dblp.uni-trier.dewww.uni-trier.de

Birgit Pfitzmann

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
93EEDavid A. Basin, Felix Klaedtke, Samuel Müller, Birgit Pfitzmann: Runtime Monitoring of Metric First-order Temporal Properties. FSTTCS 2008
92EEMichael Backes, Birgit Pfitzmann: Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Int. J. Inf. Sec. 7(1): 33-54 (2008)
91EEMichael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. Journal of Computer Security 16(5): 497-530 (2008)
2007
90EEMichael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. CSF 2007: 112-124
89EEBirgit Pfitzmann: Multi-layer Audit of Access Rights. Secure Data Management 2007: 18-32
88EECarl E. Abrams, Juerg von Känel, Samuel Müller, Birgit Pfitzmann, Susanne Ruschka-Taylor: Optimized enterprise risk management. IBM Systems Journal 46(2): 219-234 (2007)
87EEMichael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007)
2006
86EEChristoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. CSFW 2006: 153-166
85EEZinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner: Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178
84EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423
83EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography. FM 2006: 612-616
82EEMichael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò: Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445
81EEMichael Backes, Birgit Pfitzmann: On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. SEC 2006: 233-245
2005
80EEMichael Backes, Birgit Pfitzmann: Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. ESORICS 2005: 178-196
79EEThomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Browser Model for Security Analysis of Browser-Based Protocols. ESORICS 2005: 489-508
78EEMichael Backes, Birgit Pfitzmann: Relating Symbolic and Cryptographic Secrecy. IEEE Symposium on Security and Privacy 2005: 171-182
77 Christopher Giblin, Alice Y. Liu, Samuel Müller, Birgit Pfitzmann, Xin Zhou: Regulations Expressed As Logical Models (REALM). JURIX 2005: 37-48
76EEThomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving a WS-federation passive requestor profile with a browser model. SWS 2005: 54-64
75EEMichael Backes, Birgit Pfitzmann: Relating Symbolic and Cryptographic Secrecy. IEEE Trans. Dependable Sec. Comput. 2(2): 109-123 (2005)
74EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005)
73EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005)
2004
72 Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick Drew McDaniel: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004 ACM 2004
71EEMichael Backes, Birgit Pfitzmann: Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. CSFW 2004: 204-218
70EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41
69EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51
68EEThomas Groß, Birgit Pfitzmann: Proving a WS-Federation passive requestor profile. SWS 2004: 77-86
67EEMichael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354
66EEMichael Backes, Birgit Pfitzmann: A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. IEEE Journal on Selected Areas in Communications 22(10): 2075-2086 (2004)
65EEMichael Backes, Birgit Pfitzmann: Computational probabilistic noninterference. Int. J. Inf. Sec. 3(1): 42-60 (2004)
64 Michael Backes, Birgit Pfitzmann, Michael Waidner: Polynomial liveness. Journal of Computer Security 12(3-4): 589-617 (2004)
2003
63EEMichael Backes, Birgit Pfitzmann, Michael Waidner: A composable cryptographic library with nested operations. ACM Conference on Computer and Communications Security 2003: 220-230
62EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering. Business Process Management 2003: 168-183
61EEMichael Backes, Birgit Pfitzmann, Matthias Schunter: A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180
60EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290
59EEMichael Backes, Birgit Pfitzmann: A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. FSTTCS 2003: 1-12
58EEMichael Backes, Birgit Pfitzmann: Intransitive Non-Interference for Cryptographic Purpose. IEEE Symposium on Security and Privacy 2003: 140-
57EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes. ISC 2003: 84-95
56EEBirgit Pfitzmann: Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon. Privacy Enhancing Technologies 2003: 189-204
55EEBirgit Pfitzmann, Michael Waidner: Federated Identity-Management Protocols. Security Protocols Workshop 2003: 153-174
54EEBirgit Pfitzmann: Federated Identity-Management Protocols (Discussion). Security Protocols Workshop 2003: 175-177
53EEBirgit Pfitzmann, Michael Waidner: Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Computing 7(6): 38-44 (2003)
2002
52EEMichael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness. CSFW 2002: 160-174
51EEMichael Backes, Birgit Pfitzmann: Computational Probabilistic Non-interference. ESORICS 2002: 1-23
50EEMichael Backes, Christian Jacobi, Birgit Pfitzmann: Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. FME 2002: 310-329
49EEBirgit Pfitzmann, Michael Waidner: Privacy in browser-based attribute exchange. WPES 2002: 52-62
2001
48 Birgit Pfitzmann: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding Springer 2001
47EEAmmar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Optimized Self-Synchronizing Mode of Operation. FSE 2001: 78-91
46EEBirgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. IEEE Symposium on Security and Privacy 2001: 184-
2000
45 Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner: SEMPER - Secure Electronic Marketplace for Europe Springer 2000
44EEBirgit Pfitzmann, Michael Waidner: Composition and integrity preservation of secure reactive systems. ACM Conference on Computer and Communications Security 2000: 245-254
43EEBirgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-repudiation. ASIACRYPT 2000: 401-414
42EEBirgit Pfitzmann, Ahmad-Reza Sadeghi: Self-Escrowed Cash against User Blackmailing. Financial Cryptography 2000: 42-52
41EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems. Electr. Notes Theor. Comput. Sci. 32: (2000)
1999
40EEBirgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting. EUROCRYPT 1999: 150-164
39 André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content. Information Hiding 1999: 117-133
38 Hans-Jürgen Guth, Birgit Pfitzmann: Error- and Collusion-Secure Fingerprinting for Digital Data. Information Hiding 1999: 134-145
1998
37EEOded Goldreich, Birgit Pfitzmann, Ronald L. Rivest: Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. CRYPTO 1998: 153-168
36EEIvan Damgård, Birgit Pfitzmann: Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP. ICALP 1998: 772-783
35EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122
34 Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: Statistical Secrecy and Multibit Commitments. IEEE Transactions on Information Theory 44(3): 1143-1151 (1998)
33 Birgit Pfitzmann, Michael Waidner: How to Break Fraud-Detectable Key Recovery. Operating Systems Review 32(1): 23-28 (1998)
1997
32EEBirgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions. ACM Conference on Computer and Communications Security 1997: 151-160
31EENiko Bari, Birgit Pfitzmann: Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. EUROCRYPT 1997: 480-494
30EEBirgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting. EUROCRYPT 1997: 88-102
29EEBirgit Pfitzmann, Michael Waidner: Strong Loss Tolerance of Electronic Coin Systems. ACM Trans. Comput. Syst. 15(2): 194-213 (1997)
28 Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules. IEEE Computer 30(2): 61-68 (1997)
27 Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. J. Cryptology 10(3): 163-194 (1997)
26 Torben P. Pedersen, Birgit Pfitzmann: Fail-Stop Signatures. SIAM J. Comput. 26(2): 291-330 (1997)
1996
25 Birgit Pfitzmann: Digital Signature Schemes, General Framework and Fail-Stop Signatures Springer 1996
24EEBirgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting (Extended Abstract). EUROCRYPT 1996: 84-95
23 Birgit Pfitzmann: Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. Information Hiding 1996: 347-350
22 Birgit Pfitzmann: Trials of Traced Traitors. Information Hiding 1996: 49-64
1995
21EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132
20 Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329-
1994
19EEJean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner: The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230
18EEBirgit Pfitzmann: Breaking Efficient Anonymous Channel. EUROCRYPT 1994: 332-340
1993
17EEBirgit Pfitzmann: Sorting Out Signature Schemes. ACM Conference on Computer and Communications Security 1993: 74-85
16EEIvan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. CRYPTO 1993: 250-265
1992
15EEEugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann: New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). CRYPTO 1992: 15-30
14EEBirgit Pfitzmann, Michael Waidner: Attacks on Protocols for Server-Aided RSA Computation. EUROCRYPT 1992: 153-162
13 Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement for any Number of Faulty Processors. STACS 1992: 339-350
1991
12EEBirgit Pfitzmann, Michael Waidner: How To Break and Repair A "Provably Secure" Untraceable Payment System. CRYPTO 1991: 338-350
11EEDavid Chaum, Eugène van Heijst, Birgit Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. CRYPTO 1991: 470-484
10 Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Kommunikation in Verteilten Systemen 1991: 451-463
9 Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement with Good Majority. STACS 1991: 285-295
8 Birgit Pfitzmann, Michael Waidner: Fail-stop-Signaturen und ihre Anwendung. VIS 1991: 289-301
7 Birgit Pfitzmann, Michael Waidner: Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. VIS 1991: 302-320
6 Dirk Fox, Birgit Pfitzmann: Effiziente Software-Implementierung des GMR-Signatursystems. VIS 1991: 329-345
1990
5EEGerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445
1989
4EEBirgit Pfitzmann, Andreas Pfitzmann: How to Break the Direct RSA-Implementation of Mixes. EUROCRYPT 1989: 373-381
3EEMichael Waidner, Birgit Pfitzmann: The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). EUROCRYPT 1989: 690
1988
2 Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommunikationsnetze. Informatik Spektrum 11(3): 118-142 (1988)
1987
1 Michael Waidner, Birgit Pfitzmann: Verlusttolerante elektronische Brieftaschen. Fehlertolerierende Rechensysteme 1987: 36-50

Coauthor Index

1Carl E. Abrams [88]
2André Adelsbach [39]
3Ammar Alkassar [47]
4Vijayalakshmi Atluri (Vijay Atluri) [72]
5Michael Backes [50] [51] [52] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [69] [70] [71] [73] [74] [75] [78] [80] [81] [82] [83] [84] [86] [87] [90] [91] [92]
6Niko Bari [31]
7David A. Basin [86] [93]
8Birgit Baum-Waidner [9]
9Zinaida Benenson [85]
10Gerrit Bleumer [5]
11Jean-Paul Boly [19]
12Antoon Bosselaers [19]
13David Chaum [11]
14Ronald Cramer [19]
15Ivan Damgård [16] [27] [34] [36]
16Dirk Fox [6]
17Felix C. Freiling (Felix C. Gärtner) [85]
18Alexander Geraldy [47]
19Christopher Giblin [77]
20Oded Goldreich [37]
21Thomas Groß [68] [76] [79]
22Hans-Jürgen Guth [38]
23Eugène van Heijst [11] [15]
24Christian Jacobi [50]
25Juerg von Känel [88]
26Felix Klaedtke [93]
27Gérard Lacoste [45]
28Alice Y. Liu [77]
29Patrick Drew McDaniel (Patrick McDaniel) [72]
30Rolf Michelsen [19]
31Stig Fr. Mjølsnes [19]
32Sebastian Mödersheim [82]
33Frank Muller [19]
34Samuel Müller [77] [88] [93]
35Torben P. Pedersen [15] [16] [19] [26] [27] [34]
36Andreas Pfitzmann [2] [4] [10] [20] [28]
37Ronald L. Rivest [37]
38Christian Rohner [85]
39Peter de Rooij [19]
40Susanne Ruschka-Taylor [88]
41Ahmad-Reza Sadeghi [39] [40] [42] [43] [47] [76] [79]
42Andre Scedrov [90] [91]
43Berry Schoenmakers [19]
44Matthias Schunter [19] [20] [21] [24] [28] [35] [41] [61]
45Christoph Sprenger [86]
46Michael Steiner [45] [52]
47Luc Vallée [19]
48Luca Viganò [82]
49Michael Waidner [1] [2] [3] [5] [7] [8] [9] [10] [12] [13] [14] [19] [20] [21] [28] [29] [30] [32] [33] [35] [41] [44] [45] [46] [49] [52] [53] [55] [57] [60] [62] [63] [64] [67] [69] [70] [73] [74] [83] [84] [85] [86] [87]
50Xin Zhou [77]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)