Benedikt Schmidt

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2023
Explainability as fig leaf? An exploration of experts' ethical expectations towards machine learning in psychiatry.
AI Ethics, February, 2023

2022
Industrial challenges for AI systems engineering.
Autom., 2022

2021
Practical Aspects for Exploration and Analysis of Manual Interventions in Process Plants.
Proceedings of the 19th IEEE International Conference on Industrial Informatics, 2021

Model-based Control of a Gravimetric Dosing Conveyor for Alternative Fuels in the Cement Industry.
Proceedings of the 11th IEEE International Conference on System Engineering and Technology, 2021

Practical Challenges of Virtual Assistants and Voice Interfaces in Industrial Applications.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2019
Automated Analysis of Cryptographic Assumptions in Generic Group Models.
J. Cryptol., 2019

2018
Industrial Virtual Assistants: Challenges and Opportunities.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

2017
Machine-Checked Proofs of Privacy for Electronic Voting Protocols.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Jasmin: High-Assurance and High-Speed Cryptography.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds.
IET Inf. Secur., 2016

Generic Transformations of Predicate Encodings: Constructions and Applications.
IACR Cryptol. ePrint Arch., 2016

Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.
IACR Cryptol. ePrint Arch., 2016

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2015

Automated Proofs of Pairing-Based Cryptography.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Certified Synthesis of Efficient Batch Verifiers.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
On active information storage in input-driven systems
CoRR, 2013

EasyCrypt: A Tutorial.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Fully automated analysis of padding-based encryption in the computational model.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...