Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Author is R. Küsters  [Clear All Filters]
2014
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
R. Küsters, Truderung, T., and Vogt, A., Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, in Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
2012
R. Küsters, Truderung, T., and Vogt, A., Clash Attacks on the Verifiability of E-Voting Systems, in Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
R. Küsters, Truderung, T., and Graf, J., A Framework for the Cryptographic Verification of Java-like Programs, in Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A., A Game-Based Definition of Coercion-Resistance and its Applications, Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
2011
R. Küsters, Truderung, T., and Vogt, A., Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S{&}P 2011), 2011.
2010
R. Küsters, Truderung, T., and Vogt, A., Proving Coercion-Resistance of Scantegrity II, in Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.