205 results on '"Ralf Küsters"'
Search Results
52. Computational soundness for key exchange protocols with symmetric encryption.
53. Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation.
54. Universally Composable Symmetric Encryption.
55. Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach.
56. Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
57. On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
58. On the Automatic Analysis of Recursive Security Protocols with XOR.
59. Infinite State AMC-Model Checking for Cryptographic Protocols.
60. Selecting theories and nonce generation for recursive protocols.
61. A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
62. A Dolev-Yao-Based Definition of Abuse-Free Protocols.
63. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions.
64. Simulation-Based Security with Inexhaustible Interactive Turing Machines.
65. Conditional Reactive Simulatability.
66. Deciding Properties of Contract-Signing Protocols.
67. Constraint Solving for Contract-Signing Protocols.
68. On the Relationships Between Notions of Simulation-Based Security.
69. Automata-Based Analysis of Recursive Cryptographic Protocols.
70. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
71. An NP Decision Procedure for Protocol Insecurity with XOR.
72. Extensions of Non-standard Inferences to Descriptions Logics with Transitive Roles.
73. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions.
74. Extensions to Description Logics.
75. Deciding the First Level of the µ-Calculus Alternation Hierarchy.
76. Approximation and Difference in Description Logics.
77. On the Decidability of Cryptographic Protocols with Open-Ended Data Structures.
78. Memoryless Determinacy of Parity Games.
79. Matching under Side Conditions in Description Logics.
80. Computing Least Common Subsumers in ALEN.
81. Unification in a Description Logic with Transitive Closure of Roles.
82. Approximating Most Specific Concepts in Description Logics with Existential Restrictions.
83. Rewriting Concepts Using Terminologies.
84. Matching Concept Descriptions with Existential Restrictions.
85. What's not in a name: Some Properties of a Purely Structural Approach to Integrating Large DL Knowledge Bases.
86. Computing Least Common Subsumers in Description Logics with Existential Restrictions.
87. The IITM Model: A Simple and Expressive Model for Universal Composability
88. Embedding the UC Model into the IITM Model
89. Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata.
90. Computing the Least Common Subsumer and the Most Specific Concept in the Presence of Cyclic ALN-Concept Descriptions.
91. An In-Depth Symbolic Security Analysis of the ACME Standard
92. A Security Framework for Distributed Ledgers
93. $\text{DY}^{\star}$: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code
94. Deciding the Security of Protocols with Commuting Public Key Encryption.
95. Unification in a Description Logic with Inconsistency and Transitive Closure of Roles.
96. Approximating ALCN-Concept Descriptions.
97. A Tutorial-Style Introduction to $$\textsf {DY}^\star $$
98. Correction to: Electronic Voting
99. Matching in Description Logics with Existential Restrictions.
100. Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.