Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 8 results:
[ Author(Desc)] Title Type Year
Filters: Author is R. Küsters  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
R. Küsters, Truderung, T., and Vogt, A., Proving Coercion-Resistance of Scantegrity II, in Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
R. Küsters, Truderung, T., and Vogt, A., Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S{&}P 2011), 2011.
R. Küsters, Truderung, T., and Vogt, A., A Game-Based Definition of Coercion-Resistance and its Applications, Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
R. Küsters, Truderung, T., and Vogt, A., Clash Attacks on the Verifiability of E-Voting Systems, in Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
R. Küsters, Truderung, T., and Graf, J., A Framework for the Cryptographic Verification of Java-like Programs, in Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C., A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs, in Grande Region Security and Reliability Day 2013, 2013.
R. Küsters, Truderung, T., and Vogt, A., Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, in Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.