2007 | ||
---|---|---|
78 | EE | Matthias Schunter, Michael Waidner: Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232 |
77 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007) |
76 | EE | Michael Backes, David A. Basin, Michael Waidner: Preface. Journal of Computer Security 15(6): 561 (2007) |
2006 | ||
75 | EE | Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 |
74 | EE | Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner: Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 |
73 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423 |
72 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography. FM 2006: 612-616 |
2005 | ||
71 | EE | Vern Paxson, Michael Waidner: Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Sec. Comput. 2(2): 81 (2005) |
70 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005) |
69 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005) |
2004 | ||
68 | Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004 ACM 2004 | |
67 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41 |
66 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51 |
65 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354 |
64 | EE | Günter Karjoth, Matthias Schunter, Michael Waidner: Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004) |
63 | EE | Michael Waidner: Preface. Int. J. Inf. Sec. 3(1): 1 (2004) |
62 | Michael Backes, Birgit Pfitzmann, Michael Waidner: Polynomial liveness. Journal of Computer Security 12(3-4): 589-617 (2004) | |
2003 | ||
61 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: A composable cryptographic library with nested operations. ACM Conference on Computer and Communications Security 2003: 220-230 |
60 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering. Business Process Management 2003: 168-183 |
59 | EE | Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner: Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449 |
58 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290 |
57 | EE | Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes. ISC 2003: 84-95 |
56 | EE | Birgit Pfitzmann, Michael Waidner: Federated Identity-Management Protocols. Security Protocols Workshop 2003: 153-174 |
55 | EE | Birgit Pfitzmann, Michael Waidner: Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Computing 7(6): 38-44 (2003) |
2002 | ||
54 | Dieter Gollmann, Günter Karjoth, Michael Waidner: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings Springer 2002 | |
53 | EE | Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness. CSFW 2002: 160-174 |
52 | EE | Günter Karjoth, Matthias Schunter, Michael Waidner: Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487 |
51 | EE | Günter Karjoth, Matthias Schunter, Michael Waidner: Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84 |
50 | EE | Birgit Pfitzmann, Michael Waidner: Privacy in browser-based attribute exchange. WPES 2002: 52-62 |
2001 | ||
49 | EE | Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner: Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114 |
48 | EE | Birgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. IEEE Symposium on Security and Privacy 2001: 184- |
47 | EE | Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner: Secure password-based cipher suite for TLS. ACM Trans. Inf. Syst. Secur. 4(2): 134-157 (2001) |
2000 | ||
46 | Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner: SEMPER - Secure Electronic Marketplace for Europe Springer 2000 | |
45 | Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000 | |
44 | EE | Birgit Pfitzmann, Michael Waidner: Composition and integrity preservation of secure reactive systems. ACM Conference on Computer and Communications Security 2000: 245-254 |
43 | EE | Birgit Baum-Waidner, Michael Waidner: Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. ICALP 2000: 524-535 |
42 | EE | Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner: Secure Password-Based Cipher Suite for TLS. NDSS 2000 |
41 | N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: State of the art in electronic payment systems. Advances in Computers 53: 426-451 (2000) | |
40 | EE | Simon Field, Michael Waidner: Electronic Commerce. Computer Networks 32(6): 667-668 (2000) |
39 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems. Electr. Notes Theor. Comput. Sci. 32: (2000) |
38 | EE | Michael Steiner, Gene Tsudik, Michael Waidner: Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000) |
1999 | ||
37 | EE | N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner: Authenticating public terminals. Computer Networks 31(8): 861-870 (1999) |
36 | Matthias Schunter, Michael Waidner, Dale Whinnett: The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinformatik 41(3): 238-247 (1999) | |
1998 | ||
35 | EE | N. Asokan, Victor Shoup, Michael Waidner: Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606 |
34 | EE | Michael Steiner, Gene Tsudik, Michael Waidner: CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387 |
33 | EE | N. Asokan, Victor Shoup, Michael Waidner: Asynchronous Protocols for Optimistic Fair Exchange. IEEE Symposium on Security and Privacy 1998: 86-99 |
32 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122 |
31 | EE | Matthias Schunter, Michael Waidner, Dale Whinnett: A Status Report on the SEMPER Framework for Secure Electronic Commerce. Computer Networks 30(16-18): 1501-1510 (1998) |
30 | José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner: Designing a Generic Payment Service. IBM Systems Journal 37(1): 72-88 (1998) | |
29 | Birgit Pfitzmann, Michael Waidner: How to Break Fraud-Detectable Key Recovery. Operating Systems Review 32(1): 23-28 (1998) | |
1997 | ||
28 | EE | Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions. ACM Conference on Computer and Communications Security 1997: 151-160 |
27 | EE | N. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange. ACM Conference on Computer and Communications Security 1997: 7-17 |
26 | EE | Birgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting. EUROCRYPT 1997: 88-102 |
25 | EE | Birgit Pfitzmann, Michael Waidner: Strong Loss Tolerance of Electronic Coin Systems. ACM Trans. Comput. Syst. 15(2): 194-213 (1997) |
24 | Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules. IEEE Computer 30(2): 61-68 (1997) | |
23 | N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: The State of the Art in Electronic Payment Systems. IEEE Computer 30(9): 28-35 (1997) | |
22 | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997) | |
1996 | ||
21 | EE | Michael Steiner, Gene Tsudik, Michael Waidner: Diffie-Hellman Key Distribution Extended to Group Communication. ACM Conference on Computer and Communications Security 1996: 31-37 |
20 | EE | Michael Waidner: Development of a Secure Electronic Marketplace for Europe. ESORICS 1996: 1-14 |
19 | EE | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143 |
1995 | ||
18 | EE | Birgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132 |
17 | Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329- | |
16 | Michael Steiner, Gene Tsudik, Michael Waidner: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29(3): 22-30 (1995) | |
1994 | ||
15 | EE | Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner: The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230 |
1992 | ||
14 | EE | Birgit Pfitzmann, Michael Waidner: Attacks on Protocols for Server-Aided RSA Computation. EUROCRYPT 1992: 153-162 |
13 | Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement for any Number of Faulty Processors. STACS 1992: 339-350 | |
1991 | ||
12 | EE | Birgit Pfitzmann, Michael Waidner: How To Break and Repair A "Provably Secure" Untraceable Payment System. CRYPTO 1991: 338-350 |
11 | Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Kommunikation in Verteilten Systemen 1991: 451-463 | |
10 | Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement with Good Majority. STACS 1991: 285-295 | |
9 | Birgit Pfitzmann, Michael Waidner: Fail-stop-Signaturen und ihre Anwendung. VIS 1991: 289-301 | |
8 | Birgit Pfitzmann, Michael Waidner: Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. VIS 1991: 302-320 | |
1990 | ||
7 | EE | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445 |
1989 | ||
6 | EE | Michael Waidner: Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. EUROCRYPT 1989: 302-319 |
5 | EE | Michael Waidner, Birgit Pfitzmann: The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). EUROCRYPT 1989: 690 |
1988 | ||
4 | Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommunikationsnetze. Informatik Spektrum 11(3): 118-142 (1988) | |
1987 | ||
3 | Michael Waidner, Birgit Pfitzmann: Verlusttolerante elektronische Brieftaschen. Fehlertolerierende Rechensysteme 1987: 36-50 | |
1985 | ||
2 | Michael Waidner, Andreas Pfitzmann: Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen. Datenschutz und Datensicherung 1985: 128-141 | |
1 | EE | Andreas Pfitzmann, Michael Waidner: Networks Without User Observability: Design Options. EUROCRYPT 1985: 245-253 |