Items where Author is "Waidner, Michael"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 17.

Article

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2007) The Reactive Simulatability Framework for Asynchronous Systems.
Information and Computation.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4). pp. 242-252.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3). pp. 135-154.

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004) Polynomial Liveness.
Journal of Computer Security, 12 (3-4). pp. 589-617.

Book Section

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) Justifying a Dolev-Yao Model under Active Attacks.
In: UNSPECIFIED Lecture Notes in Computer Science, 3655 . Springer, pp. 1-42.

Conference or Workshop Item

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006) Cryptographically Sound Theorem Proving.
In: Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Formal Methods and Cryptography.
In: Proceedings of 14th International Symposium on Formal Methods (FM).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) A General Composition Theorem for Secure Reactive System.
In: Proceedings of 1st Theory of Cryptography Conference (TCC).

Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004) Low-level Ideal Signatures and General Integrity Idealization.
In: Proceedings of 7th Information Security Conference (ISC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) A Composable Cryptographic Library with Nested Operations.
In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Reactively Secure Signature Schemes.
In: Proceedings of 6th Information Security Conference (ISC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Security in Business Process Engineering.
In: Proceedings of 2003 International Conference on Business Process Management.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Symmetric Authentication Within a Simulatable Cryptographic Library.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2002) Polynomial Fairness and Liveness.
In: Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW).

Book

Backes, Michael and Basin, David and Waidner, Michael
(2003) Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
ACM.

Other

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Soundness Limits of Dolev-Yao Models.
UNSPECIFIED
.

This list was generated on Fri Apr 26 00:03:56 2019 CEST.