Michael Backes

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts2025-01-28Dataset
Adversarial vulnerability bounds for Gaussian process classification
Machine Learning
2023-06-27Paper
Anonymous RAM2022-08-19Paper
Computational soundness for interactive primitives
Computer Security -- ESORICS 2015
2022-08-19Paper
Quantifying probabilistic information flow in computational reactive systems
Computer Security – ESORICS 2005
2022-03-09Paper
Secure key-updating for lazy revocation
Computer Security – ESORICS 2006
2022-03-09Paper
Conditional reactive simulatability
Computer Security – ESORICS 2006
2022-03-09Paper
Limits of the cryptographic realization of Dolev-Yao-style XOR
Computer Security – ESORICS 2005
2022-03-09Paper
Cryptographically sound security proofs for basic and public-key Kerberos
Computer Security – ESORICS 2006
2022-03-09Paper
Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes
Computer Security – ESORICS 2006
2022-03-09Paper
A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
Computer Security – ESORICS 2004
2022-03-07Paper
An algebra for composing enterprise privacy policies
Computer Security – ESORICS 2004
2022-03-07Paper
Symmetric authentication within a simulatable cryptographic library
Computer Security – ESORICS 2003
2022-02-16Paper
Computational probabilistic non-interference
Computer Security — ESORICS 2002
2022-02-16Paper
TrollThrottle -- raising the cost of astroturfing
(available as arXiv preprint)
2021-02-23Paper
Periodicity detection in irregularly sampled light curves by robust regression and outlier detection
Statistical Analysis and Data Mining: The ASA Data Science Journal
2020-10-14Paper
Ring signatures: logarithmic-size, no setup -- from standard assumptions2020-02-04Paper
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup2020-01-28Paper
Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy
Advances in Data Analysis and Classification. ADAC
2019-11-27Paper
Signatures with flexible public key: introducing equivalence classes for public keys2019-01-23Paper
From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy2018-10-17Paper
Quantifying information flow in cryptographic systems
Mathematical Structures in Computer Science
2016-07-27Paper
Delegatable functional signatures
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Secrecy without perfect randomness: cryptography with (bounded) weak sources
Applied Cryptography and Network Security
2016-03-10Paper
Proactive secure message transmission in asynchronous networks
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
Asynchronous MPC with a strict honest majority using non-equivocation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Brief announcement
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
Privacy-preserving accountable computation
Lecture Notes in Computer Science
2014-10-16Paper
BackRef: accountability in anonymous communication networks
Applied Cryptography and Network Security
2014-07-07Paper
Webtrust -- a comprehensive authenticity and integrity framework for HTTP
Applied Cryptography and Network Security
2014-07-07Paper
Real-or-random key secrecy of the Otway-Rees protocol via a symbolic security proof2013-10-08Paper
Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification
Lecture Notes in Computer Science
2013-08-06Paper
Asynchronous computational VSS with reduced communication complexity
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Computationally sound abstraction and verification of secure multi-party computations2012-08-29Paper
G2C: cryptographic protocols from goal-driven specifications
Theory of Security and Applications
2012-08-22Paper
Union and Intersection Types for Secure Protocol Implementations
Theory of Security and Applications
2012-08-22Paper
Computational verifiable secret sharing revisited
Lecture Notes in Computer Science
2011-12-02Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions (extended abstract)
Lecture Notes in Computer Science
2010-03-30Paper
Reactively secure signature schemes
Lecture Notes in Computer Science
2010-02-09Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
Lecture Notes in Computer Science
2009-08-06Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
OAEP Is Secure under Key-Dependent Messages
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Limits of Constructive Security Proofs
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
A Formal Language for Cryptographic Pseudocode
Logic for Programming, Artificial Intelligence, and Reasoning
2009-01-27Paper
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Computer Security - ESORICS 2008
2008-10-27Paper
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science
2008-04-24Paper
The reactive simulatability (RSIM) framework for asynchronous systems
Information and Computation
2007-12-10Paper
On the Necessity of Rewinding in Secure Multiparty Computation
Theory of Cryptography
2007-08-30Paper
Foundations of Software Science and Computation Structures
Lecture Notes in Computer Science
2007-05-02Paper
Compositional analysis of contract-signing protocols
Theoretical Computer Science
2007-01-09Paper
Foundations of Security Analysis and Design III
Lecture Notes in Computer Science
2006-11-01Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions
The Journal of Logic and Algebraic Programming
2005-08-01Paper
scientific article; zbMATH DE number 2090144 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 1962854 (Why is no real title available?)2003-08-11Paper


Research outcomes over time


This page was built for person: Michael Backes