Tomasz Truderung
Affiliations:- Polyas GmbH, Germany
- University of Trier, Department of Computer Science, Germany (former)
According to our database1,
Tomasz Truderung
authored at least 30 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Systematic User Evaluation of a Second Device Based Cast-as-Intended Verifiability Approach.
Proceedings of the Financial Cryptography and Data Security. FC 2024 International Workshops, 2024
2023
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023
2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the STACS 2007, 2007
Proceedings of the 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 2007
2005
Proceedings of the CONCUR 2005 - Concurrency Theory, 16th International Conference, 2005
Proceedings of the Automated Deduction, 2005
2004
Proceedings of the Computer Science Logic, 18th International Workshop, 2004
2002
Proceedings of the Computer Science Logic, 16th International Workshop, 2002
2001
Proceedings of the 3rd international ACM SIGPLAN conference on Principles and practice of declarative programming, 2001