Michael Backes

From MaRDI portal
(Redirected from Person:860895)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts2025-01-28Dataset
Adversarial vulnerability bounds for Gaussian process classification
Machine Learning
2023-06-27Paper
Anonymous RAM2022-08-19Paper
Computational soundness for interactive primitives
Computer Security -- ESORICS 2015
2022-08-19Paper
Quantifying probabilistic information flow in computational reactive systems
Computer Security – ESORICS 2005
2022-03-09Paper
Secure key-updating for lazy revocation
Computer Security – ESORICS 2006
2022-03-09Paper
Conditional reactive simulatability
Computer Security – ESORICS 2006
2022-03-09Paper
Limits of the cryptographic realization of Dolev-Yao-style XOR
Computer Security – ESORICS 2005
2022-03-09Paper
Cryptographically sound security proofs for basic and public-key Kerberos
Computer Security – ESORICS 2006
2022-03-09Paper
Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes
Computer Security – ESORICS 2006
2022-03-09Paper
A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
Computer Security – ESORICS 2004
2022-03-07Paper
An algebra for composing enterprise privacy policies
Computer Security – ESORICS 2004
2022-03-07Paper
Symmetric authentication within a simulatable cryptographic library
Computer Security – ESORICS 2003
2022-02-16Paper
Computational probabilistic non-interference
Computer Security — ESORICS 2002
2022-02-16Paper
TrollThrottle -- raising the cost of astroturfing
(available as arXiv preprint)
2021-02-23Paper
Periodicity detection in irregularly sampled light curves by robust regression and outlier detection
Statistical Analysis and Data Mining: The ASA Data Science Journal
2020-10-14Paper
Ring signatures: logarithmic-size, no setup -- from standard assumptions2020-02-04Paper
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup2020-01-28Paper
Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy
Advances in Data Analysis and Classification. ADAC
2019-11-27Paper
Signatures with flexible public key: introducing equivalence classes for public keys2019-01-23Paper
From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy2018-10-17Paper
Quantifying information flow in cryptographic systems
Mathematical Structures in Computer Science
2016-07-27Paper
Delegatable functional signatures
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Secrecy without perfect randomness: cryptography with (bounded) weak sources
Applied Cryptography and Network Security
2016-03-10Paper
Proactive secure message transmission in asynchronous networks
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
Asynchronous MPC with a strict honest majority using non-equivocation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Brief announcement
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
Privacy-preserving accountable computation
Lecture Notes in Computer Science
2014-10-16Paper
BackRef: accountability in anonymous communication networks
Applied Cryptography and Network Security
2014-07-07Paper
Webtrust -- a comprehensive authenticity and integrity framework for HTTP
Applied Cryptography and Network Security
2014-07-07Paper
Real-or-random key secrecy of the Otway-Rees protocol via a symbolic security proof2013-10-08Paper
Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification
Lecture Notes in Computer Science
2013-08-06Paper
Asynchronous computational VSS with reduced communication complexity
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Computationally sound abstraction and verification of secure multi-party computations2012-08-29Paper
G2C: cryptographic protocols from goal-driven specifications
Theory of Security and Applications
2012-08-22Paper
Union and Intersection Types for Secure Protocol Implementations
Theory of Security and Applications
2012-08-22Paper
Computational verifiable secret sharing revisited
Lecture Notes in Computer Science
2011-12-02Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions (extended abstract)
Lecture Notes in Computer Science
2010-03-30Paper
Reactively secure signature schemes
Lecture Notes in Computer Science
2010-02-09Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
Lecture Notes in Computer Science
2009-08-06Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
OAEP Is Secure under Key-Dependent Messages
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Limits of Constructive Security Proofs
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
A Formal Language for Cryptographic Pseudocode
Logic for Programming, Artificial Intelligence, and Reasoning
2009-01-27Paper
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Computer Security - ESORICS 2008
2008-10-27Paper
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science
2008-04-24Paper
The reactive simulatability (RSIM) framework for asynchronous systems
Information and Computation
2007-12-10Paper
On the Necessity of Rewinding in Secure Multiparty Computation
Theory of Cryptography
2007-08-30Paper
Foundations of Software Science and Computation Structures
Lecture Notes in Computer Science
2007-05-02Paper
Compositional analysis of contract-signing protocols
Theoretical Computer Science
2007-01-09Paper
Foundations of Security Analysis and Design III
Lecture Notes in Computer Science
2006-11-01Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions
The Journal of Logic and Algebraic Programming
2005-08-01Paper
scientific article; zbMATH DE number 2090144 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 1962854 (Why is no real title available?)2003-08-11Paper


Research outcomes over time


This page was built for person: Michael Backes