Ralf Sasse
Orcid: 0000-0002-5632-6099
  According to our database1,
  Ralf Sasse
  authored at least 55 papers
  between 2005 and 2026.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2026
    Information Security and Cryptography, Springer, ISBN: 978-3-031-90935-1, 2026
    
  
  2025
One For All: Formally Verifying Protocols which use Aggregate Signatures (extended version).
    
  
    CoRR, May, 2025
    
  
    Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025
    
  
  2024
    Proceedings of the Formal Methods - 26th International Symposium, 2024
    
  
  2023
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
    
  
    Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
    
  
  2022
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
    
  
    Dataset, August, 2022
    
  
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
    
  
    Dataset, August, 2022
    
  
    IEEE Secur. Priv., 2022
    
  
Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version).
    
  
    CoRR, 2022
    
  
    Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
    
  
  2021
    Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
    
  
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions.
    
  
    Proceedings of the 30th USENIX Security Symposium, 2021
    
  
    Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
    
  
  2020
    J. Comput. Secur., 2020
    
  
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
    
  
    Proceedings of the 29th USENIX Security Symposium, 2020
    
  
    Proceedings of the IEEE European Symposium on Security and Privacy, 2020
    
  
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
    
  
    Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
    
  
    Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
    
  
  2019
    ERCIM News, 2019
    
  
    Proceedings of the IEEE European Symposium on Security and Privacy, 2019
    
  
    Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
    
  
    Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
    
  
    Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
    
  
  2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
    
  
    IEEE Trans. Dependable Secur. Comput., 2018
    
  
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
    
  
    Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
    
  
    Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
    
  
  2017
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
    
  
    Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
    
  
  2016
    Proceedings of the 30th International Workshop on Unification, 2016
    
  
  2015
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
    
  
    Proceedings of the Logic, Rewriting, and Concurrency, 2015
    
  
  2014
    Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
    
  
    Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
    
  
  2013
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
    
  
    Proceedings of the Automated Deduction - CADE-24, 2013
    
  
  2012
    PhD thesis, 2012
    
  
    Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012
    
  
    Proceedings of the Computer Security - ESORICS 2012, 2012
    
  
  2011
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
    
  
    Proceedings of the 25th International Workshop on Unification, 2011
    
  
    Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011
    
  
  2010
    Proceedings of the Rewriting Logic and Its Applications - 8th International Workshop, 2010
    
  
    Proceedings of the Security and Trust Management - 6th International Workshop, 2010
    
  
  2009
    Proceedings of the Computer Security, 2009
    
  
  2008
    Proceedings of the Seventh International Workshop on Rewriting Logic and its Applications, 2008
    
  
    Proceedings of the 22nd International Workshop on Unification, 2008
    
  
    Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008
    
  
  2007
    Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
    
  
  2006
    Proceedings of the 6th International Workshop on Rewriting Logic and its Applications, 2006
    
  
  2005
Automatic Validation of Transformation Rules for Java Verification Against a Rewriting Semantics.
    
  
    Proceedings of the Logic for Programming, 2005