Items where Division is "Michael Backes (InfSec)" and Year is 2006

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: B | S
Number of items: 16.

B

Backes, Michael
(2006) Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Electronic Notes in Theoretical Computer Science (ENTCS), 155. pp. 111-145.

Backes, Michael and Cachin, Christian and Oprea, Alina
(2006) Secure Key-Updating for Lazy Revocation.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2006) Cryptographically Sound Security Proofs for Basic and Public-key Kerberos.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Ramanathan, Ajith and Scedrov, Andre
(2006) Games and the Impossibility of Realizable Ideal Functionality.
UNSPECIFIED
.

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2006) Compositional Analysis of Contract Signing Protocols.
Theoretical Computer Science, 367 (1-2). pp. 33-56.

Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2006) Conditional Reactive Simulatability.
In: Proceedings of 11th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Gritzalis, Stefanos and Preneel, Bart and Katsikas, Sokratis K and Lopez, Javier
(2006) Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece.
Lecture Notes in Computer Science, 4176 . Springer.

Backes, Michael and Laud, Peeter
(2006) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
In: Proceedings of 13th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Laud, Peeter
(2006) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
UNSPECIFIED
.
(Unpublished)

Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006) Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
In: Proceedings of Foundations of Software Science and Computational Structures (FOSSACS).

Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006) On the Necessity of Rewinding in Secure Multiparty Computation.
UNSPECIFIED
.

Backes, Michael and Pfitzmann, Birgit
(2006) On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
In: Proceedings of 21st IFIP International Information Security Conference (SEC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Formal Methods and Cryptography.
In: Proceedings of 14th International Symposium on Formal Methods (FM).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Soundness Limits of Dolev-Yao Models.
UNSPECIFIED
.

S

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006) Cryptographically Sound Theorem Proving.
In: Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW).

This list was generated on Sat Dec 21 18:01:33 2024 CET.