dblp.uni-trier.dewww.uni-trier.de

Michael Backes Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
85EEMichael Backes, Peng Ning: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings Springer 2009
84EEMichael Backes, Boris Köpf, Andrey Rybalchenko: Automatic Discovery and Quantification of Information Leaks. IEEE Symposium on Security and Privacy 2009: 141-153
83EEMichael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk: Tempest in a Teapot: Compromising Reflections Revisited. IEEE Symposium on Security and Privacy 2009: 315-327
82EEMichael Backes, Peter Druschel, Andreas Haeberlen, Dominique Unruh: CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable. NDSS 2009
2008
81EEMichael Backes, Catalin Hritcu, Matteo Maffei: Type-checking zero-knowledge. ACM Conference on Computer and Communications Security 2008: 357-370
80EEMichael Backes, Dominique Unruh: Limits of Constructive Security Proofs. ASIACRYPT 2008: 290-307
79EEMichael Backes, Markus Dürmuth, Dominique Unruh: OAEP Is Secure under Key-Dependent Messages. ASIACRYPT 2008: 506-523
78EEMichael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina: The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. CAV 2008: 419-422
77EEMichael Backes, Catalin Hritcu, Matteo Maffei: Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. CSF 2008: 195-209
76EEMichael Backes, Dominique Unruh: Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. CSF 2008: 255-269
75EEMichael Backes, Boris Köpf: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. ESORICS 2008: 517-532
74EEMichael Backes, Markus Dürmuth, Dominique Unruh: Compromising Reflections-or-How to Read LCD Monitors around the Corner. IEEE Symposium on Security and Privacy 2008: 158-169
73EEMichael Backes, Matteo Maffei, Dominique Unruh: Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. IEEE Symposium on Security and Privacy 2008: 202-215
72EEMichael Backes, Matthias Berg, Dominique Unruh: A Formal Language for Cryptographic Pseudocode. LPAR 2008: 353-376
71EEMichael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum: Anonymous and censorship resistant content sharing in unstructured overlays. PODC 2008: 429
70EEMichael Backes, Birgit Pfitzmann: Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Int. J. Inf. Sec. 7(1): 33-54 (2008)
69EEMichael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters: Conditional reactive simulatability. Int. J. Inf. Sec. 7(2): 155-169 (2008)
68EEMichael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. Journal of Computer Security 16(5): 497-530 (2008)
2007
67EEMichael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. CSF 2007: 112-124
66EEMichael Backes, Agostino Cortesi, Matteo Maffei: Causality-based Abstraction of Multiplicity in Security Protocols. CSF 2007: 355-369
65EEMichael Backes, Agostino Cortesi, Riccardo Focardi, Matteo Maffei: A calculus of challenges and responses. FMSE 2007: 51-60
64EEMichael Backes, Markus Dürmuth, Ralf Küsters: On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. FSTTCS 2007: 108-120
63EEMichael Backes, Matteo Maffei, Dominique Unruh: Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. Formal Protocol Verification Applied 2007
62EEMichael Backes, Markus Dürmuth, Dominique Unruh: Information Flow in the Peer-Reviewing Process. IEEE Symposium on Security and Privacy 2007: 187-191
61EEMichael Backes, Jörn Müller-Quade, Dominique Unruh: On the Necessity of Rewinding in Secure Multiparty Computation. TCC 2007: 157-173
60EEMichael Backes, Andre Scedrov: Preface. Electr. Notes Theor. Comput. Sci. 180(1): 1-2 (2007)
59EEMichael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007)
58EEMichael Backes, Stefanos Gritzalis, Bart Preneel: Preface. Int. J. Inf. Sec. 6(6): 359-360 (2007)
57EEMichael Backes, David A. Basin, Michael Waidner: Preface. Journal of Computer Security 15(6): 561 (2007)
2006
56 Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006
55EEMichael Backes, Peeter Laud: Computationally sound secrecy proofs by mechanized flow analysis. ACM Conference on Computer and Communications Security 2006: 370-379
54EEChristoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. CSFW 2006: 153-166
53EEMichael Backes, Christian Cachin, Alina Oprea: Secure Key-Updating for Lazy Revocation. ESORICS 2006: 327-346
52EEMichael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay: Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. ESORICS 2006: 362-383
51EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423
50EEMichael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters: Conditional Reactive Simulatability. ESORICS 2006: 424-443
49EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography. FM 2006: 612-616
48EEMichael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò: Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445
47EEMichael Backes, Birgit Pfitzmann: On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. SEC 2006: 233-245
46EEMichael Backes: Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof. Electr. Notes Theor. Comput. Sci. 155: 111-145 (2006)
45EEMichael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006)
2005
44EEMichael Backes, Markus Dürmuth: A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. CSFW 2005: 78-93
43EEMichael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani: Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110
42EEMichael Backes, Birgit Pfitzmann: Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. ESORICS 2005: 178-196
41EEMichael Backes: Quantifying Probabilistic Information Flow in Computational Reactive Systems. ESORICS 2005: 336-354
40EEMichael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh: On fairness in simulatability-based cryptographic systems. FMSE 2005: 13-22
39EEMichael Backes, Christian Cachin, Alina Oprea: Lazy Revocation in Cryptographic File Systems. IEEE Security in Storage Workshop 2005: 1-11
38EEMichael Backes, Birgit Pfitzmann: Relating Symbolic and Cryptographic Secrecy. IEEE Symposium on Security and Privacy 2005: 171-182
37EEMichael Backes, Thomas Groß: Tailoring the Dolev-Yao abstraction to web services realities. SWS 2005: 65-74
36EEMichael Backes, Christian Cachin: Public-Key Steganography with Active Attacks. TCC 2005: 210-226
35EEMichael Backes, Jan Camenisch, Dieter Sommer: Anonymous yet accountable access control. WPES 2005: 40-46
34EEMichael Backes, Birgit Pfitzmann: Relating Symbolic and Cryptographic Secrecy. IEEE Trans. Dependable Sec. Comput. 2(2): 109-123 (2005)
33EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005)
32EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005)
31EEMichael Backes: Unifying simulatability definitions in cryptographic systems under different timing assumptions. J. Log. Algebr. Program. 64(2): 157-188 (2005)
2004
30 Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004 ACM 2004
29EEMichael Backes, Birgit Pfitzmann: Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. CSFW 2004: 204-218
28EEMichael Backes, Markus Dürmuth, Rainer Steinwandt: An Algebra for Composing Enterprise Privacy Policies. ESORICS 2004: 33-52
27EEMichael Backes: A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. ESORICS 2004: 89-108
26EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41
25EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51
24EEMichael Backes, Dennis Hofheinz: How to Break and Repair a Universally Composable Signature Functionality. ISC 2004: 61-72
23EEMichael Backes, Markus Dürmuth, Günter Karjoth: Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. POLICY 2004: 185-188
22EEMichael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter: Efficient comparison of enterprise privacy policies. SAC 2004: 375-382
21EEMichael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354
20EEMichael Backes, Birgit Pfitzmann: A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. IEEE Journal on Selected Areas in Communications 22(10): 2075-2086 (2004)
19EEMichael Backes, Birgit Pfitzmann: Computational probabilistic noninterference. Int. J. Inf. Sec. 3(1): 42-60 (2004)
18 Michael Backes, Birgit Pfitzmann, Michael Waidner: Polynomial liveness. Journal of Computer Security 12(3-4): 589-617 (2004)
2003
17 Michael Backes, David A. Basin: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003 ACM 2003
16EEMichael Backes, Birgit Pfitzmann, Michael Waidner: A composable cryptographic library with nested operations. ACM Conference on Computer and Communications Security 2003: 220-230
15EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering. Business Process Management 2003: 168-183
14EEMichael Backes: Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. CONCUR 2003: 346-360
13EEMichael Backes, Christian Cachin: Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. DSN 2003: 37-46
12EEMichael Backes, Birgit Pfitzmann, Matthias Schunter: A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180
11EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290
10EEMichael Backes, Catherine Meadows, John C. Mitchell: Relating cryptography and formal methods: a panel. FMSE 2003: 61-66
9EEMichael Backes, Birgit Pfitzmann: A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. FSTTCS 2003: 1-12
8EEMichael Backes, Birgit Pfitzmann: Intransitive Non-Interference for Cryptographic Purpose. IEEE Symposium on Security and Privacy 2003: 140-
7EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes. ISC 2003: 84-95
6EEMichael Backes, Matthias Schunter: From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. NSPW 2003: 67-74
5EEMichael Backes, Christian Cachin, Reto Strobl: Proactive secure message transmission in asynchronous networks. PODC 2003: 223-232
4EEMichael Backes, Christian Jacobi: Cryptographically Sound and Machine-Assisted Verification of Security Protocols. STACS 2003: 675-686
2002
3EEMichael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness. CSFW 2002: 160-174
2EEMichael Backes, Birgit Pfitzmann: Computational Probabilistic Non-interference. ESORICS 2002: 1-23
1EEMichael Backes, Christian Jacobi, Birgit Pfitzmann: Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. FME 2002: 310-329

Coauthor Index

1Vijayalakshmi Atluri (Vijay Atluri) [30]
2Walid Bagga [22]
3David A. Basin [17] [30] [54] [57]
4Matthias Berg [72]
5Christian Cachin [5] [13] [36] [39] [53]
6Jan Camenisch [35]
7Iliano Cervesato [52]
8Tongbo Chen [83]
9Agostino Cortesi [65] [66]
10Anupam Datta [43] [45]
11Ante Derek [43] [45]
12Peter Druschel [82]
13Markus Dürmuth [23] [28] [44] [50] [62] [64] [69] [74] [79] [83]
14Riccardo Focardi [65]
15Stefanos Gritzalis [56] [58]
16Thomas Groß [37]
17Andreas Haeberlen [82]
18Marek Hamerlik [71]
19Dennis Hofheinz [24] [40] [50] [69]
20Catalin Hritcu [77] [81]
21Christian Jacobi [1] [4]
22Aaron D. Jaggard [52]
23Günter Karjoth [22] [23]
24Sokratis K. Katsikas [56]
25Boris Köpf [75] [84]
26Ralf Küsters [50] [64] [69]
27Peeter Laud [55]
28Hendrik P. A. Lensch [83]
29Alessandro Linari [71]
30Javier Lopez [56]
31Stefan Lorenz [78]
32Matteo Maffei [63] [65] [66] [71] [73] [77] [78] [81]
33Catherine Meadows [10]
34John C. Mitchell [10] [43] [45]
35Sebastian Mödersheim [48]
36Jörn Müller-Quade [40] [61]
37Peng Ning [85]
38Alina Oprea [39] [53]
39Kim Pecina [78]
40Birgit Pfitzmann [1] [2] [3] [7] [8] [9] [11] [12] [15] [16] [18] [19] [20] [21] [25] [26] [29] [32] [33] [34] [38] [42] [47] [48] [49] [51] [54] [59] [67] [68] [70]
41Bart Preneel [56] [58]
42Andrey Rybalchenko [84]
43Andre Scedrov [52] [60] [67] [68]
44Matthias Schunter [6] [12] [22]
45Dieter Sommer [35]
46Christoph Sprenger [54]
47Michael Steiner [3]
48Rainer Steinwandt [28]
49Reto Strobl [5]
50Christos Tryfonopoulos [71]
51Joe-Kai Tsay [52]
52Mathieu Turuani [43] [45]
53Dominique Unruh [40] [61] [62] [63] [72] [73] [74] [76] [79] [80] [82]
54Luca Viganò [48]
55Michael Waidner [3] [7] [11] [15] [16] [18] [21] [25] [26] [30] [32] [33] [49] [51] [54] [57] [59]
56Gerhard Weikum [71]
57Martin Welk [83]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)