According to our database1, Ralf Sasse authored at least 29 papers between 2005 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
IACR Cryptology ePrint Archive, 2019
Security Issues in the 5G Standard and How Formal Methods Come to the Rescue.
ERCIM News, 2019
Proxy Certificates: The Missing Link in the Web's Chain of Trust.
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Symbolic Analysis of Identity-Based Protocols.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Sec. Comput., 2018
Formal Analysis of 5G Authentication.
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
A Formal Analysis of 5G Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Symbolically analyzing security protocols using tamarin.
SIGLOG News, 2017
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Automated Symbolic Proofs of Observational Equivalence.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Alice and Bob Meet Equational Theories.
Proceedings of the Logic, Rewriting, and Concurrency, 2015
Automated Verification of Group Key Agreement Protocols.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
ARPKI: Attack Resilient Public-Key Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the Automated Deduction - CADE-24, 2013
Folding variant narrowing and optimal variant termination.
J. Log. Algebr. Program., 2012
IBOS: A Correct-By-Construction Modular Browser.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
Proceedings of the Computer Security - ESORICS 2012, 2012
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption.
Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011
Folding Variant Narrowing and Optimal Variant Termination.
Proceedings of the Rewriting Logic and Its Applications - 8th International Workshop, 2010
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Variant Narrowing and Equational Unification.
Electr. Notes Theor. Comput. Sci., 2009
Model-Checking DoS Amplification for VoIP Session Initiation.
Proceedings of the Computer Security, 2009
Effectively Checking the Finite Variant Property.
Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008
Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics.
Electr. Notes Theor. Comput. Sci., 2007
A Systematic Approach to Uncover Security Flaws in GUI Logic.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the All About Maude, 2007
Automatic Validation of Transformation Rules for Java Verification Against a Rewriting Semantics.
Proceedings of the Logic for Programming, 2005