TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 100.

Pfitzmann, Birgit ; Waidner, Michael (2011):
Efficient browser-based identity management providing personal control and anonymity.
7,992,195,
[Standards, patents]

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011):
Reducing access to sensitive information.
7,941,859,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12), pp. 1685--1720. [Article]

Sprenger, Christoph ; Backes, Michael ; Basin, David ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Cryptographically Sound Theorem Proving.
In: IEEE Computer Security Foundations Workshop (CSFW),
IEEE Computer Society Press, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, pp. 13--24,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
[Book]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS),
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Browser Model for Security Analysis of Browser-Based Protocols.
(RZ3600), [Report]

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
11/317,396,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2005):
Digital Rights Management.
WO 2005/076,104,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005):
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS),
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4), pp. 242--252. [Article]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3), pp. 135--154. [Article]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), pp. 336--354,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
7,617,393,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC),
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4), pp. 589--617. [Article]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6), pp. 38--44. [Article]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
7,992,195,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
In: International Workshop on Security Protocols,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Identity Management System Using Single Sign-on.
WO 2003/091861,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
7,240,362,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), pp. 84--95,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), pp. 168--183,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security,
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Pfitzmann, Birgit ; Waidner, Michael (2002):
BBAE -- A General Protocol for Browser-based Attribute Exchange.
[Report]

Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
A Formal Model for Multiparty Group Key Agreement.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), pp. 160--174,
IEEE Computer Society Press, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2002):
Privacy in Browser-Based Attribute Exchange.
In: ACM Workshop on Privacy in the Electronic Society,
ACM, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2002):
Token-based Web Single Signon with Enabled Clients.
[Report]

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001):
Optimized Self-Synchronizing Mode of Operation.
In: 8th International Workshop on Fast Software Encryption,
Yokohama, Japan, [Conference or Workshop Item]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2001):
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
In: IEEE Symposium on Security and Privacy,
[Conference or Workshop Item]

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, pp. 1-18, Vieweg Verlag, [Book Section]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Stüble, Christian ; Pfitzmann, Birgit (2001):
PERSEUS: A Quick Open-source Path to Secure Signatures.
In: 2nd Workshop on Microkernel-based Systems,
Banff, Canada, [Conference or Workshop Item]

Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Proving ownership of digital content.
In: LNCS, 1768, pp. 126-141, Springer-Verlag, 3rd International Workshop on Information Hiding, IH 1999, [Conference or Workshop Item]

Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, Springer-Verlag, Fourth Conference on Financial Cryptography (FC 2000 Anguilla), [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000):
Self-escrowed cash against user black-mailing.
In: LNCS, 1962, In: Fourth Conference on Financial Cryptography (FC’00),,
Springer-Verlag, Anguilla, British West Indies, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2000):
Composition and Integrity Preservation of Secure Reactive Systems.
In: 7th ACM Conference on Computer and Communications Security, pp. 245--254,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000):
Cryptographic Security of Reactive Systems.
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS),
[Conference or Workshop Item]

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2000):
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag, [Book]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000):
Secure Reactive Systems.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (2000):
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.
[Report]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Coin-based anonymous fingerprinting.
In: LNCS, 1599, In: EUROCRYPT ’99, pp. 150-164,
Springer-Verlag, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999):
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99, pp. 35-48, Vieweg Verlag, [Book Section]

Pfitzmann, Birgit ; Waidner, Michael (1998):
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers, [Article]

Pfitzmann, Birgit ; Waidner, Michael (1998):
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1), pp. 23--28. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1998):
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5), pp. 258--264. [Article]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1998):
Optimal Efficiency of Optimistic Contract Signing.
In: ACM Principles of Distributed Computing (PODC), pp. 113--122,
[Conference or Workshop Item]

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998):
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4), pp. 495-509. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Anonymous Fingerprinting.
In: Eurocrypt '97, LNCS 1233, pp. 88--102,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Asymmetric Fingerprinting for Larger Collusions.
In: 4th ACM Conference on Computer and Communications Security, pp. 151--160,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '97,
DuD Fachbeiträge, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2), pp. 194--213. [Article]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1997):
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2), pp. 61--68. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1996):
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.
[Report]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1996):
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
0,836,730,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (1996):
Properties of Payment Systems - General Definition Sketch and Classification.
[Report]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1995):
How to Break Another "Provably Secure" Payment System.
In: Eurocrypt 95, LNCS 921, pp. 121--132,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, p. 217,
Berlin, Springer-Verlag, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1994):
A General Framework for Formal Notions of "Secure" Systems.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (1993):
Attacks on Protocols for Server-Aided RSA Computation.
In: Eurocrypt '92, LNCS 658, pp. 153--162,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1993):
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München, pp. 75--121. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1992):
How to Break and Repair a "Provably Secure" Untraceable Payment System.
In: Crypto '91, LNCS 576, pp. 338--350,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1992):
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11), pp. 571--579. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1992):
Unconditional Byzantine Agreement for any Number of Faulty Processors.
In: STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577, pp. 339--350,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1992):
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Fail-stop Signatures and their Application.
In: SECURICOM 91, pp. 145--160,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Fail-stop-Signaturen und ihre Anwendung.
In: Verlässliche Informationssysteme (VIS'91), pp. 289--301,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1991):
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
In: Information Security, IFIP/Sec'91, pp. 245--258,
[Conference or Workshop Item]

Waidner, Michael ; Pfitzmann, Birgit (1991):
Loss-tolerant electronic wallet.
In: {D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference, pp. 127--150,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
In: Verlässliche Informationssysteme (VIS'91), pp. 302--320,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, pp. 285--295,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, pp. 441--445,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1990):
Formal Aspects of Fail-stop Signatures.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1990):
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6), pp. 305--315. [Article]

Waidner, Michael ; Pfitzmann, Birgit (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.
[Report]

Waidner, Michael ; Pfitzmann, Birgit (1989):
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
In: Eurocrypt '89, LNCS 434, p. 690,
Springer-Verlag, Berlin 1990, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1989):
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12), pp. 605--622. [Article]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1988):
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, 11 (1), pp. 5--7. [Article]

Waidner, Michael ; Pfitzmann, Birgit (1987):
Anonyme und verlusttolerante elektronische Brieftaschen.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1987):
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6), pp. 293--299. [Article]

Waidner, Michael ; Pfitzmann, Birgit (1987):
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10), pp. 487--497. [Article]

This list was generated on Tue Oct 12 06:37:21 2021 CEST.