of the EACSL, Edinburgh, Scotland, UK, September
                  22-25, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2471},
  pages        = {262--275},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45793-3\_18},
  doi          = {10.1007/3-540-45793-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/MarcinkowskiT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppdp/RychlikowskiT01,
  author       = {Pawel Rychlikowski and
                  Tomasz Truderung},
  title        = {Polymorphic Directional Types for Logic Programming},
  booktitle    = {Proceedings of the 3rd international {ACM} {SIGPLAN} conference on
                  Principles and practice of declarative programming, September 5-7,
                  2001, Florence, Italy},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/773184.773192},
  doi          = {10.1145/773184.773192},
  timestamp    = {Tue, 06 Nov 2018 16:57:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ppdp/RychlikowskiT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics