Number of items: 12.
B
Backes, Michael
(2004)
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
Backes, Michael and Bagga, Walid and Karjoth, Günter and Schunter, Matthias
(2004)
Efficient Comparison of Enterprise Privacy Policies.
Backes, Michael and Dürmuth, Markus and Karjoth, Günter
(2004)
Unification in Privacy Policy Evaluation - Translating EPAL to Prolog.
Backes, Michael and Dürmuth, Markus and Steinwandt, Rainer
(2004)
An Algebra for Composing Enterprise Privacy Policies.
Backes, Michael and Hofheinz, Dennis
(2004)
How to Break and Repair a Universally Composable Signature Functionality.
Backes, Michael and Pfitzmann, Birgit
(2004)
Computational Probabilistic Non-Interference.
International Journal of Information Security (IJIS), 3 (1).
pp. 42-60.
Backes, Michael and Pfitzmann, Birgit
(2004)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
IEEE Journal on Selected Areas of Computing (JSAC), 22 (10).
pp. 2075-2086.
Backes, Michael and Pfitzmann, Birgit
(2004)
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004)
Polynomial Liveness.
Journal of Computer Security, 12 (3-4).
pp. 589-617.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
A General Composition Theorem for Secure Reactive System.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
Justifying a Dolev-Yao Model under Active Attacks.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 3655
.
Springer, pp. 1-42.
Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004)
Low-level Ideal Signatures and General Integrity Idealization.
This list was generated on Sat Dec 21 18:24:12 2024 CET.