Wissenschaftliche Publikationen

Zeitschriftenartikel (7)

1.
Zeitschriftenartikel
Backes, M.; DĂĽrmuth, M.; Hofheinz, D.; KĂĽsters, R.: Conditional reactive simulatability. International Journal of Information Security 7 (2), S. 155 - 169 (2008)
2.
Zeitschriftenartikel
Backes, M.; Pfitzmann, B.: Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. International Journal of Information Security 7 (1), S. 33 - 54 (2008)
3.
Zeitschriftenartikel
Backes, M.; Pfitzmann, B.; Scedrov, A.: Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. Journal of Computer Security 16 (5), S. 497 - 530 (2008)
4.
Zeitschriftenartikel
Guerraoui, R.; Kapalka, M.; Kouznetsov, P.: The weakest failure detectors to boost obstruction-freedom. Distributed Computing 20 (6), S. 415 - 433 (2008)
5.
Zeitschriftenartikel
Guerraoui, R.; Kouznetsov, P.: Failure detectors as type boosters. Distributed Computing 20 (5), S. 343 - 358 (2008)
6.
Zeitschriftenartikel
Guerraoui, R.; Kouznetsov, P.: The gap in circumventing the impossibility of consensus. Journal of Computer and System Sciences 74 (5), S. 823 - 830 (2008)
7.
Zeitschriftenartikel
Meyer, R.; Faber, J.; Hoenicke, J.; Rybalchenko, A.: Model checking Duration Calculus: a practical approach. Formal Aspects of Computing 20 (4-5), S. 481 - 505 (2008)

Konferenzbeitrag (23)

8.
Konferenzbeitrag
Backes, M.; Berg, M.; Unruh, D.: A Formal Language for Cryptographic Pseudocode. In: Logic for Programming, Artificial Intelligence, and Reasoning: 15th International Conference, LPAR 2008, S. 353 - 376 (Hg. Cervesato, I.; Veith, H.; Voronkov, A.). Springer, Berlin (2008)
9.
Konferenzbeitrag
Backes, M.; DĂĽrmuth, M.; Unruh, D.: Compromising Reflections-or-How to Read LCD Monitors around the Corner. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, S. 158 - 169 (Hg. Werner, B.). IEEE, Piscataway, NJ (2008)
10.
Konferenzbeitrag
Backes, M.; DĂĽrmuth, M.; Unruh, D.: OAEP Is Secure under Key-Dependent Messages. In: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, S. 506 - 523 (Hg. Pieprzyk, J.). Springer, Berlin (2008)
11.
Konferenzbeitrag
Backes, M.; Hamerlik, M.; Linari, A.; Maffei, M.; Tryfonopoulos, C.; Weikum, G.: Anonymous and censorship resistant content sharing in unstructured overlays. In: PODC’08: Proceedings of the 27th Annual ACM Symposium on Principles of Distributed Computing, S. 429 - 429 (Hg. Patt-Shamir, B.). ACM, New York, NY (2008)
12.
Konferenzbeitrag
Backes, M.; Hritcu, C.; Maffei, M.: Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. In: 21st IEEE Computer Security Foundations Symposium: CSF 2008 ; proceedings, S. 195 - 209 (Hg. Kawada, S.). IEEE Computer Society, Los Alamitos, Ca. (2008)
13.
Konferenzbeitrag
Backes, M.; Hritcu, C.; Maffei, M.: Type-checking zero-knowledge. In: CCS’08: Proceedings of the 15th ACM Conference on Computer and Communications Security, S. 357 - 370 (Hg. Ning, P.; Syverson, P.; Jha, S.). ACM, New York, NY (2008)
14.
Konferenzbeitrag
Backes, M.; Köpf, B.: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. In: Computer Security – ESORICS 2008: 13th European Symposium on Research in Computer Security, S. 517 - 532 (Hg. Jajodia, S.; López, J.). Springer, Berlin (2008)
15.
Konferenzbeitrag
Backes, M.; Lorenz, S.; Maffei, M.; Pecina, K.: The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. In: Computer Aided Verification: 20th International Conference, CAV 2008, S. 419 - 422 (Hg. Gupta, A.; Malik, S.). Springer, Berlin (2008)
16.
Konferenzbeitrag
Backes, M.; Maffei, M.; Unruh, D.: Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, S. 202 - 215 (Hg. Werner, B.). IEEE, Piscataway, NJ (2008)
17.
Konferenzbeitrag
Backes, M.; Unruh, D.: Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. In: 21st IEEE Computer Security Foundations Symposium: CSF 2008 ; proceedings, S. 255 - 269 (Hg. Kawada, S.). IEEE Computer Society, Los Alamitos, Ca. (2008)
18.
Konferenzbeitrag
Backes, M.; Unruh, D.: Limits of Constructive Security Proofs. In: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, S. 290 - 307 (Hg. Pieprzyk, J.). Springer, Berlin (2008)
19.
Konferenzbeitrag
Cha, M.; Mislove, A.; Adams, B.; Gummadi, K. P.: Characterizing Social Cascades in Flickr. In: Compilation E-Proceedings of the SIGCOMM 2008 Conference & the co-located workshops: WOSN'08 Proceedings, S. 13 - 18. ACM, New York, NY (2008)
20.
Konferenzbeitrag
Cha, M.; Rodriguez, P.; Crowcroft, J.; Moon, S.; Amatrianin, X.: Watching Television Over an IP Network. In: IMC’08: proceedings of the 2008 ACM SIGCOMM Internet Measurement Conference, S. 71 - 84. ACM, New York, NY (2008)
Zur Redakteursansicht