Items where Division is "Michael Backes (InfSec)" and Year is 2009

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: B | G | H | K | L | M | S | T
Number of items: 20.

B

Backes, Michael and Chen, Tongbo and Dürmuth, Markus and Lensch, Hendrik and Welk, Martin
(2009) Tempest in a Teapot: Compromising Reflections Revisited.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009) Achieving Security Despite Compromise Using Zero-knowledge.
In: Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
In: Proceedings of OTM Conferences.

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.

Backes, Michael and Hofheinz, Dennis and Unruh, Dominique
(2009) CoSP: a general framework for computational soundness proofs.
In: Proceedings of the 16th ACM conference on Computer and communications security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Köpf, Boris and Rybalchenko, Andrey
(2009) Automatic Discovery and Quantification of Information Leaks.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Maffei, Matteo
(2009) Design and Verification of Anonymous Trust Protocols.
In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers.

Busenius, Alex
(2009) Expi2Java - En Extensible Code Generator for Security Protocols.
Bachelors thesis, Saarland University.

G

Gerling, Sebastian
(2009) Acoustic Side-Channel Attacks on Printers.
Masters thesis, Saarland University.

Grochulla, Martin
(2009) Security Despite Compromise with Zero-Knowledge Proofs.
Masters thesis, Saarland University.

H

Hamerlik, Lech Marek
(2009) Anonymity and Censorship Resistance in Sematic Overlay Networtks.
Masters thesis, Saarland University.

Heine, Dirk
(2009) Sicherheitskonzept an einem Rechenzentrum.
Bachelors thesis, Saarland University.

K

Krohmer, Anton
(2009) Rational File Sharing.
Bachelors thesis, Saarland University.

Künnemann, Robert
(2009) Hiding Malicious Postscript Code and How to Define Undetectabilit.
Bachelors thesis, UNSPECIFIED.

L

Lorenz, Stefan
(2009) Caspa - Mechanized Verification of Security Protocols using Causality-based Abstractions.
Bachelors thesis, Saarland University.

M

Mohammadi, Esfandiar
(2009) Computational Soundness of Symbolic Zero-Knowledge Proofs against Active Attackers under Relaxed Assumptions.
Masters thesis, Saarland University.

S

Schnuck, Christian
(2009) Computing Information-theoretic Bounds for Unknown Message Side-Channel Attacks.
Bachelors thesis, Saarland University.

T

Tarrach, Thorsten
(2009) SPI2F - A Prototype Code Generator for Security Protocols.
Bachelors thesis, Saarland University.

Thiemert, Stefan and Nürnberger, Stefan and Steinebach, Martin and Zmudzinski, Sascha
(2009) Security of Robust Audio Hashes.
In: First IEEE International Workshop on Information Forensics and Security (WIFS 2009).

This list was generated on Mon Nov 28 00:03:04 2022 CET.