Michael Backes

From MaRDI portal
Person:860895

Available identifiers

zbMath Open backes.michaelDBLPb/MichaelBackes1WikidataQ19296289 ScholiaQ19296289MaRDI QIDQ860895

List of research outcomes





PublicationDate of PublicationType
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts2025-01-28Dataset
Adversarial vulnerability bounds for Gaussian process classification2023-06-27Paper
Anonymous RAM2022-08-19Paper
Computational Soundness for Interactive Primitives2022-08-19Paper
Quantifying Probabilistic Information Flow in Computational Reactive Systems2022-03-09Paper
Secure Key-Updating for Lazy Revocation2022-03-09Paper
Conditional Reactive Simulatability2022-03-09Paper
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR2022-03-09Paper
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos2022-03-09Paper
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes2022-03-09Paper
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol2022-03-07Paper
An Algebra for Composing Enterprise Privacy Policies2022-03-07Paper
Symmetric Authentication within a Simulatable Cryptographic Library2022-02-16Paper
Computational Probabilistic Non-interference2022-02-16Paper
TrollThrottle -- raising the cost of astroturfing2021-02-23Paper
Periodicity detection in irregularly sampled light curves by robust regression and outlier detection2020-10-14Paper
Ring signatures: logarithmic-size, no setup -- from standard assumptions2020-02-04Paper
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup2020-01-28Paper
Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy2019-11-27Paper
Signatures with flexible public key: introducing equivalence classes for public keys2019-01-23Paper
From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy2018-10-17Paper
Quantifying information flow in cryptographic systems2016-07-27Paper
Delegatable Functional Signatures2016-04-13Paper
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources2016-03-10Paper
Proactive secure message transmission in asynchronous networks2015-09-04Paper
Asynchronous MPC with a strict honest majority using non-equivocation2015-09-03Paper
Brief announcement2014-12-05Paper
Privacy-Preserving Accountable Computation2014-10-16Paper
BackRef: Accountability in Anonymous Communication Networks2014-07-07Paper
WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP2014-07-07Paper
Real-or-random key secrecy of the Otway-Rees protocol via a symbolic security proof2013-10-08Paper
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification2013-08-06Paper
Asynchronous Computational VSS with Reduced Communication Complexity2013-03-18Paper
Computationally sound abstraction and verification of secure multi-party computations2012-08-29Paper
G2C: Cryptographic Protocols from Goal-Driven Specifications2012-08-22Paper
Union and Intersection Types for Secure Protocol Implementations2012-08-22Paper
Computational Verifiable Secret Sharing Revisited2011-12-02Paper
CONCUR 2003 - Concurrency Theory2010-03-30Paper
Reactively Secure Signature Schemes2010-02-09Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science2009-08-06Paper
Theory of Cryptography2009-05-14Paper
OAEP Is Secure under Key-Dependent Messages2009-02-10Paper
Limits of Constructive Security Proofs2009-02-10Paper
A Formal Language for Cryptographic Pseudocode2009-01-27Paper
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks2008-10-27Paper
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography2008-04-24Paper
The reactive simulatability (RSIM) framework for asynchronous systems2007-12-10Paper
On the Necessity of Rewinding in Secure Multiparty Computation2007-08-30Paper
Foundations of Software Science and Computation Structures2007-05-02Paper
Compositional analysis of contract-signing protocols2007-01-09Paper
Foundations of Security Analysis and Design III2006-11-01Paper
Information Security2006-10-16Paper
Information Security2006-10-16Paper
Theory of Cryptography2005-12-07Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions2005-08-01Paper
https://portal.mardi4nfdi.de/entity/Q48088372004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44186912003-08-11Paper

Research outcomes over time

This page was built for person: Michael Backes