TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | O | P | R | S | T | U | W | Z | Á
Number of items at this level: 235.

A

Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]

Adler, Steven and Brown, Nigel and Gilbert, Art and Palmer, Charles and Schnyder, Michael and Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Atluri, Vijayalakshmi and Backes, Michael and Basin, David and Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE, ACM, [Conference or Workshop Item]

Adler, Steven and Bangerter, Endre and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Karjoth, Günter and Kesdogan, Dogan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Presler-Marshall, Martin and Schnyder, Michael and Herreweghen, Els Van and Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Adler, Steven and Bangerter, Endre and Bohrer, Kathy and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Kesdogan, Dogan and Leonard, Matthew and Liu, Xuan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Powers, Calvin and Schnyder, Michael and Schonberg, Edith and Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

B

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Borgwart, Andreas and Shulman, Haya and Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Borgwart, Andreas and Boukoros, Spyros and Shulman, Haya and Waidner, Michael and van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Baum-Waidner, Birgit and Kenyon, Christopher and Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, pp. 1685--1720, 205, (12), [Article]

Backes, Michael and Basin, David and Waidner, Michael (2007):
Preface.
In: Journal of Computer Security, p. 561, 15, (6), [Article]

Backes, Michael and Karjoth, Günter and Pitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
[Standards, patents]

Benenson, Zinaida and Freiling, Felix and Pfitzmann, Birgit and Rohner, Christian and Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006), [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Bangerter, Endre Felix and Camenisch, Jan and Schunter, Matthias and Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
[Standards, patents]

Backes, Michael and Karioth, Guenter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
[Standards, patents]

Bussani, Anthony and Griffin, John Linwood and Jansen, Bernhard and Julisch, Klaus and Karjoth, Günter and Maruyama, Hiroshi and Nakamura, Megumi and Perez, Ronald and Schunter, Matthias and Tanner, Axel and Doorn, Leendert Van and Herreweghen, Els Van and Waidner, Michael and Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD), Springer-Verlag, Berlin, [Conference or Workshop Item]

Bangerter, Endre and Schunter, Matthias and Waidner, Michael and Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, pp. 135--154, 4, (3), [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), pp. 242--252, 4, (4), [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC), [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), pp. 589--617, 12, (3-4), [Article]

Betz, Linda and Dayka, John and Farrell, Walter and Guski, Richard and Karjoth, Günter and Nelson, Mark and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, [Conference or Workshop Item]

Baum-Waidner, Birgit and Waidner, Michael (2000):
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
In: 27th International Colloquium on Automata, Languages and Programming (ICALP' 2000), Springer-Verlag, Berlin, [Conference or Workshop Item]

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Herreweghen, Els Van and Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, pp. 611--627, 18, (4), [Article]

Buhler, Peter and Eirich, Thomas and Steiner, Michael and Waidner, Michael (2000):
Secure Password-based Cipher Suite for TLS.
In: Symposium on Network and Distributed Systems Security (NDSS '00), CA, Internet Society, [Conference or Workshop Item]

Baum-Waidner, Birgit and Waidner, Michael (1998):
Optimistic Asynchronous Multi-Party Contract Signing.
[Report]

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX Workshop on Electronic Commerce, [Conference or Workshop Item]

Boly, Jean-Paul and Bosselaers, Antoon and Cramer, Ronald and Michelsen, Rolf and Mjolsnes, Stig and Muller, Frank and Pedersen, Torben and Pfitzmann, Birgit and de Rooij, Peter and Schoenmakers, Berry and Schunter, Matthias and Vallée, Luc and Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, Springer-Verlag, Berlin, [Conference or Workshop Item]

Bleumer, Gerrit and Pfitzmann, Birgit and Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, Springer-Verlag, Berlin, [Conference or Workshop Item]

Baum-Waidner, Birgit and Pfitzmann, Birgit and Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, Springer-Verlag, Heidelberg, [Conference or Workshop Item]

C

Cohen, Avichai and Gilad, Yossi and Herzberg, Amir and Schapira, Michael and Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS), San Diego, CA, USA, [Conference or Workshop Item]

Canova, Gamze (2011):
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
TU Darmstadt, [Master Thesis]

Camenisch, Jan and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2011):
Reducing access to sensitive information.
[Standards, patents]

Camenisch, Jan and Waidner, Michael (2004):
Minimizing information gathered by access decision engines in access control systems.
[Standards, patents]

Camenisch, Jan and Herreweghen, Els Van and Waidner, Michael (2003):
Anonymous Access to a Service.
[Standards, patents]

Camenisch, Jan and Waidner, Michael (2001):
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9, [Article]

Carter, Bob and Pfitzmann, Birgit and Schunter, Matthias and Stanford, Chris and Waidner, Michael and Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

D

Demir, Kubilay (2017):
A Secure and Reliable Communication Platform for the Smart Grid.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7147],
[Ph.D. Thesis]

Dai, Tianxiang and Shulman, Haya and Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: Cryptology and Network Security. CANS 2016, Springer, Cham, Milano, Italy, In: vol 10052, [Conference or Workshop Item]

E

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

Eu, Joy Boy Joy (2001):
Specification of Dependable Trusted Third Parties.
[Report]

F

Fischlin, Marc and Herzberg, Amir and Noon, Hon Bin and Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, [Conference or Workshop Item]

Feldmann, Anja and Heyder, Philipp and Kreutzer, Michael and Schmid, Stefan and Seifert, Jean-Pierre and Shulman, Haya and Thimmaraju, Kashyap and Waidner, Michael and Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops, Toulouse, France, [Conference or Workshop Item]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

Federrath, Hannes and Hansen, Marit and Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, pp. 5--7, 53, (1), [Article]

Fischer-Hübner, Simone and Hoofnagle, Chris and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061, Dagstuhl Reports, [Conference or Workshop Item]

Fischer-Hübner, Simone and Hoofnagle, Chris Jay and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, pp. 1--15, 1, (2), [Article]

Field, Simon and Waidner, Michael (2000):
Electronic Commerce.
In: Computer Networks, pp. 667--668, 32, (6), [Article]

G

Göhring, Matthias and Shulman, Haya and Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Conference or Workshop Item]

Ghiglieri, Marco (2017):
Smart TV Privacy Risks and Protection Measures.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6187],
[Ph.D. Thesis]

Ghiglieri, Marco and Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference or Workshop Item]

Ghiglieri, Marco and Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, pp. pp. 61-67, vol. 14, no., (IEEE 14/3), [Article]

Ghiglieri, Marco and Hansen, Marit and Nebel, Maxi and Pörschke, Julia Victoria and Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, In: Weiterdenken, [Conference or Workshop Item]

Ghiglieri, Marco and Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress, [Conference or Workshop Item]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC, Las Vegas, NV, [Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto and Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 11/2014, [Conference or Workshop Item]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
San Jose, California, [Other]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco and Stopczynski, Martin and Waidner, Michael (2014):
Personal DLP for Facebook.
In: Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, Budapest, Hungary, In: 6, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco and Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik
Schiele, Otto and Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 10/2013, [Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco and Kalabis, Lukas and Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco and Simo, Hervais and Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Ghiglieri, Marco and Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
(TUD-KE-2009-05), [Report]

H

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW), Vienna, Austria, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, pp. 80-84, (19), [Article]

Herzberg, Amir and Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, In: ACSAC, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC), ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014, Berlin, Germany, [Conference or Workshop Item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
TU Darmstadt, [Master Thesis]

Hahn, Timothy and Palmer, Bernard and Waidner, Michael and Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
[Standards, patents]

Hahn, Timothy and Waidner, Michael and Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
[Standards, patents]

Hansen, Marit and Berlich, Peter and Camenisch, Jan and Clauß, Sebastian and Pfitzmann, Andreas and Waidner, Michael (2004):
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, pp. 35--44, 9, (1), [Article]

Hauser, Ralf and Steiner, Michael and Waidner, Michael (1996):
Micro-payments based on iKP.
In: SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection, [Conference or Workshop Item]

J

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Jerichow, Anja and Müller, Jan and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1998):
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, pp. 495--509, April, Special Issue "Cop, [Article]

Janson, Phil and Waidner, Michael (1996):
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, pp. 10--15, 20, (6), [Article]

K

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, [Conference or Workshop Item]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, [Conference or Workshop Item]

Kulyk, Oksana (2017):
Extending the Helios Internet Voting Scheme Towards New Election Settings.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6211],
[Ph.D. Thesis]

Krauß, Christoph and Waidner, Michael (2015):
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, pp. 383-387, 39(6), [Article]

Kalabis, Lukas and Wolf, Ruben and Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, pp. 512-516, 37, (8), DOI: 10.1007/s11623-013-0209-8,
[Article]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master Thesis]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Kalabis, Lukas and Selzer, Annika (2012):
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, pp. 670--675, 36, (9), DOI: 10.1007/s11623-012-0224-1,
[Article]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, Springer-Verlag, Berlin, [Conference or Workshop Item]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2004):
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, pp. 3--9, 27, (1), [Article]

Karjoth, Günter and Waidner, Michael (2004):
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, pp. 18--21, 4, (1), [Article]

Karjoth, Günter and Schunter, Matthias and Herreweghen, Els Van and Waidner, Michael (2003):
Amending P3P for Clearer Privacy Promises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)), [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
In: Workshop on Privacy Enhancing Technologies, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), Aix-en-Provence, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
[Report]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2001):
Unternehmensweites Datenschutzmanagement.
In: Datenschutz Sommerakademie 2001, Datenschuts als Wettbewerbsvorteil, Vieweg Verlag, [Conference or Workshop Item]

Keller, Ludwig and Kottmann, Dietmar and Waidner, Michael (1994):
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.
[Report]

L

Lacoste, Gérard and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2000):
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag, [Book]

Lacoste, Gérard and Waidner, Michael (2000):
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press, pp. 147--157, [Article]

Lukat, Jörg and Pfitzmann, Andreas and Waidner, Michael (1991):
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, pp. 71--75, 15, (2), [Article]

M

Mitev, Richard and Miettinen, Markus and Sadeghi, Ahmad-Reza (2019):
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
ACM, In: ASIACCS 2019, Auckland, New Zealand, Juli 2019, DOI: 10.1145/3321705.3329842,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8689],
[Conference or Workshop Item]

Müller, Jan (2014):
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
TU Darmstadt, [Master Thesis]

Milman, Ivan and Wolfson, Charles and Schunter, Matthias and Hinton, Heather and Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
[Standards, patents]

O

Oswald, Florian (2014):
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt, [Master Thesis]

Oswald, Florian (2012):
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt, [Master Thesis]

Ort, Andreas and Assmann, Ralf and Bleumer, Gerrit and Böttger, Manfred and Fox, Dirk and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1992):
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, pp. 571--579, 16, (11), [Article]

P

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS: colors for privacy settings.
In: Proceedings of the 21st international conference companion on World Wide Web, ACM, Lyon, France, WWW '12 Companion, ISBN 978-1-4503-1230-1,
DOI: 10.1145/2187980.2188139,
[Conference or Workshop Item]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Social Informatics 4th International Conference, SocInfo 2012, proceedings, Berlin, Heidelberg, Springer, pp. 188-201, DOI: 10.1007/978-3-642-35386-4_15,
[Book Section]

Pfitzmann, Birgit and Waidner, Michael (2011):
Efficient browser-based identity management providing personal control and anonymity.
[Standards, patents]

Pantel, Björn (2011):
Secure Logging of Data Transferred from Optical Disc Media.
TU Darmstadt, [Master Thesis]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2005):
Digital Rights Management.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
In: International Workshop on Security Protocols, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2003):
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, pp. 38--44, 7, (6), [Article]

Pfitzmann, Birgit and Waidner, Michael (2003):
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Identity Management System Using Single Sign-on.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2002):
Token-based Web Single Signon with Enabled Clients.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2002):
BBAE -- A General Protocol for Browser-based Attribute Exchange.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2002):
Privacy in Browser-Based Attribute Exchange.
In: ACM Workshop on Privacy in the Electronic Society, ACM, [Conference or Workshop Item]

Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2002):
A Formal Model for Multiparty Group Key Agreement.
[Report]

Powell, D. and Adelsbach, A. and Cachin, C. and Creese, S. and Dacier, M. and Deswarte, Y. and McCutcheon, T. and Neves, N. and Pfitzmann, B. and Randell, B. and Stroud, R. and Verissimo, P. and Waidner, M. (2001):
MAFTIA---Malicious- and Accidental-Fault Tolerance for Internet Applications.
In: Supplement of the 2001 Int. Conf. on Dependable Systems and Networks, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2001):
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
In: IEEE Symposium on Security and Privacy, [Conference or Workshop Item]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01, [Conference or Workshop Item]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2000):
Composition and Integrity Preservation of Secure Reactive Systems.
In: 7th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Secure Reactive Systems.
[Report]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (2000):
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.
[Report]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Cryptographic Security of Reactive Systems.
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1998):
Optimal Efficiency of Optimistic Contract Signing.
In: ACM Principles of Distributed Computing (PODC), [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1998):
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers, [Article]

Pfitzmann, Birgit and Waidner, Michael (1998):
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, pp. 258--264, 22, (5), [Article]

Pfitzmann, Birgit and Waidner, Michael (1998):
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, pp. 23--28, 32, (1), [Article]

Pfitzmann, Birgit and Waidner, Michael (1997):
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '97, DuD Fachbeiträge, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1997):
Anonymous Fingerprinting.
In: Eurocrypt '97, LNCS 1233, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1997):
Trusting mobile user devices and security modules.
In: IEEE Computer, pp. 61--68, 30, (2), [Article]

Pfitzmann, Birgit and Waidner, Michael (1997):
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, pp. 194--213, 15, (2), [Article]

Pfitzmann, Birgit and Waidner, Michael (1997):
Asymmetric Fingerprinting for Larger Collusions.
In: 4th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1996):
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1996):
Properties of Payment Systems - General Definition Sketch and Classification.
[Report]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1996):
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
[Standards, patents]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1995):
How to Break Another "Provably Secure" Payment System.
In: Eurocrypt 95, LNCS 921, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1994):
A General Framework for Formal Notions of "Secure" Systems.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1993):
Attacks on Protocols for Server-Aided RSA Computation.
In: Eurocrypt '92, LNCS 658, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1993):
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München, pp. 75--121, [Article]

Pfitzmann, Birgit and Waidner, Michael (1992):
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1992):
Unconditional Byzantine Agreement for any Number of Faulty Processors.
In: STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577, Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1992):
How to Break and Repair a "Provably Secure" Untraceable Payment System.
In: Crypto '91, LNCS 576, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
In: Verlässliche Informationssysteme (VIS'91), Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Fail-stop-Signaturen und ihre Anwendung.
In: Verlässliche Informationssysteme (VIS'91), Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Fail-stop Signatures and their Application.
In: SECURICOM 91, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1991):
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
In: Information Security, IFIP/Sec'91, [Conference or Workshop Item]

Pfitzmann, Andreas and Waidner, Michael (1991):
Netze mit unbeobachtbarer Kommunikation.
In: Symposium ``Datenschutz: Komfort und Freiheit des Kunden in der Telekommunikation'', Berliner Datenschutzbeauftragter, Hildegardstr. 28/29, 1000 Berlin 31, Mai 1992, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1990):
Formal Aspects of Fail-stop Signatures.
[Report]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1990):
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, pp. 305--315, 14, (5--6), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1989):
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, pp. 605--622, 13, (12), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1988):
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, pp. 5--7, 11, (1), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1987):
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, pp. 293--299, 11, (6), [Article]

Pfitzmann, Andreas and Waidner, Michael (1986):
Networks without user observability---design options.
In: Computer & Security, pp. 158--166, 6, (2), [Article]

Pfitzmann, Andreas and Waidner, Michael (1986):
Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen.
In: Datenschutz und Datensicherung DuD, pp. 16--22, 10, (1), [Article]

R

Römer, Jonathan (2011):
Entwicklung eines Container-Verfahrens für digitale Bildwasserzeichen.
TU Darmstadt, [Master Thesis]

S

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI), Boston, MA, USA, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA), Louvain La Neuve, Belgium, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, p. 14, (16), [Article]

Shulman, Haya and Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS, Vienna, Austria, [Conference or Workshop Item]

Shannon, Greg and Waidner, Michael and Sonalker, Anuja (2015):
Ask The Experts: Cybersecurity.
[Report]

Shulman, Haya and Ezra, Shiran (2014):
Poster: On the Resilience of DNS Infrastructure.
In: ACM Conference on Computer and Communications Security (ACM CCS), ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Stopczynski, Martin and Zugelder, Michael (2014):
Reducing User Tracking through Automatic Web Site State Isolations.
In: Information Security, Springer, In: Lecture Notes in Computer Science, 8783, ISBN 978-3-319-13256-3,
DOI: 10.1007/978-3-319-13257-0_18,
[Conference or Workshop Item]

Schneider, Markus and Enzmann, Matthias and Stopczynski, Martin (2014):
Web-Tracking-Report 2014.
(SIT-TR-2014-01), ISBN 978-3-8396-0700-8,
[Report]

Shulman, Haya (2014):
Pretty Bad Privacy: Pitfalls of DNS Encryption.
In: Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Stopczynski, Martin and Ghiglieri, Marco (2012):
Smart Home Dashboard – Das intelligente Energiemanagement.
In: VDE KONGRESS 2012 Smart Grid, VDE Verlag GmbH, ISBN 978-3-8007-3446-7,
[Conference or Workshop Item]

Schindler, Werner and Itoh, Kouichi
Lopez, J. and Tsudik, G. (eds.) (2011):
Exponent Blinding Does not Always Lift (Partial) SPA Resistance to Higher-Level Security.
In: ACNS 2011, Springer, In: LNCS, [Conference or Workshop Item]

Schunter, Matthias and Poritz, Jonathan and Waidner, Michael and Herreweghen, Els Van (2008):
Method and Device for Verifying the Security of a Computing Platform.
[Standards, patents]

Schunter, Matthias and Waidner, Michael (2007):
Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data.
In: 2007 Workshop on Privacy Enhancing Technologies (PET 2007), [Conference or Workshop Item]

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael (2006):
Cryptographically Sound Theorem Proving.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, [Conference or Workshop Item]

Swimmer, Morton and Waidner, Michael and Wespi, Andreas (2004):
Data Processing System.
[Standards, patents]

Schunter, Matthias and Herreweghen, Els Van and Waidner, Michael (2003):
Translating EPAL to P3P -- How to Keep Enterprise Privacy Promises in Sync With the Actual Practices (Position Papers).
[Report]

Scedrov, Andre and Canetti, Ran and Guttman, Joshua and Wagner, David and Waidner, Michael (2001):
Relating Cryptography and Cryptographic Protocols.
In: CSFW, [Conference or Workshop Item]

Steiner, Michael and Buhler, Peter and Eiricha, Thomas and Waidner, Michael (2001):
Secure Password-based Cipher Suite for TLS.
In: ACM Transactions on Information and System Security, pp. 134--157, 4, (2), [Article]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (2000):
Key Agreement in Dynamic Peer Groups.
In: IEEE Transactions on Parallel and Distributed Systems, pp. 769--780, 11, (8), [Article]

Schunter, Matthias and Waidner, Michael and Whinnett, Dale (1999):
The SEMPER Framework for Secure Electronic Commerce.
In: Wirtschaftsinformatik 1999, [Conference or Workshop Item]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (1998):
A protocol suite for key agreement in dynamic groups.
In: The 18th International Conference on Distributed Computing Systems, IEEE Computer Society, [Conference or Workshop Item]

Schunter, Matthias and Waidner, Michael and Whinnett, Dale (1998):
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
In: Computer Networks & ISDN Systems, pp. 1501--1510, 30, [Article]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (1996):
Diffie-Hellman Key Distribution Extended to Groups.
In: 3rd ACM Conference on Computer and Communications Security, ACM Press, [Conference or Workshop Item]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (1995):
Refinement and Extension of Encrypted Key Exchange.
In: ACM Operating Systems Review, pp. 22--30, 29, (3), [Article]

T

Taha, Ahmed (2018):
Quantitative Trust Assessment in the Cloud.
Darmstadt, Ahmed Taha, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7448],
[Ph.D. Thesis]

Tsakali, Maria and Waidner, Michael (1996):
SEMPER and Applications for Electronic Commerce.
In: SmartCard 96, [Conference or Workshop Item]

U

Ulmer, Alex and Kohlhammer, Jörn and Shulman, Haya (2017):
Towards Enhancing the Visual Analysis of Interdomain Routing.
In: VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Porto, Portugal, [Conference or Workshop Item]

W

Waidner, Michael and Kasper, Michael (2016):
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
In: DATE 2016 (Design, Automation and Test in Europe), Dresden, Germany, [Conference or Workshop Item]

Waidner, Michael (2015):
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.
[Report]

Wilhelmi, Klaus (2012):
CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages.
TU Darmstadt, [Master Thesis]

Waidner, Michael (2009):
End-of-Session Authentication.
[Standards, patents]

Waidner, Michael (2008):
Method and system for processing of documents with electronic signatures.
[Standards, patents]

Waidner, Michael (2004):
Preface.
In: Int. J. Inf. Sec., p. 1, 3, (1), [Article]

Waidner, Michael (1999):
Cybercrime.
In: IST 99, Workshop ``Towards a Safer Information Society by Combating Cybercrime'', European Commission, [Conference or Workshop Item]

Waidner, Michael (1998):
Open Issues in Secure Electronic Commerce.
[Report]

Waidner, Michael and Schunter, Matthias (1997):
Architecture and Design of a Secure Electronic Marketplace.
In: Joint European Networking Conference (JENC8), [Conference or Workshop Item]

Waidner, Michael (1996):
Development of a Secure Electronic Marketplace for Europe.
In: EDI Forum, pp. 98--106, 9, (2), [Article]

Waidner, Michael (1996):
Keine Angst um Ihr Geld! -- Entwicklung des sicheren Zahlungsverkehrs im Internet.
In: Neue Zürcher Zeitung (NZZ), pp. B51, 234, [Article]

Waidner, Michael (1996):
Electronic Payment Systems.
In: Public Key Solutions, [Conference or Workshop Item]

Waidner, Michael (1994):
Das ESPRIT-Projekt "Conditional Access for Europe".
In: 4. GMD-SmartCard Workshop, [Conference or Workshop Item]

Waidner, Michael and Weber, Arnd (1994):
Europäisches Industrie- und Forschungskonsortium entwickelt neuartiges Zahlungsverfahren.
In: Datenschutz-Berater, pp. 4--7, 18, (10), [Article]

Waidner, Michael (1992):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
[Report]

Waidner, Michael and Pfitzmann, Birgit (1991):
Loss-tolerant electronic wallet.
In: {D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference, [Conference or Workshop Item]

Waidner, Michael (1991):
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.
[Report]

Waidner, Michael and Pfitzmann, Birgit (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.
[Report]

Waidner, Michael (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks.
In: Eurocrypt '89, LNCS 434, Springer-Verlag, Berlin, [Conference or Workshop Item]

Waidner, Michael and Pfitzmann, Birgit (1989):
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
In: Eurocrypt '89, LNCS 434, Springer-Verlag, Berlin 1990, [Conference or Workshop Item]

Waidner, Michael (1988):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
In: Datenschutz und Datensicherung DuD, pp. 448--459, 12, (9), [Article]

Waidner, Michael and Pfitzmann, Birgit (1987):
Anonyme und verlusttolerante elektronische Brieftaschen.
[Report]

Waidner, Michael and Pfitzmann, Birgit (1987):
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, pp. 487--497, 11, (10), [Article]

Waidner, Michael (1985):
Datenschutz und Betrugssicherheit garantierende Kommunikationsnetze - Systematisierung der Datenschutzmassnahmen und Ansätze zur Verifikation der Betrugssicherheit.
[Report]

Z

Zmudzinski, Sascha (2017):
Digital Watermarking for Verification of Perception-based Integrity of Audio Data.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6311],
[Ph.D. Thesis]

Á

Álvarez, Flor and Gardner-Stephen, Paul and Hollick, Matthias (2016):
Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises.
In: Proceedings 6th IEEE Global Humanitarian Technology Conference (GHTC), IEEE, Seattle, WA, USA, Oct 17, 2019 - Oct 20, 2019, DOI: 10.1109/GHTC.2016.7857261,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7857261],
[Conference or Workshop Item]

This list was generated on Sun Oct 20 01:29:43 2019 CEST.