Backes, Michael.
Backes, Michael, 1978-
Michael Backes
VIAF ID: 193777955 ( Personal )
Permalink: http://viaf.org/viaf/193777955
Preferred Forms
-
-
-
- 100 1 _ ‡a Backes, Michael
- 100 1 _ ‡a Backes, Michael
- 100 1 _ ‡a Backes, Michael ‡d 1978-
- 100 1 _ ‡a Backes, Michael ‡d 1978-
-
-
- 100 0 _ ‡a Michael Backes
4xx's: Alternate Name Forms (7)
5xx's: Related Names (2)
- 551 _ _ ‡a Lebach
- 551 _ _ ‡a Saarbrücken
Works
Title | Sources |
---|---|
Adversarial inference and manipulation of machine learning models | |
Android security framework enabling generic and extensible access control on Android | |
AppGuard — fine-grained policy enforcement for untrusted android applications | |
Cannabis médicinal : ce qu'il faut savoir... | |
Cannabis pharmacy : the practical guide to medical marijuana | |
Computer security : ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings | |
Cryptographically sound analysis of security protocols | |
Cryptography with anonymity in mind | |
Declaratives Design und Enforcement für sichere Cloud-Anwendungen | |
Disjunktive, konjunktive, und Verfeinerungstypen und die Beweisführung der Disjunktheit von Typen für die Analyse von Sicherheitsprotokollen | |
Entwicklung sicherer Software durch Security by Design [Trend- und Strategiebericht] | |
Experimentelle Semiotik in Literaturavantgarden : über die Wiener Gruppe mit Bezug auf die Konkrete Poesie | |
Die Figuren der romantischen Vision : Victor Hugo als Paradigma | |
FMSE'03 : proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering : Washington, DC, USA, October 30, 2003 : co-located with CCS'03 | |
Formal verification of cryptographic security proofs | |
Health privacy methods for privacy-preserving data sharing of methylation, microbiome and eye tracking data | |
Information Security (vol. # 4176) : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings | |
Konopná lékárna: praktický průvodce světem léčivé marihuany | |
Mitigating security and privacy threats from untrusted application components on Android | |
New approaches to privacy preserving signatures | |
Plugging in trust and privacy three systems to improve widely used ecosystems | |
Positionspapier Cybersicherheit in Deutschland | |
Rational cryptography: novel constructions, automated verification and unified definitions | |
Rising sun | |
Simulated penetration testing and mitigation analysis | |
Solen stiger | |
Taking Android app vetting to the next level with path-sensitive value analysis | |
TLS on Android – Evolution over the last decade | |
Union, intersection, and refinement types and reasoning about type disjointness for security protocol analysis | |
Wschodzące słońce | |
Your choice MATor(s) large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks | |
Zero-knowledge in the applied Pi calculus and automated verification of the direct anonymous attestation protocol |