Остановите войну!
for scientists:
default search action
Birgit Pfitzmann
- > Home > Persons > Birgit Pfitzmann
Publications
- 2008
- [j21]Michael Backes, Birgit Pfitzmann:
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Int. J. Inf. Sec. 7(1): 33-54 (2008) - [j20]Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. J. Comput. Secur. 16(5): 497-530 (2008) - 2007
- [j19]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007) - [c72]Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. CSF 2007: 112-124 - 2006
- [c70]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 - [c68]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423 - [c67]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Formal Methods and Cryptography. FM 2006: 612-616 - [c66]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445 - [c65]Michael Backes, Birgit Pfitzmann:
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. SEC 2006: 233-245 - [i15]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006) - [i14]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. IACR Cryptol. ePrint Arch. 2006: 58 (2006) - [i13]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. IACR Cryptol. ePrint Arch. 2006: 68 (2006) - 2005
- [j17]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005) - [j16]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005) - [j15]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. IEEE Trans. Dependable Secur. Comput. 2(2): 109-123 (2005) - [c64]Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. ESORICS 2005: 178-196 - [c61]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. S&P 2005: 171-182 - [i11]Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-style XOR. IACR Cryptol. ePrint Arch. 2005: 220 (2005) - [i10]Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. IACR Cryptol. ePrint Arch. 2005: 421 (2005) - 2004
- [j14]Michael Backes, Birgit Pfitzmann:
Computational probabilistic noninterference. Int. J. Inf. Sec. 3(1): 42-60 (2004) - [j12]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Polynomial liveness. J. Comput. Secur. 12(3-4): 589-617 (2004) - [j11]Michael Backes, Birgit Pfitzmann:
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. IEEE J. Sel. Areas Commun. 22(10): 2075-2086 (2004) - [c59]Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. CSFW 2004: 204-218 - [c58]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41 - [c57]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51 - [c55]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354 - [i9]Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. IACR Cryptol. ePrint Arch. 2004: 59 (2004) - [i8]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. IACR Cryptol. ePrint Arch. 2004: 82 (2004) - [i7]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. IACR Cryptol. ePrint Arch. 2004: 300 (2004) - 2003
- [c54]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Security in Business Process Engineering. Business Process Management 2003: 168-183 - [c53]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A composable cryptographic library with nested operations. CCS 2003: 220-230 - [c52]Michael Backes, Birgit Pfitzmann, Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180 - [c51]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290 - [c50]Michael Backes, Birgit Pfitzmann:
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. FSTTCS 2003: 1-12 - [c49]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively Secure Signature Schemes. ISC 2003: 84-95 - [c47]Michael Backes, Birgit Pfitzmann:
Intransitive Non-Interference for Cryptographic Purpose. S&P 2003: 140- - [i6]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A Universally Composable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 15 (2003) - [i5]Michael Backes, Birgit Pfitzmann:
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. IACR Cryptol. ePrint Arch. 2003: 121 (2003) - [i4]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication Within a Simulatable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 145 (2003) - 2002
- [c44]Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
Polynomial Fairness and Liveness. CSFW 2002: 160-174 - [c43]Michael Backes, Birgit Pfitzmann:
Computational Probabilistic Non-interference. ESORICS 2002: 1-23 - [c42]Michael Backes, Christian Jacobi, Birgit Pfitzmann:
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. FME 2002: 310-329
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-23 23:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint