Number of items: 17.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2007)
The Reactive Simulatability Framework for Asynchronous Systems.
Information and Computation.
Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006)
Cryptographically Sound Theorem Proving.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Formal Methods and Cryptography.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Soundness Limits of Dolev-Yao Models.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005)
Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4).
pp. 242-252.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3).
pp. 135-154.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
A General Composition Theorem for Secure Reactive System.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
Justifying a Dolev-Yao Model under Active Attacks.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 3655
.
Springer, pp. 1-42.
Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004)
Low-level Ideal Signatures and General Integrity Idealization.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004)
Polynomial Liveness.
Journal of Computer Security, 12 (3-4).
pp. 589-617.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
A Composable Cryptographic Library with Nested Operations.
Backes, Michael and Basin, David and Waidner, Michael
(2003)
Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
ACM.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Reactively Secure Signature Schemes.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Security in Business Process Engineering.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Symmetric Authentication Within a Simulatable Cryptographic Library.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2002)
Polynomial Fairness and Liveness.
This list was generated on Sun Dec 22 03:31:37 2024 CET.