


Остановите войну!
for scientists:
Benedikt Schmidt
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c58]Marco Gärtler, Benedikt Schmidt:
Practical Challenges of Virtual Assistants and Voice Interfaces in Industrial Applications. HICSS 2021: 1-10 - [c57]Hareesh Konanki, Alexander Elbel, Benedikt Schmidt, Sairam Nandyala, Alfons Noe, Dominik Aufderheide
:
Model-based Control of a Gravimetric Dosing Conveyor for Alternative Fuels in the Cement Industry. ICSET 2021: 153-158 - [c56]Benedikt Schmidt, Reuben Borrison, Marco Gärtler, Sylvia Maczey, Arzam Kotriwala:
Practical Aspects for Exploration and Analysis of Manual Interventions in Process Plants. INDIN 2021: 1-6
2010 – 2019
- 2019
- [j5]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. J. Cryptol. 32(2): 324-360 (2019) - 2018
- [c55]Benedikt Schmidt, Reuben Borrison, Andrew Cohen, Marcel Dix, Marco Gärtler, Martin Hollender, Benjamin Klöpper, Sylvia Maczey, Shunmuga Siddharthan:
Industrial Virtual Assistants: Challenges and Opportunities. UbiComp/ISWC Adjunct 2018: 794-801 - [c54]Christian Meurisch, Lulzim Murati, Rüdiger Eichin, Benedikt Schmidt, Max Mühlhäuser:
Tour Guides Get Guided: Intelligent Coordination of Simultaneous Tours in Exhibition Environments. MobiQuitous 2018: 274-283 - 2017
- [c53]José Bacelar Almeida
, Manuel Barbosa
, Gilles Barthe
, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira
, Hugo Pacheco
, Benedikt Schmidt, Pierre-Yves Strub:
Jasmin: High-Assurance and High-Speed Cryptography. CCS 2017: 1807-1823 - [c52]Christian Meurisch, Bennet Jeutter, Wladimir Schmidt, Nickolas Gundling, Benedikt Schmidt, Fabian Herrlich, Max Mühlhäuser:
An Extensible Pervasive Platform for Large-Scale Anticipatory Mobile Computing. COMPSAC (1) 2017: 459-464 - [c51]Miguel Ambrona, Gilles Barthe, Benedikt Schmidt:
Generic Transformations of Predicate Encodings: Constructions and Applications. CRYPTO (1) 2017: 36-66 - [c50]Christian Meurisch, Maria-Dorina Ionescu, Benedikt Schmidt, Max Mühlhäuser:
Reference model of next-generation digital personal assistant: integrating proactive behavior. UbiComp/ISWC Adjunct 2017: 149-152 - [c49]Christian Meurisch, Artur Gogel, Benedikt Schmidt, Timo Nolle, Frederik Janssen, Immanuel Schweizer, Max Mühlhäuser:
Capturing Daily Student Life by Recognizing Complex Activities Using Smartphones. MobiQuitous 2017: 156-165 - [c48]Véronique Cortier, Constantin Catalin Dragan
, François Dupressoir
, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi:
Machine-Checked Proofs of Privacy for Electronic Voting Protocols. IEEE Symposium on Security and Privacy 2017: 993-1008 - 2016
- [j4]Gilles Barthe
, Edvard Fagerholm, Dario Fiore, Andre Scedrov
, Benedikt Schmidt, Mehdi Tibouchi
:
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds. IET Inf. Secur. 10(6): 358-371 (2016) - [j3]Axel Schulz, Eneldo Loza Mencía, Benedikt Schmidt:
A rapid-prototyping framework for extracting small-scale incident-related information in microblogs: Application of multi-label classification on tweets. Inf. Syst. 57: 88-110 (2016) - [c47]Miguel Ambrona, Gilles Barthe, Benedikt Schmidt:
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model. EUROCRYPT (2) 2016: 822-851 - [c46]Christian Meurisch, Usman Naeem
, Muhammad Awais Azam
, Frederik Janssen, Benedikt Schmidt, Max Mühlhäuser:
Smarticipation: intelligent personal guidance of human behavior utilizing anticipatory models. UbiComp Adjunct 2016: 1227-1230 - [c45]Alexander Seeliger, Timo Nolle, Benedikt Schmidt, Max Mühlhäuser:
Process Compliance Checking using Taint Flow Analysis. ICIS 2016 - [c44]Alexander Seeliger
, Benedikt Schmidt, Immanuel Schweizer, Max Mühlhäuser:
What Belongs Together Comes Together: Activity-centric Document Clustering for Information Work. IUI 2016: 60-70 - [c43]Marc Fischlin, Felix Günther, Benedikt Schmidt, Bogdan Warinschi:
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3. IEEE Symposium on Security and Privacy 2016: 452-469 - [i6]Miguel Ambrona, Gilles Barthe, Benedikt Schmidt:
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model. IACR Cryptol. ePrint Arch. 2016: 270 (2016) - [i5]Miguel Ambrona, Gilles Barthe, Benedikt Schmidt:
Generic Transformations of Predicate Encodings: Constructions and Applications. IACR Cryptol. ePrint Arch. 2016: 1105 (2016) - 2015
- [c42]Gilles Barthe
, Benjamin Grégoire, Benedikt Schmidt:
Automated Proofs of Pairing-Based Cryptography. CCS 2015: 1156-1168 - [c41]Axel Schulz, Christian Guckelsberger, Benedikt Schmidt:
More Features Are Not Always Better: Evaluating Generalizing Models in Incident Type Classification of Tweets. EMNLP 2015: 421-430 - [c40]Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols. EUROCRYPT (2) 2015: 689-718 - [c39]Axel Schulz, Benedikt Schmidt, Thorsten Strufe:
Small-Scale Incident Detection based on Microposts. HT 2015: 3-12 - [c38]Benedikt Schmidt, Sebastian Benchea, Rüdiger Eichin, Christian Meurisch:
Fitness tracker or digital personal coach: how to personalize training. UbiComp/ISWC Adjunct 2015: 1063-1067 - [c37]Christian Meurisch, Benedikt Schmidt, Michael Scholz, Immanuel Schweizer, Max Mühlhäuser:
Labels: quantified self app for human activity sensing. UbiComp/ISWC Adjunct 2015: 1413-1422 - [c36]Christian Meurisch, Alexander Seeliger
, Benedikt Schmidt, Immanuel Schweizer, Fabian Kaup
, Max Mühlhäuser:
Upgrading Wireless Home Routers for Enabling Large-Scale Deployment of Cloudlets. MobiCASE 2015: 12-29 - [c35]Christian Meurisch, Tahir Hussain, Artur Gogel, Benedikt Schmidt, Immanuel Schweizer, Max Mühlhäuser:
A Spatiotemporal Approach for Social Situation Recognition. MobiCASE 2015: 309-316 - [c34]Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov
, Benedikt Schmidt, Mehdi Tibouchi
:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. Public Key Cryptography 2015: 355-376 - [i4]Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. IACR Cryptol. ePrint Arch. 2015: 19 (2015) - [i3]Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2015: 74 (2015) - 2014
- [c33]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov
, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. CRYPTO (1) 2014: 95-112 - [c32]Joseph A. Akinyele, Gilles Barthe
, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub:
Certified Synthesis of Efficient Batch Verifiers. CSF 2014: 153-165 - [c31]Immanuel Schweizer, Benedikt Schmidt:
Kraken.me: multi-device user tracking suite. UbiComp Adjunct 2014: 853-862 - [c30]Immanuel Schweizer, Roman Bartl, Benedikt Schmidt, Fabian Kaup
, Max Mühlhäuser
:
Kraken.me mobile: The energy footprint of mobile tracking. MobiCASE 2014: 82-89 - [c29]Axel Schulz, Eneldo Loza Mencía, Thanh-Tung Dang, Benedikt Schmidt:
Evaluating Multi-label Classification of Incident-related Tweet. #MSM 2014: 26-33 - [c28]Benedikt Schmidt, Sebastian Döweling:
Designing for information work at the computer workplace with activity theory. NordiCHI 2014: 648-657 - [c27]Benedikt Schmidt, Ralf Sasse
, Cas Cremers, David A. Basin:
Automated Verification of Group Key Agreement Protocols. IEEE Symposium on Security and Privacy 2014: 179-194 - [i2]Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. IACR Cryptol. ePrint Arch. 2014: 458 (2014) - 2013
- [b1]Benedikt Schmidt:
Information work support based on activity data (Handlungsdatenbasierte Informationsarbeitsunterstützung). Darmstadt University of Technology, Germany, 2013 - [c26]Simon Meier, Benedikt Schmidt, Cas Cremers, David A. Basin:
The TAMARIN Prover for the Symbolic Analysis of Security Protocols. CAV 2013: 696-701 - [c25]Gilles Barthe
, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella Béguelin
:
Fully automated analysis of padding-based encryption in the computational model. CCS 2013: 1247-1260 - [c24]Sebastian Döweling, Tarik Tahiri, Benedikt Schmidt, Alexander Nolte, Mohammadreza Khalilbeigi:
Collaborative Business Process Modeling On Interactive Tabletops. ECIS 2013: 29 - [c23]Gilles Barthe, François Dupressoir
, Benjamin Grégoire, César Kunz, Benedikt Schmidt, Pierre-Yves Strub:
EasyCrypt: A Tutorial. FOSAD 2013: 146-166 - [c22]Sebastian Doeweling, Tarik Tahiri, Philipp Sowinski, Benedikt Schmidt, Mohammadreza Khalilbeigi:
Support for collaborative situation analysis and planning in crisis management teams using interactive tabletops. ITS 2013: 273-282 - [i1]Oliver Obst, Joschka Boedecker, Benedikt Schmidt, Minoru Asada:
On active information storage in input-driven systems. CoRR abs/1303.5526 (2013) - 2012
- [c21]Benedikt Schmidt, Sebastian Döweling:
Transparency - Activity Theory-Guided Support for Information Work. CASFE 2012 - [c20]Sebastian Döweling, Benedikt Schmidt, Andreas Göb:
A model for the design of interactive systems based on activity theory. CSCW 2012: 539-548 - [c19]Benedikt Schmidt, Simon Meier, Cas Cremers, David A. Basin:
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. CSF 2012: 78-94 - [c18]Anton Pussep, Markus Schief, Benedikt Schmidt, Florian Friedrichs, Peter Buxmann:
Topics in Software Industry Transformation Research: A Topic Analysis of Major IS Conferences. ICSOB 2012: 128-140 - [c17]Benedikt Schmidt, Sebastian Doeweling, Max Mühlhäuser:
Interaction history visualization. SIGDOC 2012: 261-270 - [c16]Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IEEE Symposium on Security and Privacy 2012: 113-127 - 2011
- [j2]Benedikt Schmidt, Todor Stoitsev, Max Mühlhäuser:
Task Models for Intention-Aware Systems. J. Univers. Comput. Sci. 17(10): 1511-1526 (2011) - [j1]David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:
Formal Reasoning about Physical Properties of Security Protocols. ACM Trans. Inf. Syst. Secur. 14(2): 16:1-16:28 (2011) - [c15]Axel Schulz, Benedikt Schmidt, Heiko Paulheim
:
LiCoRMS - Towards a Resource Management System Based on Lifecycle and Content Information. CONTEXT 2011: 292-295 - [c14]Benedikt Schmidt, Heiko Paulheim
, Todor Stoitsev, Max Mühlhäuser
:
Towards a Formalization of Individual Work Execution at Computer Workplaces. ICCS 2011: 270-283 - [c13]Benedikt Schmidt, Eicke Godehardt:
Interaction Data Management. KES (2) 2011: 402-409 - [c12]Benedikt Schmidt, Johannes Kastl, Todor Stoitsev, Max Mühlhäuser
:
Hierarchical task instance mining in interaction histories. SIGDOC 2011: 99-106 - 2010
- [c11]Markus Schief, Benedikt Schmidt:
Crossing the Chasm Between the Real World and Business Process Management. ISSS/BPSC 2010: 280-287 - [c10]Benedikt Schmidt, Patrick Schaller, David A. Basin:
Impossibility Results for Secret Establishment. CSF 2010: 261-273 - [c9]Benedikt Schmidt, Todor Stoitsev, Max Mühlhäuser
:
Activity-centric support for weakly-structured business processes. EICS 2010: 251-260 - [c8]Benedikt Schmidt, Markus Schief:
Towards Agile Business Processes Based on the Internet of Things. Heinz Nixdorf Symposium 2010: 257-262
2000 – 2009
- 2009
- [c7]Patrick Schaller, Benedikt Schmidt, David A. Basin, Srdjan Capkun:
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. CSF 2009: 109-123 - [c6]Benedikt Schmidt, Uwe V. Riss
:
Task Patterns as Means to Experience Sharing. ICWL 2009: 353-362 - [c5]Uwe V. Riss, Benedikt Schmidt, Todor Stoitsev:
Task Patterns in Collaborative Semantic Task Management as Means of Corporate Experience Preservation. LWA 2009: FGWM:40-47 - [c4]David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:
Let's Get Physical: Models and Methods for Real-World Security Protocols. TPHOLs 2009: 1-22 - 2008
- [c3]Wolfgang Reinhardt, Christian Mletzko, Benedikt Schmidt, Johannes Magenheim, Tobias Schauerte:
Knowledge Processing and Contextualisation by Automatical Metadata Extraction and Semantic Analysis. EC-TEL 2008: 378-383 - [c2]Christian Mletzko, Benedikt Schmidt:
Automatische Extraktion von Metadaten aus verschiedenen Dateiformaten. Informatiktage 2008: 181-184 - [c1]Benedikt Schmidt, Wolfgang Reinhardt, Christian Mletzko:
MetaXsA: Modulares Framework zur Metadatenextraktion durch semantische Dokumentanalyse auf unstrukturierten Textdokumenten. Informatiktage 2008: 197-200
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-05 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint