Items where Division is "Michael Backes (InfSec)" and Year is 2008

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: B | C | N
Number of items: 19.

B

Backes, Michael and Berg, Matthias and Unruh, Dominique
(2008) A Formal Language for Cryptographic Pseudocode.
In: LPAR 2008.

Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2008) Conditional Reactive Simulatability.
International Journal of Information Security, 7 (2). pp. 155-169.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) Compromising Reflections or How to Read LCD Monitors Around the Corner.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP'08.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten.
Heise Verlag, Hannover
.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) OAEP is Secure Under Key-dependent Messages.
In: ASIACRYPT 2008.

Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2008) Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
In: Proceedings of 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC).
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2008) Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus.
In: Proceedings of 21st IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Köpf, Boris
(2008) Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
In: Proceedings of 13th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2008) CASPA: Causality-based Abstraction for Security Protocol Analysis.
In: Proceedings of 20th International Conference on Computer Aided Verification (CAV).
Conference: CAV Computer Aided Verification

Backes, Michael and Maffei, Matteo and Hriţcu, Cătălin
(2008) Type-checking zero-knowledge.
In: Proceedings of the 15th ACM conference on Computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2008) Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP'08.
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Pfitzmann, Birgit
(2008) Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
International Journal of Information Security, 7 (1). pp. 33-54.

Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2008) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Journal of Computer Security (JCS).

Backes, Michael and Unruh, Dominique
(2008) Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
In: 21st IEEE Computer Security Foundations Symposium, CSF 2008.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Unruh, Dominique
(2008) Limits of Constructive Security Proofs.
In: ASIACRYPT 2008.

Baumann, Christoph
(2008) Formal Specification of the x87 Floating-Point Instruction Set.
Diploma thesis, UNSPECIFIED.

Bornträger, Holger
(2008) MD5 Collisions on Multimedia Files.
Bachelors thesis, UNSPECIFIED.

C

Ciobataru, Oana
(2008) Efficient Long-term Secure Universally Composable Commitments.
Masters thesis, Saarland University.

N

Nesbigall, Stefan
(2008) Quantenbasierte Koordination von Multiagentensystemen.
Masters thesis, Saarland University.

This list was generated on Mon Dec 30 18:19:42 2024 CET.