2008 | ||
---|---|---|
93 | EE | David A. Basin, Felix Klaedtke, Samuel Müller, Birgit Pfitzmann: Runtime Monitoring of Metric First-order Temporal Properties. FSTTCS 2008 |
92 | EE | Michael Backes, Birgit Pfitzmann: Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Int. J. Inf. Sec. 7(1): 33-54 (2008) |
91 | EE | Michael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. Journal of Computer Security 16(5): 497-530 (2008) |
2007 | ||
90 | EE | Michael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. CSF 2007: 112-124 |
89 | EE | Birgit Pfitzmann: Multi-layer Audit of Access Rights. Secure Data Management 2007: 18-32 |
88 | EE | Carl E. Abrams, Juerg von Känel, Samuel Müller, Birgit Pfitzmann, Susanne Ruschka-Taylor: Optimized enterprise risk management. IBM Systems Journal 46(2): 219-234 (2007) |
87 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007) |
2006 | ||
86 | EE | Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 |
85 | EE | Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner: Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 |
84 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423 |
83 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography. FM 2006: 612-616 |
82 | EE | Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò: Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445 |
81 | EE | Michael Backes, Birgit Pfitzmann: On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. SEC 2006: 233-245 |
2005 | ||
80 | EE | Michael Backes, Birgit Pfitzmann: Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. ESORICS 2005: 178-196 |
79 | EE | Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Browser Model for Security Analysis of Browser-Based Protocols. ESORICS 2005: 489-508 |
78 | EE | Michael Backes, Birgit Pfitzmann: Relating Symbolic and Cryptographic Secrecy. IEEE Symposium on Security and Privacy 2005: 171-182 |
77 | Christopher Giblin, Alice Y. Liu, Samuel Müller, Birgit Pfitzmann, Xin Zhou: Regulations Expressed As Logical Models (REALM). JURIX 2005: 37-48 | |
76 | EE | Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving a WS-federation passive requestor profile with a browser model. SWS 2005: 54-64 |
75 | EE | Michael Backes, Birgit Pfitzmann: Relating Symbolic and Cryptographic Secrecy. IEEE Trans. Dependable Sec. Comput. 2(2): 109-123 (2005) |
74 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005) |
73 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005) |
2004 | ||
72 | Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick Drew McDaniel: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004 ACM 2004 | |
71 | EE | Michael Backes, Birgit Pfitzmann: Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. CSFW 2004: 204-218 |
70 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41 |
69 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51 |
68 | EE | Thomas Groß, Birgit Pfitzmann: Proving a WS-Federation passive requestor profile. SWS 2004: 77-86 |
67 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354 |
66 | EE | Michael Backes, Birgit Pfitzmann: A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. IEEE Journal on Selected Areas in Communications 22(10): 2075-2086 (2004) |
65 | EE | Michael Backes, Birgit Pfitzmann: Computational probabilistic noninterference. Int. J. Inf. Sec. 3(1): 42-60 (2004) |
64 | Michael Backes, Birgit Pfitzmann, Michael Waidner: Polynomial liveness. Journal of Computer Security 12(3-4): 589-617 (2004) | |
2003 | ||
63 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: A composable cryptographic library with nested operations. ACM Conference on Computer and Communications Security 2003: 220-230 |
62 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering. Business Process Management 2003: 168-183 |
61 | EE | Michael Backes, Birgit Pfitzmann, Matthias Schunter: A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180 |
60 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290 |
59 | EE | Michael Backes, Birgit Pfitzmann: A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. FSTTCS 2003: 1-12 |
58 | EE | Michael Backes, Birgit Pfitzmann: Intransitive Non-Interference for Cryptographic Purpose. IEEE Symposium on Security and Privacy 2003: 140- |
57 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes. ISC 2003: 84-95 |
56 | EE | Birgit Pfitzmann: Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon. Privacy Enhancing Technologies 2003: 189-204 |
55 | EE | Birgit Pfitzmann, Michael Waidner: Federated Identity-Management Protocols. Security Protocols Workshop 2003: 153-174 |
54 | EE | Birgit Pfitzmann: Federated Identity-Management Protocols (Discussion). Security Protocols Workshop 2003: 175-177 |
53 | EE | Birgit Pfitzmann, Michael Waidner: Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Computing 7(6): 38-44 (2003) |
2002 | ||
52 | EE | Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness. CSFW 2002: 160-174 |
51 | EE | Michael Backes, Birgit Pfitzmann: Computational Probabilistic Non-interference. ESORICS 2002: 1-23 |
50 | EE | Michael Backes, Christian Jacobi, Birgit Pfitzmann: Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. FME 2002: 310-329 |
49 | EE | Birgit Pfitzmann, Michael Waidner: Privacy in browser-based attribute exchange. WPES 2002: 52-62 |
2001 | ||
48 | Birgit Pfitzmann: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding Springer 2001 | |
47 | EE | Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Optimized Self-Synchronizing Mode of Operation. FSE 2001: 78-91 |
46 | EE | Birgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. IEEE Symposium on Security and Privacy 2001: 184- |
2000 | ||
45 | Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner: SEMPER - Secure Electronic Marketplace for Europe Springer 2000 | |
44 | EE | Birgit Pfitzmann, Michael Waidner: Composition and integrity preservation of secure reactive systems. ACM Conference on Computer and Communications Security 2000: 245-254 |
43 | EE | Birgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-repudiation. ASIACRYPT 2000: 401-414 |
42 | EE | Birgit Pfitzmann, Ahmad-Reza Sadeghi: Self-Escrowed Cash against User Blackmailing. Financial Cryptography 2000: 42-52 |
41 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems. Electr. Notes Theor. Comput. Sci. 32: (2000) |
1999 | ||
40 | EE | Birgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting. EUROCRYPT 1999: 150-164 |
39 | André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content. Information Hiding 1999: 117-133 | |
38 | Hans-Jürgen Guth, Birgit Pfitzmann: Error- and Collusion-Secure Fingerprinting for Digital Data. Information Hiding 1999: 134-145 | |
1998 | ||
37 | EE | Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest: Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. CRYPTO 1998: 153-168 |
36 | EE | Ivan Damgård, Birgit Pfitzmann: Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP. ICALP 1998: 772-783 |
35 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122 |
34 | Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: Statistical Secrecy and Multibit Commitments. IEEE Transactions on Information Theory 44(3): 1143-1151 (1998) | |
33 | Birgit Pfitzmann, Michael Waidner: How to Break Fraud-Detectable Key Recovery. Operating Systems Review 32(1): 23-28 (1998) | |
1997 | ||
32 | EE | Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions. ACM Conference on Computer and Communications Security 1997: 151-160 |
31 | EE | Niko Bari, Birgit Pfitzmann: Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. EUROCRYPT 1997: 480-494 |
30 | EE | Birgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting. EUROCRYPT 1997: 88-102 |
29 | EE | Birgit Pfitzmann, Michael Waidner: Strong Loss Tolerance of Electronic Coin Systems. ACM Trans. Comput. Syst. 15(2): 194-213 (1997) |
28 | Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules. IEEE Computer 30(2): 61-68 (1997) | |
27 | Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. J. Cryptology 10(3): 163-194 (1997) | |
26 | Torben P. Pedersen, Birgit Pfitzmann: Fail-Stop Signatures. SIAM J. Comput. 26(2): 291-330 (1997) | |
1996 | ||
25 | Birgit Pfitzmann: Digital Signature Schemes, General Framework and Fail-Stop Signatures Springer 1996 | |
24 | EE | Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting (Extended Abstract). EUROCRYPT 1996: 84-95 |
23 | Birgit Pfitzmann: Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. Information Hiding 1996: 347-350 | |
22 | Birgit Pfitzmann: Trials of Traced Traitors. Information Hiding 1996: 49-64 | |
1995 | ||
21 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132 |
20 | Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329- | |
1994 | ||
19 | EE | Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner: The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230 |
18 | EE | Birgit Pfitzmann: Breaking Efficient Anonymous Channel. EUROCRYPT 1994: 332-340 |
1993 | ||
17 | EE | Birgit Pfitzmann: Sorting Out Signature Schemes. ACM Conference on Computer and Communications Security 1993: 74-85 |
16 | EE | Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. CRYPTO 1993: 250-265 |
1992 | ||
15 | EE | Eugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann: New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). CRYPTO 1992: 15-30 |
14 | EE | Birgit Pfitzmann, Michael Waidner: Attacks on Protocols for Server-Aided RSA Computation. EUROCRYPT 1992: 153-162 |
13 | Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement for any Number of Faulty Processors. STACS 1992: 339-350 | |
1991 | ||
12 | EE | Birgit Pfitzmann, Michael Waidner: How To Break and Repair A "Provably Secure" Untraceable Payment System. CRYPTO 1991: 338-350 |
11 | EE | David Chaum, Eugène van Heijst, Birgit Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. CRYPTO 1991: 470-484 |
10 | Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Kommunikation in Verteilten Systemen 1991: 451-463 | |
9 | Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement with Good Majority. STACS 1991: 285-295 | |
8 | Birgit Pfitzmann, Michael Waidner: Fail-stop-Signaturen und ihre Anwendung. VIS 1991: 289-301 | |
7 | Birgit Pfitzmann, Michael Waidner: Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. VIS 1991: 302-320 | |
6 | Dirk Fox, Birgit Pfitzmann: Effiziente Software-Implementierung des GMR-Signatursystems. VIS 1991: 329-345 | |
1990 | ||
5 | EE | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445 |
1989 | ||
4 | EE | Birgit Pfitzmann, Andreas Pfitzmann: How to Break the Direct RSA-Implementation of Mixes. EUROCRYPT 1989: 373-381 |
3 | EE | Michael Waidner, Birgit Pfitzmann: The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). EUROCRYPT 1989: 690 |
1988 | ||
2 | Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommunikationsnetze. Informatik Spektrum 11(3): 118-142 (1988) | |
1987 | ||
1 | Michael Waidner, Birgit Pfitzmann: Verlusttolerante elektronische Brieftaschen. Fehlertolerierende Rechensysteme 1987: 36-50 |