2013
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
2012
R. Küsters, Truderung, T., and Vogt, A.,
“Clash Attacks on the Verifiability of E-Voting Systems”, in
Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
R. Küsters, Truderung, T., and Graf, J.,
“A Framework for the Cryptographic Verification of Java-like Programs”, in
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“A Game-Based Definition of Coercion-Resistance and its Applications”,
Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.