The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Backes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Security in Business Process Engineering. [Citation Graph (0, 0)][DBLP]
    Business Process Management, 2003, pp:168-183 [Conf]
  2. Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
    On fairness in simulatability-based cryptographic systems. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:13-22 [Conf]
  3. Michael Backes, Catherine Meadows, John C. Mitchell
    Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:61-66 [Conf]
  4. Michael Backes, Birgit Pfitzmann, Michael Waidner
    A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf]
  5. Michael Backes, Peeter Laud
    Computationally sound secrecy proofs by mechanized flow analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:370-379 [Conf]
  6. Michael Backes
    Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2003, pp:346-360 [Conf]
  7. Michael Backes, Markus Dürmuth
    A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:78-93 [Conf]
  8. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:94-110 [Conf]
  9. Michael Backes, Birgit Pfitzmann
    Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:204-218 [Conf]
  10. Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
    Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:160-174 [Conf]
  11. Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner
    Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:153-166 [Conf]
  12. Michael Backes, Christian Cachin
    Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:37-46 [Conf]
  13. Michael Backes
    A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:89-108 [Conf]
  14. Michael Backes
    Quantifying Probabilistic Information Flow in Computational Reactive Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:336-354 [Conf]
  15. Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
    Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:362-383 [Conf]
  16. Michael Backes, Christian Cachin, Alina Oprea
    Secure Key-Updating for Lazy Revocation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:327-346 [Conf]
  17. Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters
    Conditional Reactive Simulatability. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:424-443 [Conf]
  18. Michael Backes, Markus Dürmuth, Rainer Steinwandt
    An Algebra for Composing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:33-52 [Conf]
  19. Michael Backes, Birgit Pfitzmann
    Computational Probabilistic Non-interference. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:1-23 [Conf]
  20. Michael Backes, Birgit Pfitzmann
    Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:178-196 [Conf]
  21. Michael Backes, Birgit Pfitzmann, Matthias Schunter
    A Toolkit for Managing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:162-180 [Conf]
  22. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Symmetric Authentication within a Simulatable Cryptographic Library. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:271-290 [Conf]
  23. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:404-423 [Conf]
  24. Michael Backes, Christian Jacobi 0002, Birgit Pfitzmann
    Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. [Citation Graph (0, 0)][DBLP]
    FME, 2002, pp:310-329 [Conf]
  25. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Formal Methods and Cryptography. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:612-616 [Conf]
  26. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:1-41 [Conf]
  27. Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
    Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2006, pp:428-445 [Conf]
  28. Michael Backes, Birgit Pfitzmann
    A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2003, pp:1-12 [Conf]
  29. Michael Backes, Dennis Hofheinz
    How to Break and Repair a Universally Composable Signature Functionality. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:61-72 [Conf]
  30. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:84-95 [Conf]
  31. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:39-51 [Conf]
  32. Michael Backes, Matthias Schunter
    From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:67-74 [Conf]
  33. Michael Backes, Christian Cachin, Reto Strobl
    Proactive secure message transmission in asynchronous networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:223-232 [Conf]
  34. Michael Backes, Markus Dürmuth, Günter Karjoth
    Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:185-188 [Conf]
  35. Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter
    Efficient comparison of enterprise privacy policies. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:375-382 [Conf]
  36. Michael Backes, Birgit Pfitzmann
    On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:233-245 [Conf]
  37. Michael Backes, Birgit Pfitzmann
    Intransitive Non-Interference for Cryptographic Purpose. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:140-0 [Conf]
  38. Michael Backes, Birgit Pfitzmann
    Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:171-182 [Conf]
  39. Michael Backes, Markus Dürmuth, Dominique Unruh
    Information Flow in the Peer-Reviewing Process. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:187-191 [Conf]
  40. Michael Backes, Christian Jacobi 0002
    Cryptographically Sound and Machine-Assisted Verification of Security Protocols. [Citation Graph (0, 0)][DBLP]
    STACS, 2003, pp:675-686 [Conf]
  41. Michael Backes, Christian Cachin
    Public-Key Steganography with Active Attacks. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:210-226 [Conf]
  42. Michael Backes, Birgit Pfitzmann, Michael Waidner
    A General Composition Theorem for Secure Reactive Systems. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:336-354 [Conf]
  43. Michael Backes, Jörn Müller-Quade, Dominique Unruh
    On the Necessity of Rewinding in Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:157-173 [Conf]
  44. Michael Backes, Jan Camenisch, Dieter Sommer
    Anonymous yet accountable access control. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:40-46 [Conf]
  45. Michael Backes
    Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:155, n:, pp:111-145 [Journal]
  46. Michael Backes, Birgit Pfitzmann
    Computational probabilistic noninterference. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:1, pp:42-60 [Journal]
  47. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal]
  48. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Reactively secure signature schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:242-252 [Journal]
  49. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Polynomial liveness. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:589-617 [Journal]
  50. Michael Backes
    Unifying simulatability definitions in cryptographic systems under different timing assumptions. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:157-188 [Journal]
  51. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
  52. Michael Backes, Birgit Pfitzmann
    Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:109-123 [Journal]
  53. Michael Backes, Andre Scedrov
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:180, n:1, pp:1-2 [Journal]

  54. OAEP Is Secure under Key-Dependent Messages. [Citation Graph (, )][DBLP]


  55. Limits of Constructive Security Proofs. [Citation Graph (, )][DBLP]


  56. The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. [Citation Graph (, )][DBLP]


  57. A calculus of challenges and responses. [Citation Graph (, )][DBLP]


  58. Type-checking zero-knowledge. [Citation Graph (, )][DBLP]


  59. CoSP: a general framework for computational soundness proofs. [Citation Graph (, )][DBLP]


  60. Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. [Citation Graph (, )][DBLP]


  61. Causality-based Abstraction of Multiplicity in Security Protocols. [Citation Graph (, )][DBLP]


  62. Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. [Citation Graph (, )][DBLP]


  63. Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. [Citation Graph (, )][DBLP]


  64. Achieving Security Despite Compromise Using Zero-knowledge. [Citation Graph (, )][DBLP]


  65. Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. [Citation Graph (, )][DBLP]


  66. Speaker Recognition in Encrypted Voice Streams. [Citation Graph (, )][DBLP]


  67. Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. [Citation Graph (, )][DBLP]


  68. RatFish: A File Sharing Protocol Provably Secure against Rational Users. [Citation Graph (, )][DBLP]


  69. On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. [Citation Graph (, )][DBLP]


  70. A Formal Language for Cryptographic Pseudocode. [Citation Graph (, )][DBLP]


  71. CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable. [Citation Graph (, )][DBLP]


  72. Anonymity and Censorship Resistance in Unstructured Overlay Networks. [Citation Graph (, )][DBLP]


  73. Anonymous Webs of Trust. [Citation Graph (, )][DBLP]


  74. Anonymous and censorship resistant content sharing in unstructured overlays. [Citation Graph (, )][DBLP]


  75. Brief announcement: anonymity and trust in distributed systems. [Citation Graph (, )][DBLP]


  76. Lazy Revocation in Cryptographic File Systems. [Citation Graph (, )][DBLP]


  77. Automatic Discovery and Quantification of Information Leaks. [Citation Graph (, )][DBLP]


  78. Compromising Reflections-or-How to Read LCD Monitors around the Corner. [Citation Graph (, )][DBLP]


  79. Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. [Citation Graph (, )][DBLP]


  80. Tempest in a Teapot: Compromising Reflections Revisited. [Citation Graph (, )][DBLP]


  81. Tailoring the Dolev-Yao abstraction to web services realities. [Citation Graph (, )][DBLP]


Search in 0.029secs, Finished in 0.035secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002