205 results on '"Ralf Küsters"'
Search Results
2. Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process.
3. ZK-SNARKs for Ballot Validity: A Feasibility Study.
4. AUC: Accountable Universal Composability.
5. Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice.
6. Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations.
7. The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard.
8. Layered Symbolic Security Analysis in $\textsf {DY}^\star $.
9. Publicly Accountable Robust Multi-Party Computation.
10. A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification.
11. Recent Developments in the Context of Online Elections and Digital Polls in Germany.
12. Federated Learning for Appearance-based Gaze Estimation in the Wild.
13. Intelligent Methods for Test and Reliability.
14. Kryvos: Publicly Tally-Hiding Verifiable E-Voting.
15. Embedding the UC Model into the IITM Model.
16. DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code.
17. A Tutorial-Style Introduction to DY*.
18. An In-Depth Symbolic Security Analysis of the ACME Standard.
19. A Security Framework for Distributed Ledgers.
20. Ordinos: A Verifiable Tally-Hiding E-Voting System.
21. Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric.
22. iUC: Flexible Universal Composability Made Simple.
23. An Extensive Formal Security Analysis of the OpenID Financial-Grade API.
24. Convolutions in Overdrive: Maliciously Secure Convolutions for MPC
25. Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations.
26. A Framework for Universally Composable Diffie-Hellman Key Exchange.
27. The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines.
28. Universal Composition with Responsive Environments.
29. Security Analysis of Re-Encryption RPC Mix Nets.
30. SoK: Verifiability Notions for E-Voting Protocols.
31. A Comprehensive Formal Security Analysis of OAuth 2.0.
32. sElect: A Lightweight Verifiable Remote Voting System.
33. Principles of Security and Trust : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
34. SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web.
35. A Hybrid Approach for Proving Noninterference of Java Programs.
36. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web.
37. Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
38. An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System.
39. Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking.
40. E-Voting Systems.
41. Clash Attacks on the Verifiability of E-Voting Systems.
42. A Framework for the Cryptographic Verification of Java-Like Programs.
43. Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study.
44. Composition theorems without pre-established session identifiers.
45. Ideal Key Derivation and Encryption in Simulation-Based Security.
46. A Formal Definition of Online Abuse-Freeness.
47. Accountability: definition and relationship to verifiability.
48. Proving Coercion-Resistance of Scantegrity II.
49. A Game-Based Definition of Coercion-Resistance and Its Applications.
50. Improving and Simplifying a Variant of Prêt à Voter.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.