Items where Author is "Pfitzmann, Birgit"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 33.

Conference or Workshop Item (A Paper)

Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2007) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
In: Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006) Cryptographically Sound Theorem Proving.
In: Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Formal Methods and Cryptography.
In: Proceedings of 14th International Symposium on Formal Methods (FM).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2006) On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
In: Proceedings of 21st IFIP International Information Security Conference (SEC).

Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006) Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
In: Proceedings of Foundations of Software Science and Computational Structures (FOSSACS).

Backes, Michael and Pfitzmann, Birgit
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
In: Proceedings of 26th IEEE Symposium on Security and Privacy.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) A General Composition Theorem for Secure Reactive System.
In: Proceedings of 1st Theory of Cryptography Conference (TCC).

Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004) Low-level Ideal Signatures and General Integrity Idealization.
In: Proceedings of 7th Information Security Conference (ISC).

Backes, Michael and Pfitzmann, Birgit
(2004) Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
In: Proceedings of 17th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) A Composable Cryptographic Library with Nested Operations.
In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
In: Proceedings of 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Pfitzmann, Birgit
(2003) Intransitive Non-Interference for Cryptographic Purposes.
In: Proceedings of 24th IEEE Symposium on Security and Privacy.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Reactively Secure Signature Schemes.
In: Proceedings of 6th Information Security Conference (ISC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Security in Business Process Engineering.
In: Proceedings of 2003 International Conference on Business Process Management.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Symmetric Authentication Within a Simulatable Cryptographic Library.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003) A Toolkit for Managing Enterprise Privacy Policies.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2002) Computational Probabilistic Non-Interference.
In: Proceedings of 7th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Jacobi, Christian and Pfitzmann, Birgit
(2002) Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
In: Proceedings of 11th International Symposium on Formal Methods Europe (FME).

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2002) Polynomial Fairness and Liveness.
In: Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW).

Article

Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2008) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Journal of Computer Security (JCS).

Backes, Michael and Pfitzmann, Birgit
(2008) Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
International Journal of Information Security, 7 (1). pp. 33-54.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2007) The Reactive Simulatability Framework for Asynchronous Systems.
Information and Computation.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4). pp. 242-252.

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2 (2). pp. 109-123.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3). pp. 135-154.

Backes, Michael and Pfitzmann, Birgit
(2004) Computational Probabilistic Non-Interference.
International Journal of Information Security (IJIS), 3 (1). pp. 42-60.

Backes, Michael and Pfitzmann, Birgit
(2004) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
IEEE Journal on Selected Areas of Computing (JSAC), 22 (10). pp. 2075-2086.

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004) Polynomial Liveness.
Journal of Computer Security, 12 (3-4). pp. 589-617.

Book Section

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) Justifying a Dolev-Yao Model under Active Attacks.
In: UNSPECIFIED Lecture Notes in Computer Science, 3655 . Springer, pp. 1-42.

Other

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Soundness Limits of Dolev-Yao Models.
UNSPECIFIED
.

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).
UNSPECIFIED
.

This list was generated on Sun Dec 22 02:58:52 2024 CET.