TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 100.

Pfitzmann, Birgit ; Waidner, Michael :
Efficient browser-based identity management providing personal control and anonymity.

[Norm, Patent, Standard] , (2011)

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Reducing access to sensitive information.

[Norm, Patent, Standard] , (2011)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12) 1685--1720.
[Artikel] , (2007)

Sprenger, Christoph ; Backes, Michael ; Basin, David ; Pfitzmann, Birgit ; Waidner, Michael :
Cryptographically Sound Theorem Proving.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Formal Methods and Cryptography.
FM 2006: Formal Methods Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
ESORICS '06 (European Symposium on Research in Computer Security) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Non-determinism in multi-party computation.

[Report] , (2006)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Reactively Simulatable Certified Mail.

[Report] , (2006)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Soundness limits of Dolev-Yao models.

[Report] , (2006)

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael :
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006)
[Konferenz- oder Workshop-Beitrag] , (2006)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS).
[Konferenz- oder Workshop-Beitrag] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
IBM
[Monograph] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS)
[Konferenz- oder Workshop-Beitrag] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.

[Report] , (2005)

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Creating a Privacy Policy From a Process Model and Verifying the Compliance.

[Norm, Patent, Standard] , (2005)

Pfitzmann, Birgit ; Waidner, Michael :
Digital Rights Management.

[Norm, Patent, Standard] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Justifying a Dolev-Yao Model under Active Attacks.
Special Issue of International School of Foundations of Security Analysis and Design (FOSAD) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.

[Report] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS).
[Konferenz- oder Workshop-Beitrag] , (2005)

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS)
[Konferenz- oder Workshop-Beitrag] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4) 242--252.
[Artikel] , (2005)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.

[Report] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3) 135--154.
[Artikel] , (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A General Composition Theorem for Secure Reactive Systems.
Theory of Cryptography Conference (TCC) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2004)

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.

[Norm, Patent, Standard] , (2004)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Low-Level Ideal Signatures and General Integrity Idealization.
7th Information Security Conference (ISC)
[Konferenz- oder Workshop-Beitrag] , (2004)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4) 589--617.
[Artikel] , (2004)

Pfitzmann, Birgit ; Waidner, Michael :
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6) 38--44.
[Artikel] , (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.

[Norm, Patent, Standard] , (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
International Workshop on Security Protocols
[Konferenz- oder Workshop-Beitrag] , (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Identity Management System Using Single Sign-on.

[Norm, Patent, Standard] , (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.

[Norm, Patent, Standard] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
6th Information Security Conference (ISC) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Security in Business Process Engineering.
Conference on Business Process Management (BPM 2003) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
ESORICS 2003 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library with Nested Operations.
10th ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag] , (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library.

[Report] , (2003)

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael :
Cryptographic Semantics For The Algebraic Models.

[Report] , (2002)

Pfitzmann, Birgit ; Waidner, Michael :
BBAE -- A General Protocol for Browser-based Attribute Exchange.

[Report] , (2002)

Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
A Formal Model for Multiparty Group Key Agreement.

[Report] , (2002)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Fairness and Liveness.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag] , (2002)

Pfitzmann, Birgit ; Waidner, Michael :
Privacy in Browser-Based Attribute Exchange.
ACM Workshop on Privacy in the Electronic Society ACM
[Konferenz- oder Workshop-Beitrag] , (2002)

Pfitzmann, Birgit ; Waidner, Michael :
Token-based Web Single Signon with Enabled Clients.

[Report] , (2002)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit :
Optimized Self-Synchronizing Mode of Operation.
8th International Workshop on Fast Software Encryption
[Konferenz- oder Workshop-Beitrag] , (2001)

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd :
Die PERSEUS Systemarchitektur.
Verlässliche IT-Systeme, GI-Fachtagung VIS '01
[Konferenz- oder Workshop-Beitrag] , (2001)

Pfitzmann, Birgit ; Waidner, Michael :
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IEEE Symposium on Security and Privacy
[Konferenz- oder Workshop-Beitrag] , (2001)

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd :
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge. Vieweg Verlag Kiel, Germany , pp. 1-18.
[Buchkapitel] , (2001)

Pfitzmann, Birgit ; Riordana, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd :
The PERSEUS System Architecture.

[Report] , (2001)

Stüble, Christian ; Pfitzmann, Birgit :
PERSEUS: A Quick Open-source Path to Secure Signatures.
2nd Workshop on Microkernel-based Systems
[Konferenz- oder Workshop-Beitrag] , (2001)

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Proving ownership of digital content.
In: 3rd International Workshop on Information Hiding, IH 1999. In: LNCS , 1768 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2000)

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza :
Self-escrowed cash against user black-mailing.
In: Fourth Conference on Financial Cryptography (FC 2000 Anguilla). In: LNCS , 1962 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2000)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Self-escrowed cash against user black-mailing.
In: LNCS , 1962 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2000)

Pfitzmann, Birgit ; Waidner, Michael :
Composition and Integrity Preservation of Secure Reactive Systems.
7th ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag] , (2000)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Cryptographic Security of Reactive Systems.
DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS)
[Konferenz- oder Workshop-Beitrag] , (2000)

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael:
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag
[Buch] , (2000)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Secure Reactive Systems.

[Report] , (2000)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.

[Report] , (2000)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Coin-based anonymous fingerprinting.
In: LNCS , 1599 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (1999)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Buchkapitel] , (1999)

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Buchkapitel] , (1999)

Pfitzmann, Birgit ; Waidner, Michael :
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers
[Artikel] , (1998)

Pfitzmann, Birgit ; Waidner, Michael :
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1) 23--28.
[Artikel] , (1998)

Pfitzmann, Birgit ; Waidner, Michael :
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5) 258--264.
[Artikel] , (1998)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Optimal Efficiency of Optimistic Contract Signing.
ACM Principles of Distributed Computing (PODC)
[Konferenz- oder Workshop-Beitrag] , (1998)

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, April, Special Issue "Cop 495--509.
[Artikel] , (1998)

Pfitzmann, Birgit ; Waidner, Michael :
Anonymous Fingerprinting.
Eurocrypt '97, LNCS 1233 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (1997)

Pfitzmann, Birgit ; Waidner, Michael :
Asymmetric Fingerprinting for Larger Collusions.
4th ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag] , (1997)

Pfitzmann, Birgit ; Waidner, Michael :
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
Verlässliche IT-Systeme, GI-Fachtagung VIS '97 DuD Fachbeiträge
[Konferenz- oder Workshop-Beitrag] , (1997)

Pfitzmann, Birgit ; Waidner, Michael :
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2) 194--213.
[Artikel] , (1997)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2) 61--68.
[Artikel] , (1997)

Pfitzmann, Birgit ; Waidner, Michael :
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.

[Report] , (1996)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.

[Norm, Patent, Standard] , (1996)

Pfitzmann, Birgit ; Waidner, Michael :
Properties of Payment Systems - General Definition Sketch and Classification.

[Report] , (1996)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
How to Break Another "Provably Secure" Payment System.
Eurocrypt 95, LNCS 921 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (1995)

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd :
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.

[Report] , (1995)

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; de Rooij, Peter ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael :
The ESPRIT Project CAFE - High Security Digital Payment Systems.
The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875, Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (1994)

Pfitzmann, Birgit ; Waidner, Michael :
A General Framework for Formal Notions of "Secure" Systems.

[Report] , (1994)

Pfitzmann, Birgit ; Waidner, Michael :
Attacks on Protocols for Server-Aided RSA Computation.
Eurocrypt '92, LNCS 658 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (1993)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München 75--121.
[Artikel] , (1993)

Pfitzmann, Birgit ; Waidner, Michael :
How to Break and Repair a "Provably Secure" Untraceable Payment System.
Crypto '91, LNCS 576 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (1992)

Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11) 571--579.
[Artikel] , (1992)

Pfitzmann, Birgit ; Waidner, Michael :
Unconditional Byzantine Agreement for any Number of Faulty Processors.
STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577 Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag] , (1992)

Pfitzmann, Birgit ; Waidner, Michael :
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.

[Report] , (1992)

Pfitzmann, Birgit ; Waidner, Michael :
Fail-stop Signatures and their Application.
SECURICOM 91
[Konferenz- oder Workshop-Beitrag] , (1991)

Pfitzmann, Birgit ; Waidner, Michael :
Fail-stop-Signaturen und ihre Anwendung.
Verlässliche Informationssysteme (VIS'91) Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag] , (1991)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
Information Security, IFIP/Sec'91
[Konferenz- oder Workshop-Beitrag] , (1991)

Waidner, Michael ; Pfitzmann, Birgit :
Loss-tolerant electronic wallet.
{D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference
[Konferenz- oder Workshop-Beitrag] , (1991)

Pfitzmann, Birgit ; Waidner, Michael :
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
Verlässliche Informationssysteme (VIS'91) Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag] , (1991)

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael :
Unconditional Byzantine Agreement with Good Majority.
STACS '91, LNCS 480 Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag] , (1991)

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael :
A remark on a signature scheme where forgery can be proved.
Eurocrypt '90, LNCS 473 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag] , (1991)

Pfitzmann, Birgit ; Waidner, Michael :
Formal Aspects of Fail-stop Signatures.

[Report] , (1990)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6) 305--315.
[Artikel] , (1990)

Waidner, Michael ; Pfitzmann, Birgit :
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.

[Report] , (1990)

Waidner, Michael ; Pfitzmann, Birgit :
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
Eurocrypt '89, LNCS 434 Springer-Verlag, Berlin 1990
[Konferenz- oder Workshop-Beitrag] , (1989)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12) 605--622.
[Artikel] , (1989)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, 11 (1) 5--7.
[Artikel] , (1988)

Waidner, Michael ; Pfitzmann, Birgit :
Anonyme und verlusttolerante elektronische Brieftaschen.

[Report] , (1987)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6) 293--299.
[Artikel] , (1987)

Waidner, Michael ; Pfitzmann, Birgit :
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10) 487--497.
[Artikel] , (1987)

Diese Liste wurde am Tue Dec 18 04:10:26 2018 CET generiert.