dblp.uni-trier.dewww.uni-trier.de

Michael Waidner

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
78EEMatthias Schunter, Michael Waidner: Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232
77EEMichael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007)
76EEMichael Backes, David A. Basin, Michael Waidner: Preface. Journal of Computer Security 15(6): 561 (2007)
2006
75EEChristoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. CSFW 2006: 153-166
74EEZinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner: Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178
73EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423
72EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography. FM 2006: 612-616
2005
71EEVern Paxson, Michael Waidner: Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Sec. Comput. 2(2): 81 (2005)
70EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005)
69EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005)
2004
68 Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004 ACM 2004
67EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41
66EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51
65EEMichael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354
64EEGünter Karjoth, Matthias Schunter, Michael Waidner: Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004)
63EEMichael Waidner: Preface. Int. J. Inf. Sec. 3(1): 1 (2004)
62 Michael Backes, Birgit Pfitzmann, Michael Waidner: Polynomial liveness. Journal of Computer Security 12(3-4): 589-617 (2004)
2003
61EEMichael Backes, Birgit Pfitzmann, Michael Waidner: A composable cryptographic library with nested operations. ACM Conference on Computer and Communications Security 2003: 220-230
60EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering. Business Process Management 2003: 168-183
59EEGünter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner: Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449
58EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290
57EEMichael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes. ISC 2003: 84-95
56EEBirgit Pfitzmann, Michael Waidner: Federated Identity-Management Protocols. Security Protocols Workshop 2003: 153-174
55EEBirgit Pfitzmann, Michael Waidner: Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Computing 7(6): 38-44 (2003)
2002
54 Dieter Gollmann, Günter Karjoth, Michael Waidner: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings Springer 2002
53EEMichael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness. CSFW 2002: 160-174
52EEGünter Karjoth, Matthias Schunter, Michael Waidner: Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487
51EEGünter Karjoth, Matthias Schunter, Michael Waidner: Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84
50EEBirgit Pfitzmann, Michael Waidner: Privacy in browser-based attribute exchange. WPES 2002: 52-62
2001
49EEAndre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner: Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114
48EEBirgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. IEEE Symposium on Security and Privacy 2001: 184-
47EEMichael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner: Secure password-based cipher suite for TLS. ACM Trans. Inf. Syst. Secur. 4(2): 134-157 (2001)
2000
46 Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner: SEMPER - Secure Electronic Marketplace for Europe Springer 2000
45 Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000
44EEBirgit Pfitzmann, Michael Waidner: Composition and integrity preservation of secure reactive systems. ACM Conference on Computer and Communications Security 2000: 245-254
43EEBirgit Baum-Waidner, Michael Waidner: Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. ICALP 2000: 524-535
42EEPeter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner: Secure Password-Based Cipher Suite for TLS. NDSS 2000
41 N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: State of the art in electronic payment systems. Advances in Computers 53: 426-451 (2000)
40EESimon Field, Michael Waidner: Electronic Commerce. Computer Networks 32(6): 667-668 (2000)
39EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems. Electr. Notes Theor. Comput. Sci. 32: (2000)
38EEMichael Steiner, Gene Tsudik, Michael Waidner: Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000)
1999
37EEN. Asokan, Hervé Debar, Michael Steiner, Michael Waidner: Authenticating public terminals. Computer Networks 31(8): 861-870 (1999)
36 Matthias Schunter, Michael Waidner, Dale Whinnett: The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinformatik 41(3): 238-247 (1999)
1998
35EEN. Asokan, Victor Shoup, Michael Waidner: Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606
34EEMichael Steiner, Gene Tsudik, Michael Waidner: CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387
33EEN. Asokan, Victor Shoup, Michael Waidner: Asynchronous Protocols for Optimistic Fair Exchange. IEEE Symposium on Security and Privacy 1998: 86-99
32EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122
31EEMatthias Schunter, Michael Waidner, Dale Whinnett: A Status Report on the SEMPER Framework for Secure Electronic Commerce. Computer Networks 30(16-18): 1501-1510 (1998)
30 José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner: Designing a Generic Payment Service. IBM Systems Journal 37(1): 72-88 (1998)
29 Birgit Pfitzmann, Michael Waidner: How to Break Fraud-Detectable Key Recovery. Operating Systems Review 32(1): 23-28 (1998)
1997
28EEBirgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions. ACM Conference on Computer and Communications Security 1997: 151-160
27EEN. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange. ACM Conference on Computer and Communications Security 1997: 7-17
26EEBirgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting. EUROCRYPT 1997: 88-102
25EEBirgit Pfitzmann, Michael Waidner: Strong Loss Tolerance of Electronic Coin Systems. ACM Trans. Comput. Syst. 15(2): 194-213 (1997)
24 Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules. IEEE Computer 30(2): 61-68 (1997)
23 N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: The State of the Art in Electronic Payment Systems. IEEE Computer 30(9): 28-35 (1997)
22 N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997)
1996
21EEMichael Steiner, Gene Tsudik, Michael Waidner: Diffie-Hellman Key Distribution Extended to Group Communication. ACM Conference on Computer and Communications Security 1996: 31-37
20EEMichael Waidner: Development of a Secure Electronic Marketplace for Europe. ESORICS 1996: 1-14
19EEN. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143
1995
18EEBirgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132
17 Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329-
16 Michael Steiner, Gene Tsudik, Michael Waidner: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29(3): 22-30 (1995)
1994
15EEJean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner: The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230
1992
14EEBirgit Pfitzmann, Michael Waidner: Attacks on Protocols for Server-Aided RSA Computation. EUROCRYPT 1992: 153-162
13 Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement for any Number of Faulty Processors. STACS 1992: 339-350
1991
12EEBirgit Pfitzmann, Michael Waidner: How To Break and Repair A "Provably Secure" Untraceable Payment System. CRYPTO 1991: 338-350
11 Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Kommunikation in Verteilten Systemen 1991: 451-463
10 Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement with Good Majority. STACS 1991: 285-295
9 Birgit Pfitzmann, Michael Waidner: Fail-stop-Signaturen und ihre Anwendung. VIS 1991: 289-301
8 Birgit Pfitzmann, Michael Waidner: Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. VIS 1991: 302-320
1990
7EEGerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445
1989
6EEMichael Waidner: Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. EUROCRYPT 1989: 302-319
5EEMichael Waidner, Birgit Pfitzmann: The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). EUROCRYPT 1989: 690
1988
4 Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommunikationsnetze. Informatik Spektrum 11(3): 118-142 (1988)
1987
3 Michael Waidner, Birgit Pfitzmann: Verlusttolerante elektronische Brieftaschen. Fehlertolerierende Rechensysteme 1987: 36-50
1985
2 Michael Waidner, Andreas Pfitzmann: Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen. Datenschutz und Datensicherung 1985: 128-141
1EEAndreas Pfitzmann, Michael Waidner: Networks Without User Observability: Design Options. EUROCRYPT 1985: 245-253

Coauthor Index

1N. Asokan [19] [22] [23] [27] [30] [33] [35] [37] [41]
2Vijayalakshmi Atluri (Vijay Atluri) [68]
3Michael Backes [53] [57] [58] [60] [61] [62] [65] [66] [67] [68] [69] [70] [72] [73] [75] [76] [77]
4David A. Basin [68] [75] [76]
5Birgit Baum-Waidner [10] [43]
6Zinaida Benenson [74]
7Gerrit Bleumer [7]
8Jean-Paul Boly [15]
9Antoon Bosselaers [15]
10Peter Buhler [42] [47]
11Ran Canetti [49]
12Ronald Cramer [15]
13Frédéric Cuppens [45]
14Hervé Debar [37]
15Yves Deswarte [45]
16Thomas Eirich [42] [47]
17Simon Field [40]
18Felix C. Freiling (Felix C. Gärtner) [74]
19Dieter Gollmann [45] [54]
20Joshua D. Guttman [49]
21Els Van Herreweghen [59]
22Philippe A. Janson [23] [41]
23Günter Karjoth [51] [52] [54] [59] [64]
24Gérard Lacoste [46]
25Rolf Michelsen [15]
26Stig Fr. Mjølsnes [15]
27Frank Muller [15]
28Vern Paxson [71]
29Torben P. Pedersen [15]
30José L. Abad Peiro [30]
31Andreas Pfitzmann [1] [2] [4] [11] [17] [24]
32Birgit Pfitzmann [3] [4] [5] [7] [8] [9] [10] [11] [12] [13] [14] [15] [17] [18] [24] [25] [26] [28] [29] [32] [39] [44] [46] [48] [50] [53] [55] [56] [57] [58] [60] [61] [62] [65] [66] [67] [69] [70] [72] [73] [74] [75] [77]
33Christian Rohner [74]
34Peter de Rooij [15]
35Andre Scedrov [49]
36Berry Schoenmakers [15]
37Matthias Schunter [15] [17] [18] [24] [27] [31] [32] [36] [39] [51] [52] [59] [64] [78]
38Victor Shoup [33] [35]
39Christoph Sprenger [75]
40Michael Steiner [16] [21] [23] [30] [34] [37] [38] [41] [42] [46] [47] [53]
41Gene Tsudik [16] [19] [21] [22] [34] [38]
42Luc Vallée [15]
43David Wagner [49]
44Dale Whinnett [31] [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)