2008 |
81 | EE | Michael Backes,
Catalin Hritcu,
Matteo Maffei:
Type-checking zero-knowledge.
ACM Conference on Computer and Communications Security 2008: 357-370 |
80 | EE | Michael Backes,
Dominique Unruh:
Limits of Constructive Security Proofs.
ASIACRYPT 2008: 290-307 |
79 | EE | Michael Backes,
Markus Dürmuth,
Dominique Unruh:
OAEP Is Secure under Key-Dependent Messages.
ASIACRYPT 2008: 506-523 |
78 | EE | Michael Backes,
Stefan Lorenz,
Matteo Maffei,
Kim Pecina:
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis.
CAV 2008: 419-422 |
77 | EE | Michael Backes,
Catalin Hritcu,
Matteo Maffei:
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus.
CSF 2008: 195-209 |
76 | EE | Michael Backes,
Dominique Unruh:
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
CSF 2008: 255-269 |
75 | EE | Michael Backes,
Boris Köpf:
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
ESORICS 2008: 517-532 |
74 | EE | Michael Backes,
Markus Dürmuth,
Dominique Unruh:
Compromising Reflections-or-How to Read LCD Monitors around the Corner.
IEEE Symposium on Security and Privacy 2008: 158-169 |
73 | EE | Michael Backes,
Matteo Maffei,
Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
IEEE Symposium on Security and Privacy 2008: 202-215 |
72 | EE | Michael Backes,
Matthias Berg,
Dominique Unruh:
A Formal Language for Cryptographic Pseudocode.
LPAR 2008: 353-376 |
71 | EE | Michael Backes,
Marek Hamerlik,
Alessandro Linari,
Matteo Maffei,
Christos Tryfonopoulos,
Gerhard Weikum:
Anonymous and censorship resistant content sharing in unstructured overlays.
PODC 2008: 429 |
70 | EE | Michael Backes,
Birgit Pfitzmann:
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
Int. J. Inf. Sec. 7(1): 33-54 (2008) |
69 | EE | Michael Backes,
Markus Dürmuth,
Dennis Hofheinz,
Ralf Küsters:
Conditional reactive simulatability.
Int. J. Inf. Sec. 7(2): 155-169 (2008) |
68 | EE | Michael Backes,
Birgit Pfitzmann,
Andre Scedrov:
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.
Journal of Computer Security 16(5): 497-530 (2008) |
2007 |
67 | EE | Michael Backes,
Birgit Pfitzmann,
Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
CSF 2007: 112-124 |
66 | EE | Michael Backes,
Agostino Cortesi,
Matteo Maffei:
Causality-based Abstraction of Multiplicity in Security Protocols.
CSF 2007: 355-369 |
65 | EE | Michael Backes,
Agostino Cortesi,
Riccardo Focardi,
Matteo Maffei:
A calculus of challenges and responses.
FMSE 2007: 51-60 |
64 | EE | Michael Backes,
Markus Dürmuth,
Ralf Küsters:
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
FSTTCS 2007: 108-120 |
63 | EE | Michael Backes,
Matteo Maffei,
Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Formal Protocol Verification Applied 2007 |
62 | EE | Michael Backes,
Markus Dürmuth,
Dominique Unruh:
Information Flow in the Peer-Reviewing Process.
IEEE Symposium on Security and Privacy 2007: 187-191 |
61 | EE | Michael Backes,
Jörn Müller-Quade,
Dominique Unruh:
On the Necessity of Rewinding in Secure Multiparty Computation.
TCC 2007: 157-173 |
60 | EE | Michael Backes,
Andre Scedrov:
Preface.
Electr. Notes Theor. Comput. Sci. 180(1): 1-2 (2007) |
59 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
The reactive simulatability (RSIM) framework for asynchronous systems.
Inf. Comput. 205(12): 1685-1720 (2007) |
58 | EE | Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Preface.
Int. J. Inf. Sec. 6(6): 359-360 (2007) |
57 | EE | Michael Backes,
David A. Basin,
Michael Waidner:
Preface.
Journal of Computer Security 15(6): 561 (2007) |
2006 |
56 | | Sokratis K. Katsikas,
Javier Lopez,
Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Springer 2006 |
55 | EE | Michael Backes,
Peeter Laud:
Computationally sound secrecy proofs by mechanized flow analysis.
ACM Conference on Computer and Communications Security 2006: 370-379 |
54 | EE | Christoph Sprenger,
Michael Backes,
David A. Basin,
Birgit Pfitzmann,
Michael Waidner:
Cryptographically Sound Theorem Proving.
CSFW 2006: 153-166 |
53 | EE | Michael Backes,
Christian Cachin,
Alina Oprea:
Secure Key-Updating for Lazy Revocation.
ESORICS 2006: 327-346 |
52 | EE | Michael Backes,
Iliano Cervesato,
Aaron D. Jaggard,
Andre Scedrov,
Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
ESORICS 2006: 362-383 |
51 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
ESORICS 2006: 404-423 |
50 | EE | Michael Backes,
Markus Dürmuth,
Dennis Hofheinz,
Ralf Küsters:
Conditional Reactive Simulatability.
ESORICS 2006: 424-443 |
49 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Formal Methods and Cryptography.
FM 2006: 612-616 |
48 | EE | Michael Backes,
Sebastian Mödersheim,
Birgit Pfitzmann,
Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
FoSSaCS 2006: 428-445 |
47 | EE | Michael Backes,
Birgit Pfitzmann:
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
SEC 2006: 233-245 |
46 | EE | Michael Backes:
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Electr. Notes Theor. Comput. Sci. 155: 111-145 (2006) |
45 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci. 367(1-2): 33-56 (2006) |
2005 |
44 | EE | Michael Backes,
Markus Dürmuth:
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
CSFW 2005: 78-93 |
43 | EE | Michael Backes,
Anupam Datta,
Ante Derek,
John C. Mitchell,
Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols.
CSFW 2005: 94-110 |
42 | EE | Michael Backes,
Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR.
ESORICS 2005: 178-196 |
41 | EE | Michael Backes:
Quantifying Probabilistic Information Flow in Computational Reactive Systems.
ESORICS 2005: 336-354 |
40 | EE | Michael Backes,
Dennis Hofheinz,
Jörn Müller-Quade,
Dominique Unruh:
On fairness in simulatability-based cryptographic systems.
FMSE 2005: 13-22 |
39 | EE | Michael Backes,
Christian Cachin,
Alina Oprea:
Lazy Revocation in Cryptographic File Systems.
IEEE Security in Storage Workshop 2005: 1-11 |
38 | EE | Michael Backes,
Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy.
IEEE Symposium on Security and Privacy 2005: 171-182 |
37 | EE | Michael Backes,
Thomas Groß:
Tailoring the Dolev-Yao abstraction to web services realities.
SWS 2005: 65-74 |
36 | EE | Michael Backes,
Christian Cachin:
Public-Key Steganography with Active Attacks.
TCC 2005: 210-226 |
35 | EE | Michael Backes,
Jan Camenisch,
Dieter Sommer:
Anonymous yet accountable access control.
WPES 2005: 40-46 |
34 | EE | Michael Backes,
Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy.
IEEE Trans. Dependable Sec. Comput. 2(2): 109-123 (2005) |
33 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library.
Int. J. Inf. Sec. 4(3): 135-154 (2005) |
32 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Reactively secure signature schemes.
Int. J. Inf. Sec. 4(4): 242-252 (2005) |
31 | EE | Michael Backes:
Unifying simulatability definitions in cryptographic systems under different timing assumptions.
J. Log. Algebr. Program. 64(2): 157-188 (2005) |
2004 |
30 | | Vijayalakshmi Atluri,
Michael Backes,
David A. Basin,
Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004
ACM 2004 |
29 | EE | Michael Backes,
Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
CSFW 2004: 204-218 |
28 | EE | Michael Backes,
Markus Dürmuth,
Rainer Steinwandt:
An Algebra for Composing Enterprise Privacy Policies.
ESORICS 2004: 33-52 |
27 | EE | Michael Backes:
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
ESORICS 2004: 89-108 |
26 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks.
FOSAD 2004: 1-41 |
25 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Low-Level Ideal Signatures and General Integrity Idealization.
ISC 2004: 39-51 |
24 | EE | Michael Backes,
Dennis Hofheinz:
How to Break and Repair a Universally Composable Signature Functionality.
ISC 2004: 61-72 |
23 | EE | Michael Backes,
Markus Dürmuth,
Günter Karjoth:
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog.
POLICY 2004: 185-188 |
22 | EE | Michael Backes,
Günter Karjoth,
Walid Bagga,
Matthias Schunter:
Efficient comparison of enterprise privacy policies.
SAC 2004: 375-382 |
21 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
A General Composition Theorem for Secure Reactive Systems.
TCC 2004: 336-354 |
20 | EE | Michael Backes,
Birgit Pfitzmann:
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol.
IEEE Journal on Selected Areas in Communications 22(10): 2075-2086 (2004) |
19 | EE | Michael Backes,
Birgit Pfitzmann:
Computational probabilistic noninterference.
Int. J. Inf. Sec. 3(1): 42-60 (2004) |
18 | | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Polynomial liveness.
Journal of Computer Security 12(3-4): 589-617 (2004) |
2003 |
17 | | Michael Backes,
David A. Basin:
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003
ACM 2003 |
16 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
A composable cryptographic library with nested operations.
ACM Conference on Computer and Communications Security 2003: 220-230 |
15 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Security in Business Process Engineering.
Business Process Management 2003: 168-183 |
14 | EE | Michael Backes:
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
CONCUR 2003: 346-360 |
13 | EE | Michael Backes,
Christian Cachin:
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries.
DSN 2003: 37-46 |
12 | EE | Michael Backes,
Birgit Pfitzmann,
Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies.
ESORICS 2003: 162-180 |
11 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Symmetric Authentication within a Simulatable Cryptographic Library.
ESORICS 2003: 271-290 |
10 | EE | Michael Backes,
Catherine Meadows,
John C. Mitchell:
Relating cryptography and formal methods: a panel.
FMSE 2003: 61-66 |
9 | EE | Michael Backes,
Birgit Pfitzmann:
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
FSTTCS 2003: 1-12 |
8 | EE | Michael Backes,
Birgit Pfitzmann:
Intransitive Non-Interference for Cryptographic Purpose.
IEEE Symposium on Security and Privacy 2003: 140- |
7 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Reactively Secure Signature Schemes.
ISC 2003: 84-95 |
6 | EE | Michael Backes,
Matthias Schunter:
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
NSPW 2003: 67-74 |
5 | EE | Michael Backes,
Christian Cachin,
Reto Strobl:
Proactive secure message transmission in asynchronous networks.
PODC 2003: 223-232 |
4 | EE | Michael Backes,
Christian Jacobi:
Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
STACS 2003: 675-686 |
2002 |
3 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Steiner,
Michael Waidner:
Polynomial Fairness and Liveness.
CSFW 2002: 160-174 |
2 | EE | Michael Backes,
Birgit Pfitzmann:
Computational Probabilistic Non-interference.
ESORICS 2002: 1-23 |
1 | EE | Michael Backes,
Christian Jacobi,
Birgit Pfitzmann:
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
FME 2002: 310-329 |