Michael Backes

From MaRDI portal
Person:860895

Available identifiers

zbMath Open backes.michaelWikidataQ19296289 ScholiaQ19296289MaRDI QIDQ860895

List of research outcomes

PublicationDate of PublicationType
Adversarial vulnerability bounds for Gaussian process classification2023-06-27Paper
Anonymous RAM2022-08-19Paper
Computational Soundness for Interactive Primitives2022-08-19Paper
Secure Key-Updating for Lazy Revocation2022-03-09Paper
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos2022-03-09Paper
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes2022-03-09Paper
Conditional Reactive Simulatability2022-03-09Paper
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR2022-03-09Paper
Quantifying Probabilistic Information Flow in Computational Reactive Systems2022-03-09Paper
An Algebra for Composing Enterprise Privacy Policies2022-03-07Paper
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol2022-03-07Paper
Computational Probabilistic Non-interference2022-02-16Paper
Symmetric Authentication within a Simulatable Cryptographic Library2022-02-16Paper
TrollThrottle -- raising the cost of astroturfing2021-02-23Paper
Periodicity detection in irregularly sampled light curves by robust regression and outlier detection2020-10-14Paper
Ring signatures: logarithmic-size, no setup -- from standard assumptions2020-02-04Paper
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup2020-01-28Paper
Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy2019-11-27Paper
Signatures with flexible public key: introducing equivalence classes for public keys2019-01-23Paper
From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy2018-10-17Paper
Quantifying information flow in cryptographic systems2016-07-27Paper
Delegatable Functional Signatures2016-04-13Paper
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources2016-03-10Paper
Proactive secure message transmission in asynchronous networks2015-09-04Paper
Asynchronous MPC with a strict honest majority using non-equivocation2015-09-03Paper
Brief announcement2014-12-05Paper
Privacy-Preserving Accountable Computation2014-10-16Paper
BackRef: Accountability in Anonymous Communication Networks2014-07-07Paper
WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP2014-07-07Paper
https://portal.mardi4nfdi.de/entity/Q28523472013-10-08Paper
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification2013-08-06Paper
Asynchronous Computational VSS with Reduced Communication Complexity2013-03-18Paper
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations2012-08-29Paper
Union and Intersection Types for Secure Protocol Implementations2012-08-22Paper
G2C: Cryptographic Protocols from Goal-Driven Specifications2012-08-22Paper
Computational Verifiable Secret Sharing Revisited2011-12-02Paper
CONCUR 2003 - Concurrency Theory2010-03-30Paper
Reactively Secure Signature Schemes2010-02-09Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science2009-08-06Paper
Theory of Cryptography2009-05-14Paper
Limits of Constructive Security Proofs2009-02-10Paper
OAEP Is Secure under Key-Dependent Messages2009-02-10Paper
A Formal Language for Cryptographic Pseudocode2009-01-27Paper
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks2008-10-27Paper
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography2008-04-24Paper
The reactive simulatability (RSIM) framework for asynchronous systems2007-12-10Paper
On the Necessity of Rewinding in Secure Multiparty Computation2007-08-30Paper
Foundations of Software Science and Computation Structures2007-05-02Paper
Compositional analysis of contract-signing protocols2007-01-09Paper
Foundations of Security Analysis and Design III2006-11-01Paper
Information Security2006-10-16Paper
Information Security2006-10-16Paper
Theory of Cryptography2005-12-07Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions2005-08-01Paper
https://portal.mardi4nfdi.de/entity/Q48088372004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44186912003-08-11Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Michael Backes