Number of items: 16.
B
Backes, Michael
(2006)
Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Electronic Notes in Theoretical Computer Science (ENTCS), 155.
pp. 111-145.
Backes, Michael and Cachin, Christian and Oprea, Alina
(2006)
Secure Key-Updating for Lazy Revocation.
Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2006)
Cryptographically Sound Security Proofs for Basic and Public-key Kerberos.
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Ramanathan, Ajith and Scedrov, Andre
(2006)
Games and the Impossibility of Realizable Ideal Functionality.
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2006)
Compositional Analysis of Contract Signing Protocols.
Theoretical Computer Science, 367 (1-2).
pp. 33-56.
Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2006)
Conditional Reactive Simulatability.
Backes, Michael and Gritzalis, Stefanos and Preneel, Bart and Katsikas, Sokratis K and Lopez, Javier
(2006)
Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece.
Lecture Notes in Computer Science, 4176
.
Springer.
Backes, Michael and Laud, Peeter
(2006)
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
Backes, Michael and Laud, Peeter
(2006)
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
(Unpublished)
Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006)
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006)
On the Necessity of Rewinding in Secure Multiparty Computation.
Backes, Michael and Pfitzmann, Birgit
(2006)
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Formal Methods and Cryptography.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Soundness Limits of Dolev-Yao Models.
S
Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006)
Cryptographically Sound Theorem Proving.
This list was generated on Sat Dec 21 18:01:33 2024 CET.