Search the dblp DataBase
Ralf Küsters :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Detlef Kähler , Ralf Küsters Constraint Solving for Contract-Signing Protocols. [Citation Graph (0, 0)][DBLP ] CONCUR, 2005, pp:233-247 [Conf ] Ralf Küsters On the Decidability of Cryptographic Protocols with Open-Ended Data Structures. [Citation Graph (0, 0)][DBLP ] CONCUR, 2002, pp:515-530 [Conf ] Ralf Küsters Simulation-Based Security with Inexhaustible Interactive Turing Machines. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:309-320 [Conf ] Yannick Chevalier , Ralf Küsters , Michaël Rusinowitch , Mathieu Turuani , Laurent Vigneron Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. [Citation Graph (0, 0)][DBLP ] CSL, 2003, pp:128-141 [Conf ] Ralf Küsters Memoryless Determinacy of Parity Games. [Citation Graph (0, 0)][DBLP ] Automata, Logics, and Infinite Games, 2001, pp:95-106 [Conf ] Alexander Borgida , Ralf Küsters What's not in a name: Some Properties of a Purely Structural Approach to Integrating Large DL Knowledge Bases. [Citation Graph (0, 0)][DBLP ] Description Logics, 2000, pp:65-78 [Conf ] Franz Baader , Ralf Küsters Unification in a Description Logic with Transitive Closure of Roles. [Citation Graph (0, 0)][DBLP ] Description Logics, 2001, pp:- [Conf ] Franz Baader , Ralf Küsters Least Common Subsumer Computation w.r.t. cyclic ALN-Terminologies. [Citation Graph (0, 0)][DBLP ] Description Logics, 1998, pp:- [Conf ] Franz Baader , Ralf Küsters Matching in Description Logics with Existential Restrictions. [Citation Graph (0, 0)][DBLP ] Description Logics, 1999, pp:- [Conf ] Franz Baader , Ralf Küsters , Ralf Molitor Structural Subsumption Considered from an Automata-Theoretic Point of View. [Citation Graph (0, 0)][DBLP ] Description Logics, 1998, pp:- [Conf ] Franz Baader , Ralf Küsters , Frank Wolter Extensions to Description Logics. [Citation Graph (0, 0)][DBLP ] Description Logic Handbook, 2003, pp:219-261 [Conf ] Ralf Küsters Characterizing the semantics of terminological cycles with the help of finite automata. [Citation Graph (0, 0)][DBLP ] Description Logics, 1997, pp:- [Conf ] Michael Backes , Markus Dürmuth , Dennis Hofheinz , Ralf Küsters Conditional Reactive Simulatability. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:424-443 [Conf ] Yannick Chevalier , Ralf Küsters , Michaël Rusinowitch , Mathieu Turuani Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2003, pp:124-135 [Conf ] Véronique Cortier , Steve Kremer , Ralf Küsters , Bogdan Warinschi Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2006, pp:176-187 [Conf ] Ralf Küsters , Thomas Wilke Deciding the First Level of the µ-Calculus Alternation Hierarchy. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2002, pp:241-252 [Conf ] Detlef Kähler , Ralf Küsters , Thomas Wilke A Dolev-Yao-Based Definition of Abuse-Free Protocols. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:95-106 [Conf ] Franz Baader , Sebastian Brandt , Ralf Küsters Matching under Side Conditions in Description Logics. [Citation Graph (0, 0)][DBLP ] IJCAI, 2001, pp:213-218 [Conf ] Franz Baader , Ralf Küsters , Ralf Molitor Computing Least Common Subsumers in Description Logics with Existential Restrictions. [Citation Graph (0, 0)][DBLP ] IJCAI, 1999, pp:96-103 [Conf ] Ralf Küsters , Ralf Molitor Computing Least Common Subsumers in ALEN. [Citation Graph (0, 0)][DBLP ] IJCAI, 2001, pp:219-224 [Conf ] Franz Baader , Ralf Küsters Computing the Least Common Subsumer and the Most Specific Concept in the Presence of Cyclic ALN-Concept Descriptions. [Citation Graph (0, 0)][DBLP ] KI, 1998, pp:129-140 [Conf ] Ralf Küsters , Ralf Molitor Approximating Most Specific Concepts in Description Logics with Existential Restrictions. [Citation Graph (0, 0)][DBLP ] KI/ÖGAI, 2001, pp:33-47 [Conf ] Sebastian Brandt , Ralf Küsters , Anni-Yasmin Turhan Approximation and Difference in Description Logics. [Citation Graph (0, 0)][DBLP ] KR, 2002, pp:203-214 [Conf ] Franz Baader , Ralf Küsters Matching Concept Descriptions with Existential Restrictions. [Citation Graph (0, 0)][DBLP ] KR, 2000, pp:261-272 [Conf ] Franz Baader , Ralf Küsters , Ralf Molitor Rewriting Concepts Using Terminologies. [Citation Graph (0, 0)][DBLP ] KR, 2000, pp:297-308 [Conf ] Ralf Küsters Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata. [Citation Graph (0, 0)][DBLP ] KR, 1998, pp:499-511 [Conf ] Yannick Chevalier , Ralf Küsters , Michaël Rusinowitch , Mathieu Turuani An NP Decision Procedure for Protocol Insecurity with XOR. [Citation Graph (0, 0)][DBLP ] LICS, 2003, pp:261-270 [Conf ] Franz Baader , Ralf Küsters Unification in a Description Logic with Transitive Closure of Roles. [Citation Graph (0, 0)][DBLP ] LPAR, 2001, pp:217-232 [Conf ] Sebastian Brandt , Anni-Yasmin Turhan , Ralf Küsters Extensions of Non-standard Inferences to Descriptions Logics with Transitive Roles. [Citation Graph (0, 0)][DBLP ] LPAR, 2003, pp:122-136 [Conf ] Detlef Kähler , Ralf Küsters , Thomas Wilke Deciding Properties of Contract-Signing Protocols. [Citation Graph (0, 0)][DBLP ] STACS, 2005, pp:158-169 [Conf ] Ralf Küsters , Thomas Wilke Automata-Based Analysis of Recursive Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] STACS, 2004, pp:382-393 [Conf ] Ralf Küsters , Tomasz Truderung On the Automatic Analysis of Recursive Security Protocols with XOR. [Citation Graph (0, 0)][DBLP ] STACS, 2007, pp:646-657 [Conf ] Anupam Datta , Ralf Küsters , John C. Mitchell , Ajith Ramanathan On the Relationships Between Notions of Simulation-Based Security. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:476-494 [Conf ] Ralf Küsters , Ralf Molitor Approximating most specific concepts in description logics with existential restrictions. [Citation Graph (0, 0)][DBLP ] AI Commun., 2002, v:15, n:1, pp:47-59 [Journal ] Yannick Chevalier , Ralf Küsters , Michaël Rusinowitch , Mathieu Turuani Deciding the Security of Protocols with Commuting Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:55-66 [Journal ] Ralf Küsters On the decidability of cryptographic protocols with open-ended data structures. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:49-70 [Journal ] Ralf Küsters , Alexander Borgida What's in an Attribute? Consequences for the Least Common Subsumer. [Citation Graph (0, 0)][DBLP ] J. Artif. Intell. Res. (JAIR), 2001, v:14, n:, pp:167-203 [Journal ] Franz Baader , Ralf Küsters , Alexander Borgida , Deborah L. McGuinness Matching in Description Logics. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1999, v:9, n:3, pp:411-447 [Journal ] Ralf Küsters , Ralf Molitor Structural Subsumption and Least Common Subsumers in a Description Logic with Existential and Number Restrictions. [Citation Graph (0, 0)][DBLP ] Studia Logica, 2005, v:81, n:2, pp:227-259 [Journal ] Yannick Chevalier , Ralf Küsters , Michaël Rusinowitch , Mathieu Turuani An NP decision procedure for protocol insecurity with XOR. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:338, n:1-3, pp:247-274 [Journal ] Véronique Cortier , Ralf Küsters , Bogdan Warinschi A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:422-437 [Conf ] Detlef Kähler , Ralf Küsters , Tomasz Truderung Infinite State AMC-Model Checking for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] LICS, 2007, pp:181-192 [Conf ] Max Tuengerthal , Ralf Küsters , Mathieu Turuani Implementing a Unification Algorithm for Protocol Analysis with XOR [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Selecting theories and nonce generation for recursive protocols. [Citation Graph (, )][DBLP ] Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. [Citation Graph (, )][DBLP ] Computational soundness for key exchange protocols with symmetric encryption. [Citation Graph (, )][DBLP ] Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. [Citation Graph (, )][DBLP ] Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. [Citation Graph (, )][DBLP ] Universally Composable Symmetric Encryption. [Citation Graph (, )][DBLP ] A Game-Based Definition of Coercion-Resistance and Its Applications. [Citation Graph (, )][DBLP ] On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. [Citation Graph (, )][DBLP ] An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. [Citation Graph (, )][DBLP ] Improving and Simplifying a Variant of Prêt à Voter. [Citation Graph (, )][DBLP ] Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach [Citation Graph (, )][DBLP ] An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.011secs