TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 25.

Backes, Michael and Ning, Peng (2009):
Computer Security - 2009, 14th European Symposium on Research in Computer Security.
In: Lecture Notes in Computer Science, In: ESORICS, Springer, pp. 21-23, ISBN 978-3-642-04443-4,
[Conference or Workshop Item]

Lux, Alexander and Mantel, Heiko Backes, Michael and Ning, Peng (eds.) (2009):
Declassification with Explicit Reference Points.
In: LNCS, 5789, In: 14th European Symposium on Research in Computer Security, Springer, pp. 69-85, [Conference or Workshop Item]

Backes, Michael and Basin, David and Waidner, Michael (2007):
Preface.
15, In: Journal of Computer Security, (6), p. 561, [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
205, In: Information and Computation, (12), pp. 1685--1720, [Article]

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael (2006):
Cryptographically Sound Theorem Proving.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Karjoth, Günter and Pitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Backes, Michael and Karioth, Guenter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Reactively Secure Signature Schemes.
4, In: International Journal of Information Security (IJIS), (4), pp. 242--252, [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
4, In: International Journal of Information Security (IJIS), Springer-Verlag, (3), pp. 135--154, [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), Springer-Verlag, Berlin, pp. 336--354, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC), [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2004):
Polynomial Liveness.
12, In: Journal of Computer Security (JCS), (3-4), pp. 589--617, [Article]

Atluri, Vijayalakshmi and Backes, Michael and Basin, David and Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE, ACM, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), Springer-Verlag, Berlin, pp. 84--95, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), Springer-Verlag, Berlin, pp. 168--183, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, pp. 160--174, [Conference or Workshop Item]

This list was generated on Tue Dec 10 00:26:16 2019 CET.