Ralf Küsters

From MaRDI portal
Revision as of 21:07, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:196898

Available identifiers

zbMath Open kusters.ralfMaRDI QIDQ196898

List of research outcomes

PublicationDate of PublicationType
Embedding the UC model into the IITM model2022-08-30Paper
A tutorial-style introduction to \(\mathsf{DY}^{\star}\)2022-07-13Paper
Conditional Reactive Simulatability2022-03-09Paper
The IITM model: a simple and expressive model for universal composability2020-11-06Paper
Joint state composition theorems for public-key encryption and digital signature functionalities with local computation2020-11-06Paper
iUC: flexible universal composability made simple2020-05-11Paper
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption2017-07-12Paper
Universal Composition with Responsive Environments2017-01-06Paper
Deciding strategy properties of contract-signing protocols2015-09-17Paper
https://portal.mardi4nfdi.de/entity/Q28480352013-09-25Paper
Moderne Kryptographie2011-08-26Paper
Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach2011-06-03Paper
Unification in a Description Logic with Transitive Closure of Roles2011-05-06Paper
Ideal Key Derivation and Encryption in Simulation-Based Security2011-02-11Paper
https://portal.mardi4nfdi.de/entity/Q34081342010-02-24Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science2009-08-06Paper
On the relationships between notions of simulation-based security2009-06-08Paper
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography2008-04-24Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions2008-04-17Paper
Transducer-based analysis of cryptographic protocols2007-12-10Paper
STACS 20042007-10-01Paper
A Dolev-Yao-Based Definition of Abuse-Free Protocols2007-09-11Paper
On the Automatic Analysis of Recursive Security Protocols with XOR2007-09-03Paper
Computer Science Logic2007-06-21Paper
CONCUR 2005 – Concurrency Theory2006-11-01Paper
https://portal.mardi4nfdi.de/entity/Q54779432006-06-29Paper
Structural subsumption and least common subsumers in a description logic with existential and number restrictions2006-03-17Paper
Theory of Cryptography2005-12-07Paper
STACS 20052005-12-02Paper
An NP decision procedure for protocol insecurity with XOR2005-06-30Paper
https://portal.mardi4nfdi.de/entity/Q44152592003-07-28Paper
Memoryless Determinacy of Parity Games2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44845082003-06-12Paper
https://portal.mardi4nfdi.de/entity/Q47819552003-05-12Paper
https://portal.mardi4nfdi.de/entity/Q47974512003-03-13Paper
Non-standard inferences in description logics2001-08-20Paper
Matching in description logics1999-09-07Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ralf Küsters