Ralf Sasse
Orcid: 0000-0002-5632-6099
According to our database1,
Ralf Sasse
authored at least 48 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Formal Methods - 26th International Symposium, 2024
2023
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
Dataset, August, 2022
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
Dataset, August, 2022
IEEE Secur. Priv., 2022
Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version).
CoRR, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
J. Comput. Secur., 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
ERCIM News, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
2016
Proceedings of the 30th International Workshop on Unification, 2016
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Logic, Rewriting, and Concurrency, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the Automated Deduction - CADE-24, 2013
2012
PhD thesis, 2012
J. Log. Algebraic Methods Program., 2012
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the 25th International Workshop on Unification, 2011
Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011
2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
2009
Proceedings of the Computer Security, 2009
2008
Proceedings of the Seventh International Workshop on Rewriting Logic and its Applications, 2008
Proceedings of the 22nd International Workshop on Unification, 2008
Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
2006
Proceedings of the 6th International Workshop on Rewriting Logic and its Applications, 2006
2005
Automatic Validation of Transformation Rules for Java Verification Against a Rewriting Semantics.
Proceedings of the Logic for Programming, 2005