Number of items: 33.
Conference or Workshop Item (A Paper)
Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2007)
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006)
Cryptographically Sound Theorem Proving.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Formal Methods and Cryptography.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
Backes, Michael and Pfitzmann, Birgit
(2006)
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006)
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
Backes, Michael and Pfitzmann, Birgit
(2005)
Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
Backes, Michael and Pfitzmann, Birgit
(2005)
Relating Symbolic and Cryptographic Secrecy.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
A General Composition Theorem for Secure Reactive System.
Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004)
Low-level Ideal Signatures and General Integrity Idealization.
Backes, Michael and Pfitzmann, Birgit
(2004)
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
A Composable Cryptographic Library with Nested Operations.
Backes, Michael and Pfitzmann, Birgit
(2003)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
Backes, Michael and Pfitzmann, Birgit
(2003)
Intransitive Non-Interference for Cryptographic Purposes.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Reactively Secure Signature Schemes.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Security in Business Process Engineering.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Symmetric Authentication Within a Simulatable Cryptographic Library.
Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003)
A Toolkit for Managing Enterprise Privacy Policies.
Backes, Michael and Pfitzmann, Birgit
(2002)
Computational Probabilistic Non-Interference.
Backes, Michael and Jacobi, Christian and Pfitzmann, Birgit
(2002)
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2002)
Polynomial Fairness and Liveness.
Article
Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2008)
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Journal of Computer Security (JCS).
Backes, Michael and Pfitzmann, Birgit
(2008)
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
International Journal of Information Security, 7 (1).
pp. 33-54.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2007)
The Reactive Simulatability Framework for Asynchronous Systems.
Information and Computation.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005)
Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4).
pp. 242-252.
Backes, Michael and Pfitzmann, Birgit
(2005)
Relating Symbolic and Cryptographic Secrecy.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2 (2).
pp. 109-123.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3).
pp. 135-154.
Backes, Michael and Pfitzmann, Birgit
(2004)
Computational Probabilistic Non-Interference.
International Journal of Information Security (IJIS), 3 (1).
pp. 42-60.
Backes, Michael and Pfitzmann, Birgit
(2004)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
IEEE Journal on Selected Areas of Computing (JSAC), 22 (10).
pp. 2075-2086.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004)
Polynomial Liveness.
Journal of Computer Security, 12 (3-4).
pp. 589-617.
Book Section
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
Justifying a Dolev-Yao Model under Active Attacks.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 3655
.
Springer, pp. 1-42.
Other
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Soundness Limits of Dolev-Yao Models.
Backes, Michael and Pfitzmann, Birgit
(2003)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).
This list was generated on Thu Nov 21 11:30:03 2024 CET.