Items where Division is "Michael Backes (InfSec)" and Year is 2005

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: B
Number of items: 15.

B

Backes, Michael
(2005) Quantifying Probabilistic Information Flow in Computational Reactive Systems.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael
(2005) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
Journal of Logic and Algebraic Programming (JLAP), 2. pp. 157-188.

Backes, Michael and Cachin, Christian
(2005) Public-Key Steganography with Active Attacks.
In: Proceedings of 2nd Theory of Cryptography Conference (TCC).

Backes, Michael and Cachin, Christian and Oprea, Alina
(2005) Lazy Revocation in Cryptographic File Systems.
In: Proceedings of 3rd International IEEE Security in Storage Workshop (SISW).

Backes, Michael and Camenisch, Jan and Sommer, Dieter
(2005) Anonymous yet accountable access control.
In: Proceedings of 4th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2005) Compositional Analysis of Contract Signing Protocols.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Dürmuth, Markus
(2005) A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Groß, Thomas
(2005) Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
In: Proceedings of 2005 ACM Secure Web Services Workshop (SWS).

Backes, Michael and Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2005) On Fairness in Simulatability-based Cryptographic Systems.
In: 3rd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code.

Backes, Michael and Pfitzmann, Birgit
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2 (2). pp. 109-123.

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
In: Proceedings of 26th IEEE Symposium on Security and Privacy.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4). pp. 242-252.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3). pp. 135-154.

Backes, Michael and Scedrov, Andre
(2005) Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.
ENTCS.

This list was generated on Fri Apr 19 09:12:26 2024 CEST.