TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | O | P | R | S | T | U | W | Z | Á
Number of items at this level (without sub-levels): 250.

A

Ahmed, Sarah (2011):
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
TU Darmstadt, [Master Thesis]

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
7,603,317,
[Standards, patents]

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE,
ACM, [Conference or Workshop Item]

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
2003/0014654 A1,
[Standards, patents]

Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias (2001):
Using an Object Model to Improve Handling of Personally Identifiable Information.
2003/0004734 A1,
[Standards, patents]

B

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Conference or Workshop Item]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Conference or Workshop Item]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
pp. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Conference or Workshop Item]

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference,
IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
7,412,724,
[Standards, patents]

Backes, Michael ; Basin, David ; Waidner, Michael (2007):
Preface.
In: Journal of Computer Security, 15 (6), p. 561. [Article]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12), pp. 1685--1720. [Article]

Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
1,675,047,
[Standards, patents]

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006),
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
1,617,587,
[Standards, patents]

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
11/317,396,
[Standards, patents]

Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3), pp. 135--154. [Article]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4), pp. 242--252. [Article]

Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
11/178,722,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC),
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), pp. 336--354,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4), pp. 589--617. [Article]

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
7,617,393,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security,
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), pp. 84--95,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), pp. 168--183,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), pp. 160--174,
IEEE Computer Society Press, [Conference or Workshop Item]

Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael (2000):
Secure Password-based Cipher Suite for TLS.
In: Symposium on Network and Distributed Systems Security (NDSS '00),
CA, Internet Society, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Waidner, Michael (2000):
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
In: 27th International Colloquium on Automata, Languages and Programming (ICALP' 2000), pp. 524--535,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4), pp. 611--627. [Article]

Baum-Waidner, Birgit ; Waidner, Michael (1998):
Optimistic Asynchronous Multi-Party Contract Signing.
[Report]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX Workshop on Electronic Commerce, pp. 89--106,
[Conference or Workshop Item]

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, p. 217,
Berlin, Springer-Verlag, [Conference or Workshop Item]

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, pp. 441--445,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, pp. 285--295,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

C

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS),
San Diego, CA, USA, [Conference or Workshop Item]

Canova, Gamze (2011):
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
Darmstadt, Technische Universität, [Bachelor Thesis]

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011):
Reducing access to sensitive information.
7,941,859,
[Standards, patents]

Camenisch, Jan ; Waidner, Michael (2004):
Minimizing information gathered by access decision engines in access control systems.
10/874,431,
[Standards, patents]

Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael (2003):
Anonymous Access to a Service.
10/432,266,
[Standards, patents]

Camenisch, Jan ; Waidner, Michael (2001):
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9, [Article]

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

D

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018):
Off-path Attacks Against PKI.
pp. 2213-2215, ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, DOI: 10.1145/3243734.3278516,
[Conference or Workshop Item]

Demir, Kubilay (2017):
A Secure and Reliable Communication Platform for the Smart Grid.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052, In: Cryptology and Network Security. CANS 2016,
Springer, Cham, Milano, Italy, [Conference or Workshop Item]

E

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master Thesis]

Eu, Joy Boy Joy (2001):
Specification of Dependable Trusted Third Parties.
[Report]

F

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO),
Santa Barbara, CA, USA, [Conference or Workshop Item]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops,
Toulouse, France, [Conference or Workshop Item]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Faber, Natalie (2012):
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt, [Master Thesis]

Fuhrmann, Tino (2012):
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt, [Master Thesis]

Filtschew, Konstantin (2012):
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt, [Master Thesis]

Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1), pp. 5--7. [Article]

Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061,
Dagstuhl Reports, [Conference or Workshop Item]

Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2), pp. 1--15. [Article]

Field, Simon ; Waidner, Michael (2000):
Electronic Commerce.
In: Computer Networks, 32 (6), pp. 667--668. [Article]

G

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Conference or Workshop Item]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
pp. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Conference or Workshop Item]

Ghiglieri, Marco (2017):
Smart TV Privacy Risks and Protection Measures.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Ghiglieri, Marco ; Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference or Workshop Item]

Ghiglieri, Marco ; Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3), pp. pp. 61-67. [Article]

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]

Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC,
Las Vegas, NV, [Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
11/2014, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien,
[Conference or Workshop Item]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy, San Jose, California, 18.5.2014, [Conference or Workshop Item]

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 629 - 634,
IEEE, Budapest, Hungary, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648-653,
IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Ghiglieri, Marco ; Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
(TUD-KE-2009-05), [Report]

H

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Conference or Workshop Item]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW),
Vienna, Austria, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, (19), pp. 80-84. [Article]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC, In: 30th Annual Computer Security Applications Conference, pp. 356-365,
New Orleans, LA, USA, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC),
ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014,
Berlin, Germany, [Conference or Workshop Item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor Thesis]

Halvani, Oren Avni (2012):
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Darmstadt, Technische Universität, [Master Thesis]

Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
12/393,242,
[Standards, patents]

Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
12/393,242,
[Standards, patents]

Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004):
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1), pp. 35--44. [Article]

Hauser, Ralf ; Steiner, Michael ; Waidner, Michael (1996):
Micro-payments based on iKP.
In: SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection, pp. 67--82,
[Conference or Workshop Item]

J

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master Thesis]

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998):
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4), pp. 495-509. [Article]

Janson, Phil ; Waidner, Michael (1996):
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6), pp. 10--15. [Article]

K

Kern, Dustin (2021):
Privacy-Preserving Architecture for EV Charging and Billing. (Publisher's Version)
Darmstadt, Technische Universität, DOI: 10.26083/tuprints-00018558,
[Master Thesis]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Denver, CO, USA, [Conference or Workshop Item]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM),
Atlanta, GA, USA, [Conference or Workshop Item]

Kulyk, Oksana (2017):
Extending the Helios Internet Voting Scheme Towards New Election Settings.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Krauß, Christoph ; Waidner, Michael (2015):
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, 39 (6), pp. 383-387. [Article]

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8), pp. 512-516. DOI: 10.1007/s11623-013-0209-8,
[Article]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master Thesis]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master Thesis]

Kalabis, Lukas ; Selzer, Annika (2012):
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9), pp. 670--675. DOI: 10.1007/s11623-012-0224-1,
[Article]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, pp. 13--24,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2004):
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, 27 (1), pp. 3--9. [Article]

Karjoth, Günter ; Waidner, Michael (2004):
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1), pp. 18--21. [Article]

Karjoth, Günter ; Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael (2003):
Amending P3P for Clearer Privacy Promises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)),
[Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), pp. 2--6,
Aix-en-Provence, [Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
In: Workshop on Privacy Enhancing Technologies, pp. 14--15,
[Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
[Report]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2001):
Unternehmensweites Datenschutzmanagement.
In: Datenschutz Sommerakademie 2001,
Datenschuts als Wettbewerbsvorteil, Vieweg Verlag, [Conference or Workshop Item]

Keller, Ludwig ; Kottmann, Dietmar ; Waidner, Michael (1994):
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.
[Report]

L

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2000):
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag, [Book]

Lacoste, Gérard ; Waidner, Michael (2000):
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press, pp. 147--157. [Article]

Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael (1991):
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2), pp. 71--75. [Article]

M

Mitev, Richard ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2019):
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
ACM, ASIACCS 2019, Auckland, New Zealand, Juli 2019, DOI: 10.1145/3321705.3329842,
[Conference or Workshop Item]

Müller, Jan (2014):
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
Darmstadt, Technische Universität, [Master Thesis]

Milman, Ivan ; Wolfson, Charles ; Schunter, Matthias ; Hinton, Heather ; Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
12/648,876,
[Standards, patents]

O

Oswald, Florian (2014):
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt, [Master Thesis]

Oswald, Florian (2012):
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt, [Master Thesis]

Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1992):
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11), pp. 571--579. [Article]

P

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS: colors for privacy settings.
WWW '12 Companion, In: Proceedings of the 21st international conference companion on World Wide Web, pp. 585--586,
ACM, Lyon, France, ISBN 978-1-4503-1230-1,
DOI: 10.1145/2187980.2188139,
[Conference or Workshop Item]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Lecture Notes in Computer Science, In: Social Informatics 4th International Conference, SocInfo 2012, proceedings, pp. 188-201, Berlin, Heidelberg, Springer, ISBN 978-3-642-35385-7,
DOI: 10.1007/978-3-642-35386-4_15,
[Book Section]

Pfitzmann, Birgit ; Waidner, Michael (2011):
Efficient browser-based identity management providing personal control and anonymity.
7,992,195,
[Standards, patents]

Pantel, Björn (2011):
Secure Logging of Data Transferred from Optical Disc Media.
Darmstadt, Technische Universität, [Bachelor Thesis]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (2005):
Digital Rights Management.
WO 2005/076,104,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
In: International Workshop on Security Protocols,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6), pp. 38--44. [Article]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
7,240,362,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Identity Management System Using Single Sign-on.
WO 2003/091861,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
7,992,195,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2002):
Token-based Web Single Signon with Enabled Clients.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (2002):
BBAE -- A General Protocol for Browser-based Attribute Exchange.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (2002):
Privacy in Browser-Based Attribute Exchange.
In: ACM Workshop on Privacy in the Electronic Society,
ACM, [Conference or Workshop Item]

Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
A Formal Model for Multiparty Group Key Agreement.
[Report]

Powell, D. ; Adelsbach, A. ; Cachin, C. ; Creese, S. ; Dacier, M. ; Deswarte, Y. ; McCutcheon, T. ; Neves, N. ; Pfitzmann, B. ; Randell, B. ; Stroud, R. ; Verissimo, P. ; Waidner, M. (2001):
MAFTIA---Malicious- and Accidental-Fault Tolerance for Internet Applications.
In: Supplement of the 2001 Int. Conf. on Dependable Systems and Networks, pp. D32--D35,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2001):
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
In: IEEE Symposium on Security and Privacy,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2000):
Composition and Integrity Preservation of Secure Reactive Systems.
In: 7th ACM Conference on Computer and Communications Security, pp. 245--254,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000):
Secure Reactive Systems.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (2000):
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.
[Report]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000):
Cryptographic Security of Reactive Systems.
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS),
[Conference or Workshop Item]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1998):
Optimal Efficiency of Optimistic Contract Signing.
In: ACM Principles of Distributed Computing (PODC), pp. 113--122,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1998):
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers, [Article]

Pfitzmann, Birgit ; Waidner, Michael (1998):
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5), pp. 258--264. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1998):
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1), pp. 23--28. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '97,
DuD Fachbeiträge, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Anonymous Fingerprinting.
In: Eurocrypt '97, LNCS 1233, pp. 88--102,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1997):
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2), pp. 61--68. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2), pp. 194--213. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Asymmetric Fingerprinting for Larger Collusions.
In: 4th ACM Conference on Computer and Communications Security, pp. 151--160,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1996):
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (1996):
Properties of Payment Systems - General Definition Sketch and Classification.
[Report]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1996):
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
0,836,730,
[Standards, patents]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1995):
How to Break Another "Provably Secure" Payment System.
In: Eurocrypt 95, LNCS 921, pp. 121--132,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1994):
A General Framework for Formal Notions of "Secure" Systems.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (1993):
Attacks on Protocols for Server-Aided RSA Computation.
In: Eurocrypt '92, LNCS 658, pp. 153--162,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1993):
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München, pp. 75--121. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1992):
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (1992):
Unconditional Byzantine Agreement for any Number of Faulty Processors.
In: STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577, pp. 339--350,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1992):
How to Break and Repair a "Provably Secure" Untraceable Payment System.
In: Crypto '91, LNCS 576, pp. 338--350,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
In: Verlässliche Informationssysteme (VIS'91), pp. 302--320,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Fail-stop-Signaturen und ihre Anwendung.
In: Verlässliche Informationssysteme (VIS'91), pp. 289--301,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Fail-stop Signatures and their Application.
In: SECURICOM 91, pp. 145--160,
[Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1991):
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
In: Information Security, IFIP/Sec'91, pp. 245--258,
[Conference or Workshop Item]

Pfitzmann, Andreas ; Waidner, Michael (1991):
Netze mit unbeobachtbarer Kommunikation.
In: Symposium ``Datenschutz: Komfort und Freiheit des Kunden in der Telekommunikation'', pp. 209--235,
Berliner Datenschutzbeauftragter, Hildegardstr. 28/29, 1000 Berlin 31, Mai 1992, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1990):
Formal Aspects of Fail-stop Signatures.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1990):
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6), pp. 305--315. [Article]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1989):
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12), pp. 605--622. [Article]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1988):
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, 11 (1), pp. 5--7. [Article]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1987):
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6), pp. 293--299. [Article]

Pfitzmann, Andreas ; Waidner, Michael (1986):
Networks without user observability---design options.
In: Computer & Security, 6 (2), pp. 158--166. [Article]

Pfitzmann, Andreas ; Waidner, Michael (1986):
Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen.
In: Datenschutz und Datensicherung DuD, 10 (1), pp. 16--22. [Article]

R

Römer, Jonathan (2011):
Entwicklung eines Container-Verfahrens für digitale Bildwasserzeichen.
Darmstadt, Technische Universität, [Master Thesis]

S

Sridaran, Kris Shrishak (2021):
Practical Secure Computation for Internet Infrastructure. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00018504,
[Ph.D. Thesis]

Shrishak, Kris ; Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Conference or Workshop Item]

Shrishak, Kris ; Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020):
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
pp. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI),
Boston, MA, USA, [Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, pp. 131-144,
USENIX Association, 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA),
Louvain La Neuve, Belgium, [Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, (16), p. 14. [Article]

Shulman, Haya ; Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS,
Vienna, Austria, [Conference or Workshop Item]

Shannon, Greg ; Waidner, Michael ; Sonalker, Anuja (2015):
Ask The Experts: Cybersecurity.
[Report]

Shulman, Haya ; Ezra, Shiran (2014):
Poster: On the Resilience of DNS Infrastructure.
In: ACM Conference on Computer and Communications Security (ACM CCS),
ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Stopczynski, Martin ; Zugelder, Michael (2014):
Reducing User Tracking through Automatic Web Site State Isolations.
In: Lecture Notes in Computer Science, 8783, In: Information Security, pp. 309-327,
Springer, ISBN 978-3-319-13256-3,
DOI: 10.1007/978-3-319-13257-0_18,
[Conference or Workshop Item]

Schneider, Markus ; Enzmann, Matthias ; Stopczynski, Martin (2014):
Web-Tracking-Report 2014.
(SIT-TR-2014-01), ISBN 978-3-8396-0700-8,
[Report]

Shulman, Haya (2014):
Pretty Bad Privacy: Pitfalls of DNS Encryption.
In: Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, pp. 191-200 (9),
Scottsdale, Arizona, USA, [Conference or Workshop Item]

Stopczynski, Martin ; Ghiglieri, Marco (2012):
Smart Home Dashboard – Das intelligente Energiemanagement.
In: VDE KONGRESS 2012 Smart Grid,
VDE Verlag GmbH, ISBN 978-3-8007-3446-7,
[Conference or Workshop Item]

Schindler, Werner ; Itoh, Kouichi
Lopez, J. ; Tsudik, G. (eds.) (2011):
Exponent Blinding Does not Always Lift (Partial) SPA Resistance to Higher-Level Security.
In: LNCS, In: ACNS 2011, pp. 73-90,
Springer, [Conference or Workshop Item]

Schunter, Matthias ; Poritz, Jonathan ; Waidner, Michael ; Herreweghen, Els Van (2008):
Method and Device for Verifying the Security of a Computing Platform.
7,770,000,
[Standards, patents]

Schunter, Matthias ; Waidner, Michael (2007):
Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data.
In: 2007 Workshop on Privacy Enhancing Technologies (PET 2007),
[Conference or Workshop Item]

Sprenger, Christoph ; Backes, Michael ; Basin, David ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Cryptographically Sound Theorem Proving.
In: IEEE Computer Security Foundations Workshop (CSFW),
IEEE Computer Society Press, [Conference or Workshop Item]

Swimmer, Morton ; Waidner, Michael ; Wespi, Andreas (2004):
Data Processing System.
2004/0236747 A1,
[Standards, patents]

Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael (2003):
Translating EPAL to P3P -- How to Keep Enterprise Privacy Promises in Sync With the Actual Practices (Position Papers).
[Report]

Scedrov, Andre ; Canetti, Ran ; Guttman, Joshua ; Wagner, David ; Waidner, Michael (2001):
Relating Cryptography and Cryptographic Protocols.
In: CSFW, pp. 111--114,
[Conference or Workshop Item]

Steiner, Michael ; Buhler, Peter ; Eiricha, Thomas ; Waidner, Michael (2001):
Secure Password-based Cipher Suite for TLS.
In: ACM Transactions on Information and System Security, 4 (2), pp. 134--157. [Article]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (2000):
Key Agreement in Dynamic Peer Groups.
In: IEEE Transactions on Parallel and Distributed Systems, 11 (8), pp. 769--780. [Article]

Schunter, Matthias ; Waidner, Michael ; Whinnett, Dale (1999):
The SEMPER Framework for Secure Electronic Commerce.
In: Wirtschaftsinformatik 1999,
[Conference or Workshop Item]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1998):
A protocol suite for key agreement in dynamic groups.
In: The 18th International Conference on Distributed Computing Systems,
IEEE Computer Society, [Conference or Workshop Item]

Schunter, Matthias ; Waidner, Michael ; Whinnett, Dale (1998):
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
In: Computer Networks & ISDN Systems, 30, pp. 1501--1510. [Article]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1996):
Diffie-Hellman Key Distribution Extended to Groups.
In: 3rd ACM Conference on Computer and Communications Security, pp. 31--37,
ACM Press, [Conference or Workshop Item]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995):
Refinement and Extension of Encrypted Key Exchange.
In: ACM Operating Systems Review, 29 (3), pp. 22--30. [Article]

T

Taha, Ahmed (2018):
Quantitative Trust Assessment in the Cloud.
Darmstadt, Ahmed Taha, Technische Universität,
[Ph.D. Thesis]

Tsakali, Maria ; Waidner, Michael (1996):
SEMPER and Applications for Electronic Commerce.
In: SmartCard 96, pp. 13--15,
[Conference or Workshop Item]

U

Ulmer, Alex ; Kohlhammer, Jörn ; Shulman, Haya (2017):
Towards Enhancing the Visual Analysis of Interdomain Routing.
In: VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications,
Porto, Portugal, [Conference or Workshop Item]

W

Waidner, Michael ; Kasper, Michael (2016):
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
In: DATE 2016 (Design, Automation and Test in Europe),
Dresden, Germany, [Conference or Workshop Item]

Waidner, Michael (2015):
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.
[Report]

Wilhelmi, Klaus (2012):
CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages.
TU Darmstadt, [Master Thesis]

Waidner, Michael (2009):
End-of-Session Authentication.
12/545,136,
[Standards, patents]

Waidner, Michael (2008):
Method and system for processing of documents with electronic signatures.
WO 2002/055,976,
[Standards, patents]

Waidner, Michael (2004):
Preface.
In: Int. J. Inf. Sec., 3 (1), p. 1. [Article]

Waidner, Michael (1999):
Cybercrime.
In: IST 99, Workshop ``Towards a Safer Information Society by Combating Cybercrime'',
European Commission, [Conference or Workshop Item]

Waidner, Michael (1998):
Open Issues in Secure Electronic Commerce.
[Report]

Waidner, Michael ; Schunter, Matthias (1997):
Architecture and Design of a Secure Electronic Marketplace.
In: Joint European Networking Conference (JENC8), pp. 712.1--712.5,
[Conference or Workshop Item]

Waidner, Michael (1996):
Electronic Payment Systems.
In: Public Key Solutions,
[Conference or Workshop Item]

Waidner, Michael (1996):
Development of a Secure Electronic Marketplace for Europe.
In: EDI Forum, 9 (2), pp. 98--106. [Article]

Waidner, Michael (1996):
Keine Angst um Ihr Geld! -- Entwicklung des sicheren Zahlungsverkehrs im Internet.
In: Neue Zürcher Zeitung (NZZ), 234, pp. B51. [Article]

Waidner, Michael (1994):
Das ESPRIT-Projekt "Conditional Access for Europe".
In: 4. GMD-SmartCard Workshop,
[Conference or Workshop Item]

Waidner, Michael ; Weber, Arnd (1994):
Europäisches Industrie- und Forschungskonsortium entwickelt neuartiges Zahlungsverfahren.
In: Datenschutz-Berater, 18 (10), pp. 4--7. [Article]

Waidner, Michael (1992):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
[Report]

Waidner, Michael ; Pfitzmann, Birgit (1991):
Loss-tolerant electronic wallet.
In: {D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference, pp. 127--150,
[Conference or Workshop Item]

Waidner, Michael (1991):
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.
[Report]

Waidner, Michael ; Pfitzmann, Birgit (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.
[Report]

Waidner, Michael (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks.
In: Eurocrypt '89, LNCS 434, pp. 302--319,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Waidner, Michael ; Pfitzmann, Birgit (1989):
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
In: Eurocrypt '89, LNCS 434, p. 690,
Springer-Verlag, Berlin 1990, [Conference or Workshop Item]

Waidner, Michael (1988):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
In: Datenschutz und Datensicherung DuD, 12 (9), pp. 448--459. [Article]

Waidner, Michael ; Pfitzmann, Birgit (1987):
Anonyme und verlusttolerante elektronische Brieftaschen.
[Report]

Waidner, Michael ; Pfitzmann, Birgit (1987):
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10), pp. 487--497. [Article]

Waidner, Michael (1985):
Datenschutz und Betrugssicherheit garantierende Kommunikationsnetze - Systematisierung der Datenschutzmassnahmen und Ansätze zur Verifikation der Betrugssicherheit.
[Report]

Z

Zmudzinski, Sascha (2017):
Digital Watermarking for Verification of Perception-based Integrity of Audio Data.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Á

Álvarez, Flor ; Gardner-Stephen, Paul ; Hollick, Matthias (2016):
Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises.
In: Proceedings 6th IEEE Global Humanitarian Technology Conference (GHTC),
IEEE, Seattle, WA, USA, Oct 17, 2019 - Oct 20, 2019, DOI: 10.1109/GHTC.2016.7857261,
[Conference or Workshop Item]

This list was generated on Sun Oct 24 00:57:34 2021 CEST.