Robert Künnemann
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c8]Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann:
Stackelberg Planning: Towards Effective Leader-Follower State Space Search. AAAI 2018: 6286-6293 - [c7]Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes:
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure. EuroS&P 2018: 77-91 - [i7]Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CoRR abs/1805.10891 (2018) - [i6]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. IACR Cryptology ePrint Archive 2018: 127 (2018) - 2017
- [c6]Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann:
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. EuroS&P 2017: 76-91 - [i5]Michael Backes, Jörg Hoffmann, Robert Künnemann, Patrick Speicher, Marcel Steinmetz:
Simulated Penetration Testing and Mitigation Analysis. CoRR abs/1705.05088 (2017) - [i4]
- 2016
- [j1]Steve Kremer, Robert Künnemann:
Automated analysis of security protocols with global state. Journal of Computer Security 24(5): 583-616 (2016) - [c5]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. ACM Conference on Computer and Communications Security 2016: 717-730 - [i3]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. CoRR abs/1608.04362 (2016) - 2015
- [c4]
- 2014
- [b1]Robert Künnemann:
Foundations for analyzing security APIs in the symbolic and computational model. (Fondations d'analyse de APIs de sécurité dans le modèle symbolique et calculatoire). École normale supérieure de Cachan, France 2014 - [c3]Steve Kremer, Robert Künnemann:
Automated Analysis of Security Protocols with Global State. IEEE Symposium on Security and Privacy 2014: 163-178 - [i2]Steve Kremer, Robert Künnemann:
Automated analysis of security protocols with global state. CoRR abs/1403.1142 (2014) - 2013
- [c2]Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. ESORICS 2013: 327-344 - 2012
- [c1]Robert Künnemann, Graham Steel:
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. STM 2012: 257-272 - [i1]Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. IACR Cryptology ePrint Archive 2012: 189 (2012)
Coauthor Index
last updated on 2019-01-09 01:09 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint