Benedikt Schmidt
Benedikt Schmidt
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
International Conference on Computer Aided Verification, 696-701, 2013
Knowledge worker roles and actions—results of two empirical studies
W Reinhardt, B Schmidt, P Sloep, H Drachsler
Knowledge and Process Management 18 (3), 150-174, 2011
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
EasyCrypt: A Tutorial
G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub
Foundations of security analysis and design vii, 146-166, 2013
Jasmin: High-assurance and high-speed cryptography
JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Modeling and verifying physical properties of security protocols for wireless networks
P Schaller, B Schmidt, D Basin, S Capkun
2009 22nd IEEE Computer Security Foundations Symposium, 109-123, 2009
Fully automated analysis of padding-based encryption in the computational model
G Barthe, JM Crespo, B Grégoire, C Kunz, Y Lakhnech, B Schmidt, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Automated analysis of cryptographic assumptions in generic group models
G Barthe, E Fagerholm, D Fiore, J Mitchell, A Scedrov, B Schmidt
Annual Cryptology Conference, 95-112, 2014
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
Formal reasoning about physical properties of security protocols
D Basin, S Capkun, P Schaller, B Schmidt
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds
G Barthe, E Fagerholm, D Fiore, A Scedrov, B Schmidt, M Tibouchi
IET Information Security 10 (6), 358-371, 2016
Upgrading wireless home routers for enabling large-scale deployment of cloudlets
C Meurisch, A Seeliger, B Schmidt, I Schweizer, F Kaup, M Mühlhäuser
International Conference on Mobile Computing, Applications, and Services, 12-29, 2015
Formal analysis of key exchange protocols and physical protocols
B Schmidt
ETH Zurich, 2012
Key confirmation in key exchange: A formal treatment and implications for TLS 1.3
M Fischlin, F Günther, B Schmidt, B Warinschi
2016 IEEE Symposium on Security and Privacy (SP), 452-469, 2016
Support for collaborative situation analysis and planning in crisis management teams using interactive tabletops
S Doeweling, T Tahiri, P Sowinski, B Schmidt, M Khalilbeigi
Proceedings of the 2013 ACM international conference on Interactive …, 2013
Let’s get physical: Models and methods for real-world security protocols
D Basin, S Capkun, P Schaller, B Schmidt
International Conference on Theorem Proving in Higher Order Logics, 1-22, 2009
A model for the design of interactive systems based on activity theory
S Döweling, B Schmidt, A Göb
Proceedings of the ACM 2012 conference on Computer Supported Cooperative …, 2012
Small-scale incident detection based on microposts
A Schulz, B Schmidt, T Strufe
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 3-12, 2015
Fitness tracker or digital personal coach: how to personalize training
B Schmidt, S Benchea, R Eichin, C Meurisch
Adjunct Proceedings of the 2015 ACM International Joint Conference on …, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20