2007 |
78 | EE | Matthias Schunter,
Michael Waidner:
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.
Privacy Enhancing Technologies 2007: 218-232 |
77 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
The reactive simulatability (RSIM) framework for asynchronous systems.
Inf. Comput. 205(12): 1685-1720 (2007) |
76 | EE | Michael Backes,
David A. Basin,
Michael Waidner:
Preface.
Journal of Computer Security 15(6): 561 (2007) |
2006 |
75 | EE | Christoph Sprenger,
Michael Backes,
David A. Basin,
Birgit Pfitzmann,
Michael Waidner:
Cryptographically Sound Theorem Proving.
CSFW 2006: 153-166 |
74 | EE | Zinaida Benenson,
Felix C. Freiling,
Birgit Pfitzmann,
Christian Rohner,
Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS 2006: 165-178 |
73 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
ESORICS 2006: 404-423 |
72 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Formal Methods and Cryptography.
FM 2006: 612-616 |
2005 |
71 | EE | Vern Paxson,
Michael Waidner:
Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy.
IEEE Trans. Dependable Sec. Comput. 2(2): 81 (2005) |
70 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library.
Int. J. Inf. Sec. 4(3): 135-154 (2005) |
69 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Reactively secure signature schemes.
Int. J. Inf. Sec. 4(4): 242-252 (2005) |
2004 |
68 | | Vijayalakshmi Atluri,
Michael Backes,
David A. Basin,
Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004
ACM 2004 |
67 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks.
FOSAD 2004: 1-41 |
66 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Low-Level Ideal Signatures and General Integrity Idealization.
ISC 2004: 39-51 |
65 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
A General Composition Theorem for Secure Reactive Systems.
TCC 2004: 336-354 |
64 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Privacy-enabled Management of Customer Data.
IEEE Data Eng. Bull. 27(1): 3-9 (2004) |
63 | EE | Michael Waidner:
Preface.
Int. J. Inf. Sec. 3(1): 1 (2004) |
62 | | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Polynomial liveness.
Journal of Computer Security 12(3-4): 589-617 (2004) |
2003 |
61 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
A composable cryptographic library with nested operations.
ACM Conference on Computer and Communications Security 2003: 220-230 |
60 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Security in Business Process Engineering.
Business Process Management 2003: 168-183 |
59 | EE | Günter Karjoth,
Matthias Schunter,
Els Van Herreweghen,
Michael Waidner:
Amending P3P for Clearer Privacy Promises.
DEXA Workshops 2003: 445-449 |
58 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Symmetric Authentication within a Simulatable Cryptographic Library.
ESORICS 2003: 271-290 |
57 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Waidner:
Reactively Secure Signature Schemes.
ISC 2003: 84-95 |
56 | EE | Birgit Pfitzmann,
Michael Waidner:
Federated Identity-Management Protocols.
Security Protocols Workshop 2003: 153-174 |
55 | EE | Birgit Pfitzmann,
Michael Waidner:
Analysis of Liberty Single-Sign-on with Enabled Clients.
IEEE Internet Computing 7(6): 38-44 (2003) |
2002 |
54 | | Dieter Gollmann,
Günter Karjoth,
Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings
Springer 2002 |
53 | EE | Michael Backes,
Birgit Pfitzmann,
Michael Steiner,
Michael Waidner:
Polynomial Fairness and Liveness.
CSFW 2002: 160-174 |
52 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Privacy-Enabled Services for Enterprises.
DEXA Workshops 2002: 483-487 |
51 | EE | Günter Karjoth,
Matthias Schunter,
Michael Waidner:
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Privacy Enhancing Technologies 2002: 69-84 |
50 | EE | Birgit Pfitzmann,
Michael Waidner:
Privacy in browser-based attribute exchange.
WPES 2002: 52-62 |
2001 |
49 | EE | Andre Scedrov,
Ran Canetti,
Joshua D. Guttman,
David Wagner,
Michael Waidner:
Relating Cryptography and Cryptographic Protocols.
CSFW 2001: 111-114 |
48 | EE | Birgit Pfitzmann,
Michael Waidner:
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IEEE Symposium on Security and Privacy 2001: 184- |
47 | EE | Michael Steiner,
Peter Buhler,
Thomas Eirich,
Michael Waidner:
Secure password-based cipher suite for TLS.
ACM Trans. Inf. Syst. Secur. 4(2): 134-157 (2001) |
2000 |
46 | | Gérard Lacoste,
Birgit Pfitzmann,
Michael Steiner,
Michael Waidner:
SEMPER - Secure Electronic Marketplace for Europe
Springer 2000 |
45 | | Frédéric Cuppens,
Yves Deswarte,
Dieter Gollmann,
Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings
Springer 2000 |
44 | EE | Birgit Pfitzmann,
Michael Waidner:
Composition and integrity preservation of secure reactive systems.
ACM Conference on Computer and Communications Security 2000: 245-254 |
43 | EE | Birgit Baum-Waidner,
Michael Waidner:
Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing.
ICALP 2000: 524-535 |
42 | EE | Peter Buhler,
Thomas Eirich,
Michael Waidner,
Michael Steiner:
Secure Password-Based Cipher Suite for TLS.
NDSS 2000 |
41 | | N. Asokan,
Philippe A. Janson,
Michael Steiner,
Michael Waidner:
State of the art in electronic payment systems.
Advances in Computers 53: 426-451 (2000) |
40 | EE | Simon Field,
Michael Waidner:
Electronic Commerce.
Computer Networks 32(6): 667-668 (2000) |
39 | EE | Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Cryptographic Security of Reactive Systems.
Electr. Notes Theor. Comput. Sci. 32: (2000) |
38 | EE | Michael Steiner,
Gene Tsudik,
Michael Waidner:
Key Agreement in Dynamic Peer Groups.
IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000) |
1999 |
37 | EE | N. Asokan,
Hervé Debar,
Michael Steiner,
Michael Waidner:
Authenticating public terminals.
Computer Networks 31(8): 861-870 (1999) |
36 | | Matthias Schunter,
Michael Waidner,
Dale Whinnett:
The SEMPER Framework for Secure Electronic Commerce.
Wirtschaftsinformatik 41(3): 238-247 (1999) |
1998 |
35 | EE | N. Asokan,
Victor Shoup,
Michael Waidner:
Optimistic Fair Exchange of Digital Signatures (Extended Abstract).
EUROCRYPT 1998: 591-606 |
34 | EE | Michael Steiner,
Gene Tsudik,
Michael Waidner:
CLIQUES: A New Approach to Group Key Agreement.
ICDCS 1998: 380-387 |
33 | EE | N. Asokan,
Victor Shoup,
Michael Waidner:
Asynchronous Protocols for Optimistic Fair Exchange.
IEEE Symposium on Security and Privacy 1998: 86-99 |
32 | EE | Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Optimal Efficiency of Optimistic Contract Signing.
PODC 1998: 113-122 |
31 | EE | Matthias Schunter,
Michael Waidner,
Dale Whinnett:
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
Computer Networks 30(16-18): 1501-1510 (1998) |
30 | | José L. Abad Peiro,
N. Asokan,
Michael Steiner,
Michael Waidner:
Designing a Generic Payment Service.
IBM Systems Journal 37(1): 72-88 (1998) |
29 | | Birgit Pfitzmann,
Michael Waidner:
How to Break Fraud-Detectable Key Recovery.
Operating Systems Review 32(1): 23-28 (1998) |
1997 |
28 | EE | Birgit Pfitzmann,
Michael Waidner:
Asymmetric Fingerprinting for Larger Collusions.
ACM Conference on Computer and Communications Security 1997: 151-160 |
27 | EE | N. Asokan,
Matthias Schunter,
Michael Waidner:
Optimistic Protocols for Fair Exchange.
ACM Conference on Computer and Communications Security 1997: 7-17 |
26 | EE | Birgit Pfitzmann,
Michael Waidner:
Anonymous Fingerprinting.
EUROCRYPT 1997: 88-102 |
25 | EE | Birgit Pfitzmann,
Michael Waidner:
Strong Loss Tolerance of Electronic Coin Systems.
ACM Trans. Comput. Syst. 15(2): 194-213 (1997) |
24 | | Andreas Pfitzmann,
Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Trusting Mobile User Devices and Security Modules.
IEEE Computer 30(2): 61-68 (1997) |
23 | | N. Asokan,
Philippe A. Janson,
Michael Steiner,
Michael Waidner:
The State of the Art in Electronic Payment Systems.
IEEE Computer 30(9): 28-35 (1997) |
22 | | N. Asokan,
Gene Tsudik,
Michael Waidner:
Server-Supported Signatures.
Journal of Computer Security 5(1): 91-108 (1997) |
1996 |
21 | EE | Michael Steiner,
Gene Tsudik,
Michael Waidner:
Diffie-Hellman Key Distribution Extended to Group Communication.
ACM Conference on Computer and Communications Security 1996: 31-37 |
20 | EE | Michael Waidner:
Development of a Secure Electronic Marketplace for Europe.
ESORICS 1996: 1-14 |
19 | EE | N. Asokan,
Gene Tsudik,
Michael Waidner:
Server-Supported Signatures.
ESORICS 1996: 131-143 |
1995 |
18 | EE | Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
How to Break Another Provably Secure Payment System.
EUROCRYPT 1995: 121-132 |
17 | | Andreas Pfitzmann,
Birgit Pfitzmann,
Matthias Schunter,
Michael Waidner:
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
VIS 1995: 329- |
16 | | Michael Steiner,
Gene Tsudik,
Michael Waidner:
Refinement and Extension of Encrypted Key Exchange.
Operating Systems Review 29(3): 22-30 (1995) |
1994 |
15 | EE | Jean-Paul Boly,
Antoon Bosselaers,
Ronald Cramer,
Rolf Michelsen,
Stig Fr. Mjølsnes,
Frank Muller,
Torben P. Pedersen,
Birgit Pfitzmann,
Peter de Rooij,
Berry Schoenmakers,
Matthias Schunter,
Luc Vallée,
Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems.
ESORICS 1994: 217-230 |
1992 |
14 | EE | Birgit Pfitzmann,
Michael Waidner:
Attacks on Protocols for Server-Aided RSA Computation.
EUROCRYPT 1992: 153-162 |
13 | | Birgit Pfitzmann,
Michael Waidner:
Unconditional Byzantine Agreement for any Number of Faulty Processors.
STACS 1992: 339-350 |
1991 |
12 | EE | Birgit Pfitzmann,
Michael Waidner:
How To Break and Repair A "Provably Secure" Untraceable Payment System.
CRYPTO 1991: 338-350 |
11 | | Andreas Pfitzmann,
Birgit Pfitzmann,
Michael Waidner:
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead.
Kommunikation in Verteilten Systemen 1991: 451-463 |
10 | | Birgit Baum-Waidner,
Birgit Pfitzmann,
Michael Waidner:
Unconditional Byzantine Agreement with Good Majority.
STACS 1991: 285-295 |
9 | | Birgit Pfitzmann,
Michael Waidner:
Fail-stop-Signaturen und ihre Anwendung.
VIS 1991: 289-301 |
8 | | Birgit Pfitzmann,
Michael Waidner:
Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit.
VIS 1991: 302-320 |
1990 |
7 | EE | Gerrit Bleumer,
Birgit Pfitzmann,
Michael Waidner:
A Remark on a Signature Scheme Where Forgery Can Be Proved.
EUROCRYPT 1990: 441-445 |
1989 |
6 | EE | Michael Waidner:
Unconditional Sender and Recipient Untraceability in Spite of Active Attacks.
EUROCRYPT 1989: 302-319 |
5 | EE | Michael Waidner,
Birgit Pfitzmann:
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).
EUROCRYPT 1989: 690 |
1988 |
4 | | Andreas Pfitzmann,
Birgit Pfitzmann,
Michael Waidner:
Datenschutz garantierende offene Kommunikationsnetze.
Informatik Spektrum 11(3): 118-142 (1988) |
1987 |
3 | | Michael Waidner,
Birgit Pfitzmann:
Verlusttolerante elektronische Brieftaschen.
Fehlertolerierende Rechensysteme 1987: 36-50 |
1985 |
2 | | Michael Waidner,
Andreas Pfitzmann:
Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen.
Datenschutz und Datensicherung 1985: 128-141 |
1 | EE | Andreas Pfitzmann,
Michael Waidner:
Networks Without User Observability: Design Options.
EUROCRYPT 1985: 245-253 |