The following pages link to Michael Backes (Q860895):
Displaying 24 items.
- Compositional analysis of contract-signing protocols (Q860896) (← links)
- Signatures with flexible public key: introducing equivalence classes for public keys (Q1710606) (← links)
- From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy (Q1796886) (← links)
- Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy (Q2009047) (← links)
- Anonymous RAM (Q2165476) (← links)
- TrollThrottle -- raising the cost of astroturfing (Q2229442) (← links)
- Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup (Q2289212) (← links)
- Ring signatures: logarithmic-size, no setup -- from standard assumptions (Q2292698) (← links)
- The reactive simulatability (RSIM) framework for asynchronous systems (Q2464139) (← links)
- Unifying simulatability definitions in cryptographic systems under different timing assumptions (Q2484407) (← links)
- Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources (Q2794527) (← links)
- Delegatable Functional Signatures (Q2798783) (← links)
- (Q2852347) (← links)
- Union and Intersection Types for Secure Protocol Implementations (Q2902912) (← links)
- G2C: Cryptographic Protocols from Goal-Driven Specifications (Q2902917) (← links)
- Computationally Sound Abstraction and Verification of Secure Multi-Party Computations (Q2908865) (← links)
- Privacy-Preserving Accountable Computation (Q2925561) (← links)
- Asynchronous MPC with a strict honest majority using non-equivocation (Q2943607) (← links)
- Proactive secure message transmission in asynchronous networks (Q2943760) (← links)
- Computational Verifiable Secret Sharing Revisited (Q3102212) (← links)
- Reactively Secure Signature Schemes (Q3404395) (← links)
- Periodicity detection in irregularly sampled light curves by robust regression and outlier detection (Q4969880) (← links)
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science (Q5191499) (← links)
- Adversarial vulnerability bounds for Gaussian process classification (Q6106443) (← links)