Search the dblp DataBase
Michael Backes :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael Backes , Birgit Pfitzmann , Michael Waidner Security in Business Process Engineering. [Citation Graph (0, 0)][DBLP ] Business Process Management, 2003, pp:168-183 [Conf ] Michael Backes , Dennis Hofheinz , Jörn Müller-Quade , Dominique Unruh On fairness in simulatability-based cryptographic systems. [Citation Graph (0, 0)][DBLP ] FMSE, 2005, pp:13-22 [Conf ] Michael Backes , Catherine Meadows , John C. Mitchell Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP ] FMSE, 2003, pp:61-66 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf ] Michael Backes , Peeter Laud Computationally sound secrecy proofs by mechanized flow analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:370-379 [Conf ] Michael Backes Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. [Citation Graph (0, 0)][DBLP ] CONCUR, 2003, pp:346-360 [Conf ] Michael Backes , Markus Dürmuth A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:78-93 [Conf ] Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Mathieu Turuani Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:94-110 [Conf ] Michael Backes , Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:204-218 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Steiner , Michael Waidner Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:160-174 [Conf ] Christoph Sprenger , Michael Backes , David A. Basin , Birgit Pfitzmann , Michael Waidner Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:153-166 [Conf ] Michael Backes , Christian Cachin Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. [Citation Graph (0, 0)][DBLP ] DSN, 2003, pp:37-46 [Conf ] Michael Backes A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:89-108 [Conf ] Michael Backes Quantifying Probabilistic Information Flow in Computational Reactive Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:336-354 [Conf ] Michael Backes , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov , Joe-Kai Tsay Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:362-383 [Conf ] Michael Backes , Christian Cachin , Alina Oprea Secure Key-Updating for Lazy Revocation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:327-346 [Conf ] Michael Backes , Markus Dürmuth , Dennis Hofheinz , Ralf Küsters Conditional Reactive Simulatability. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:424-443 [Conf ] Michael Backes , Markus Dürmuth , Rainer Steinwandt An Algebra for Composing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:33-52 [Conf ] Michael Backes , Birgit Pfitzmann Computational Probabilistic Non-interference. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:1-23 [Conf ] Michael Backes , Birgit Pfitzmann Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:178-196 [Conf ] Michael Backes , Birgit Pfitzmann , Matthias Schunter A Toolkit for Managing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:162-180 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Symmetric Authentication within a Simulatable Cryptographic Library. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:271-290 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:404-423 [Conf ] Michael Backes , Christian Jacobi 0002 , Birgit Pfitzmann Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. [Citation Graph (0, 0)][DBLP ] FME, 2002, pp:310-329 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Formal Methods and Cryptography. [Citation Graph (0, 0)][DBLP ] FM, 2006, pp:612-616 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP ] FOSAD, 2004, pp:1-41 [Conf ] Michael Backes , Sebastian Mödersheim , Birgit Pfitzmann , Luca Viganò Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2006, pp:428-445 [Conf ] Michael Backes , Birgit Pfitzmann A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2003, pp:1-12 [Conf ] Michael Backes , Dennis Hofheinz How to Break and Repair a Universally Composable Signature Functionality. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:61-72 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:84-95 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:39-51 [Conf ] Michael Backes , Matthias Schunter From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. [Citation Graph (0, 0)][DBLP ] NSPW, 2003, pp:67-74 [Conf ] Michael Backes , Christian Cachin , Reto Strobl Proactive secure message transmission in asynchronous networks. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:223-232 [Conf ] Michael Backes , Markus Dürmuth , Günter Karjoth Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:185-188 [Conf ] Michael Backes , Günter Karjoth , Walid Bagga , Matthias Schunter Efficient comparison of enterprise privacy policies. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:375-382 [Conf ] Michael Backes , Birgit Pfitzmann On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:233-245 [Conf ] Michael Backes , Birgit Pfitzmann Intransitive Non-Interference for Cryptographic Purpose. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:140-0 [Conf ] Michael Backes , Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:171-182 [Conf ] Michael Backes , Markus Dürmuth , Dominique Unruh Information Flow in the Peer-Reviewing Process. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:187-191 [Conf ] Michael Backes , Christian Jacobi 0002 Cryptographically Sound and Machine-Assisted Verification of Security Protocols. [Citation Graph (0, 0)][DBLP ] STACS, 2003, pp:675-686 [Conf ] Michael Backes , Christian Cachin Public-Key Steganography with Active Attacks. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:210-226 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner A General Composition Theorem for Secure Reactive Systems. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:336-354 [Conf ] Michael Backes , Jörn Müller-Quade , Dominique Unruh On the Necessity of Rewinding in Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:157-173 [Conf ] Michael Backes , Jan Camenisch , Dieter Sommer Anonymous yet accountable access control. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:40-46 [Conf ] Michael Backes Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:155, n:, pp:111-145 [Journal ] Michael Backes , Birgit Pfitzmann Computational probabilistic noninterference. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:42-60 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Reactively secure signature schemes. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:4, pp:242-252 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Polynomial liveness. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:3-4, pp:589-617 [Journal ] Michael Backes Unifying simulatability definitions in cryptographic systems under different timing assumptions. [Citation Graph (0, 0)][DBLP ] J. Log. Algebr. Program., 2005, v:64, n:2, pp:157-188 [Journal ] Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Mathieu Turuani Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal ] Michael Backes , Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:109-123 [Journal ] Michael Backes , Andre Scedrov Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:180, n:1, pp:1-2 [Journal ] OAEP Is Secure under Key-Dependent Messages. [Citation Graph (, )][DBLP ] Limits of Constructive Security Proofs. [Citation Graph (, )][DBLP ] The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. [Citation Graph (, )][DBLP ] A calculus of challenges and responses. [Citation Graph (, )][DBLP ] Type-checking zero-knowledge. [Citation Graph (, )][DBLP ] CoSP: a general framework for computational soundness proofs. [Citation Graph (, )][DBLP ] Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. [Citation Graph (, )][DBLP ] Causality-based Abstraction of Multiplicity in Security Protocols. [Citation Graph (, )][DBLP ] Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. [Citation Graph (, )][DBLP ] Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. [Citation Graph (, )][DBLP ] Achieving Security Despite Compromise Using Zero-knowledge. [Citation Graph (, )][DBLP ] Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. [Citation Graph (, )][DBLP ] Speaker Recognition in Encrypted Voice Streams. [Citation Graph (, )][DBLP ] Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. [Citation Graph (, )][DBLP ] RatFish: A File Sharing Protocol Provably Secure against Rational Users. [Citation Graph (, )][DBLP ] On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. [Citation Graph (, )][DBLP ] A Formal Language for Cryptographic Pseudocode. [Citation Graph (, )][DBLP ] CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable. [Citation Graph (, )][DBLP ] Anonymity and Censorship Resistance in Unstructured Overlay Networks. [Citation Graph (, )][DBLP ] Anonymous Webs of Trust. [Citation Graph (, )][DBLP ] Anonymous and censorship resistant content sharing in unstructured overlays. [Citation Graph (, )][DBLP ] Brief announcement: anonymity and trust in distributed systems. [Citation Graph (, )][DBLP ] Lazy Revocation in Cryptographic File Systems. [Citation Graph (, )][DBLP ] Automatic Discovery and Quantification of Information Leaks. [Citation Graph (, )][DBLP ] Compromising Reflections-or-How to Read LCD Monitors around the Corner. [Citation Graph (, )][DBLP ] Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. [Citation Graph (, )][DBLP ] Tempest in a Teapot: Compromising Reflections Revisited. [Citation Graph (, )][DBLP ] Tailoring the Dolev-Yao abstraction to web services realities. [Citation Graph (, )][DBLP ] Search in 0.029secs, Finished in 0.035secs