Ralf Sasse
Ralf Sasse
Senior Scientist in Computer Science, ETH Zurich
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1152014
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1142018
Folding variant narrowing and optimal variant termination
S Escobar Román, R Sasse, J Meseguer
Journal of Logic and Algebraic Programming 81 (7), 898-928, 2012
1002012
Automated symbolic proofs of observational equivalence
D Basin, J Dreier, R Sasse
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
792015
A systematic approach to uncover security flaws in GUI logic
S Chen, J Meseguer, R Sasse, HJ Wang, YM Wang
2007 IEEE Symposium on Security and Privacy (SP'07), 71-85, 2007
592007
A systematic approach to uncover security flaws in GUI logic
S Chen, J Meseguer, R Sasse, HJ Wang, YM Wang
2007 IEEE Symposium on Security and Privacy (SP'07), 71-85, 2007
592007
Variant narrowing and equational unification
S Escobar, J Meseguer, R Sasse
Electronic Notes in Theoretical Computer Science 238 (3), 103-119, 2009
542009
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
422014
Beyond subterm-convergent equational theories in automated verification of stateful protocols
J Dreier, C Duménil, S Kremer, R Sasse
International Conference on Principles of Security and Trust, 117-140, 2017
362017
Automatic validation of transformation rules for Java verification against a rewriting semantics
W Ahrendt, A Roth, R Sasse
International Conference on Logic for Programming Artificial Intelligence …, 2005
322005
Java+ ITP: A verification tool based on Hoare logic and algebraic semantics
R Sasse, J Meseguer
Electronic Notes in Theoretical Computer Science 176 (4), 29-46, 2007
312007
Design, analysis, and implementation of ARPKI: an attack-resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing 15 (3), 393-408, 2016
292016
Folding variant narrowing and optimal variant termination
S Escobar, R Sasse, J Meseguer
International Workshop on Rewriting Logic and its Applications, 52-68, 2010
292010
Effectively checking the finite variant property
S Escobar, J Meseguer, R Sasse
International Conference on Rewriting Techniques and Applications, 79-93, 2008
272008
Effectively checking the finite variant property
S Escobar, J Meseguer, R Sasse
International Conference on Rewriting Techniques and Applications, 79-93, 2008
272008
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018
252018
Effective symbolic protocol analysis via equational irreducibility conditions
S Erbatur, S Escobar, D Kapur, Z Liu, C Lynch, C Meadows, J Meseguer, ...
European Symposium on Research in Computer Security, 73-90, 2012
242012
Protocol analysis modulo combination of theories: A case study in Maude-NPA
R Sasse, S Escobar, C Meadows, J Meseguer
International Workshop on Security and Trust Management, 163-178, 2010
242010
Model-checking DoS amplification for VoIP session initiation
R Shankesi, M AlTurki, R Sasse, CA Gunter, J Meseguer
European Symposium on Research in Computer Security, 390-405, 2009
232009
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption
S Escobar, D Kapur, C Lynch, C Meadows, J Meseguer, P Narendran, ...
Proceedings of the 13th international ACM SIGPLAN symposium on Principles …, 2011
222011
The system can't perform the operation now. Try again later.
Articles 1–20