Ralf Küsters
Orcid: 0000-0002-9071-9312Affiliations:
- University of Stuttgart, Germany
- University of Trier, Department of Computer Science, Germany (former)
According to our database1,
Ralf Küsters
authored at least 127 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
CoRR, June, 2025
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process.
ACM Trans. Priv. Secur., February, 2025
Audience Injection Attacks: A New Class of Attacks on Web-Based Authorization and Authentication Standards.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Document Analysis and Recognition - ICDAR 2025, 2025
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025
2024
PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation.
Proc. ACM Hum. Comput. Interact., 2024
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations.
Proceedings of the Computer Security - ESORICS 2023, 2023
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Sicherheit, 2022
Proceedings of The 1st Gaze Meets ML workshop, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting.
IACR Cryptol. ePrint Arch., 2021
DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
J. Cryptol., 2020
J. Cryptol., 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Dagstuhl Reports, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2017
Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System.
CoRR, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Moderne Kryptographie - Eine Einführung.
Vieweg + Teubner, ISBN: 978-3-519-00509-4, 2011
2010
ACM Trans. Comput. Log., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.
ACM Trans. Comput. Log., 2008
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06).
Inf. Comput., 2008
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the STACS 2007, 2007
Proceedings of the 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 2007
Proceedings of the FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 2007
A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
Proceedings of the Computer Security, 2007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
Structural Subsumption and Least Common Subsumers in a Description Logic with Existential and Number Restrictions.
Stud Logica, 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the STACS 2005, 2005
Proceedings of the CONCUR 2005 - Concurrency Theory, 16th International Conference, 2005
2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the STACS 2004, 2004
2003
Proceedings of the Logic for Programming, 2003
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003
Extensions to Description Logics.
Proceedings of the Description Logic Handbook: Theory, Implementation, and Applications, 2003
Proceedings of the Computer Science Logic, 17th International Workshop, 2003
2002
Approximation and Difference in Description Logics.
Proceedings of the Eights International Conference on Principles and Knowledge Representation and Reasoning (KR-02), 2002
Proceedings of the FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 2002
Proceedings of the 2002 International Workshop on Description Logics (DL2002), 2002
Unification in a Description Logic with Inconsistency and Transitive Closure of Roles.
Proceedings of the 2002 International Workshop on Description Logics (DL2002), 2002
Proceedings of the CONCUR 2002, 2002
2001
J. Artif. Intell. Res., 2001
Approximating Most Specific Concepts in Description Logics with Existential Restrictions.
Proceedings of the KI 2001: Advances in Artificial Intelligence, 2001
Computing Least Common Subsumers in ALEN.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001
Matching under Side Conditions in Description Logics.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001
Proceedings of the Working Notes of the 2001 International Description Logics Workshop (DL-2001), 2001
Lecture Notes in Computer Science 2100, Springer, ISBN: 3-540-42397-4, 2001
2000
Rewriting Concepts Using Terminologies.
Proceedings of the KR 2000, 2000
Matching Concept Descriptions with Existential Restrictions.
Proceedings of the KR 2000, 2000
What's not in a name: Some Properties of a Purely Structural Approach to Integrating Large DL Knowledge Bases.
Proceedings of the 2000 International Workshop on Description Logics (DL2000), 2000
1999
Computing Least Common Subsumers in Description Logics with Existential Restrictions.
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999
Proceedings of the 1999 International Workshop on Description Logics (DL'99), Linköping, Sweden, July 30, 1999
1998
Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata.
Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR'98), 1998
Computing the Least Common Subsumer and the Most Specific Concept in the Presence of Cyclic ALN-Concept Descriptions.
Proceedings of the KI-98: Advances in Artificial Intelligence, 1998
Proceedings of the 1998 International Workshop on Description Logics (DL'98), IRST, Povo, 1998
Proceedings of the 1998 International Workshop on Description Logics (DL'98), IRST, Povo, 1998
1997
Characterizing the semantics of terminological cycles with the help of finite automata.
Proceedings of the 1997 International Workshop on Description Logics, 1997