Items where Division is "Michael Backes (InfSec)" and Year is 2011

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: B | C | D | H | K | L | M | T
Number of items: 24.

B

Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011) X-pire! - A digital expiration date for images in social networks.
Technical Report. UNSPECIFIED.

Backes, Michael and Berg, Matthias and Köpf, Boris
(2011) Non-Uniform Distributions in Quantitative Information-Flow.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011) Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2). pp. 107-134.

Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011) A Local Cross-Site Scripting Attack against Android Phones.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011) Union and Intersection Types for Secure Protocol Implementations.
In: Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers.

Backes, Michael and Hriţcu, Cătălin and Tarrach, Thorsten
(2011) Automatically Verifying Typing Constraints for a Data Processing Language.
In: Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011).

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) Securing social networks.
In: Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) A Security API for Distributed Social Networks.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS '11).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011) G2C: Cryptographic Protocols from Goal-Driven Specifications.
In: TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011.

Balzer, Jan
(2011) Towards a Formal Sematics for G2C Summary.
Bachelors thesis, Saarland University.

Bornträger, Holger
(2011) Automatic Verification of Equivalences of Cryptographic Games.
Masters thesis, Saarland University.

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: An Architecture for Secure Cloud Computing.
In: Workshop on Cryptography and Security in Clouds (CSC).

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) Twin Clouds: Secure Cloud Computing with Low Latency.
In: Communications and Multimedia Security Conference (CMS'11).

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) AmazonIA: When Elasticity Snaps Back.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Busenius, Alex
(2011) Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java.
Masters thesis, Saarland University.

C

Ciolacu, Ines Lucia
(2011) Universally Composable Relativistic Commitments.
Masters thesis, Saarland University.

D

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) Poster: Control-flow Integrity for Smartphones.
In: 18th ACM conference on Computer and communications security (ACM CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

H

Hriţcu, Cătălin
(2011) Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis.
Doctoral thesis, Saarland University.

K

Künnemann, Robert
(2011) Game-Theoretic Notions of Incoercibility.
Masters thesis, UNSPECIFIED.

L

Lorenz, Stefan
(2011) Anonymous Webs of Trust.
Masters thesis, Saarland University.

M

Meiser, Sebastian
(2011) Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries.
Masters thesis, Saarland University.

T

Tombers, Stefan
(2011) Low-Cost Byzantine Fault Tolerant Replication for a Cloud Environment.
Bachelors thesis, Saarland University.

This list was generated on Sat Dec 21 17:44:04 2024 CET.