TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 100.

Pfitzmann, Birgit and Waidner, Michael :
Efficient browser-based identity management providing personal control and anonymity.

[Standards, patents] , (2011)

Camenisch, Jan and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Reducing access to sensitive information.

[Standards, patents] , (2011)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12) 1685--1720.
[Article] , (2007)

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael :
Cryptographically Sound Theorem Proving.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[Conference or Workshop Item] , (2006)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Formal Methods and Cryptography.
FM 2006: Formal Methods Springer-Verlag, Berlin
[Conference or Workshop Item] , (2006)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
ESORICS '06 (European Symposium on Research in Computer Security) Springer-Verlag, Berlin
[Conference or Workshop Item] , (2006)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Non-determinism in multi-party computation.

[Report] , (2006)

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Reactively Simulatable Certified Mail.

[Report] , (2006)

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security Springer-Verlag, Berlin
[Conference or Workshop Item] , (2006)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Soundness limits of Dolev-Yao models.

[Report] , (2006)

Benenson, Zinaida and Freiling, Felix and Pfitzmann, Birgit and Rohner, Christian and Waidner, Michael :
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006)
[Conference or Workshop Item] , (2006)

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
In: European Symposium for Research in Computer Science (ESORICS).
[Conference or Workshop Item] , (2005)

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
IBM
[Monograph] , (2005)

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS)
[Conference or Workshop Item] , (2005)

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit :
Browser Model for Security Analysis of Browser-Based Protocols.

[Report] , (2005)

Backes, Michael and Karioth, Guenter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Creating a Privacy Policy From a Process Model and Verifying the Compliance.

[Standards, patents] , (2005)

Pfitzmann, Birgit and Waidner, Michael :
Digital Rights Management.

[Standards, patents] , (2005)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Justifying a Dolev-Yao Model under Active Attacks.
Special Issue of International School of Foundations of Security Analysis and Design (FOSAD) Springer-Verlag, Berlin
[Conference or Workshop Item] , (2005)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.

[Report] , (2005)

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
In: Workshop on Secure Web Services (SWS).
[Conference or Workshop Item] , (2005)

Sadeghi, Ahmad-Reza and Groß, Thomas and Pfitzmann, Birgit :
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS)
[Conference or Workshop Item] , (2005)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4) 242--252.
[Article] , (2005)

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.

[Report] , (2005)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3) 135--154.
[Article] , (2005)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
A General Composition Theorem for Secure Reactive Systems.
Theory of Cryptography Conference (TCC) Springer-Verlag, Berlin
[Conference or Workshop Item] , (2004)

Betz, Linda and Dayka, John and Farrell, Walter and Guski, Richard and Karjoth, Günter and Nelson, Mark and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.

[Standards, patents] , (2004)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Low-Level Ideal Signatures and General Integrity Idealization.
7th Information Security Conference (ISC)
[Conference or Workshop Item] , (2004)

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael :
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4) 589--617.
[Article] , (2004)

Pfitzmann, Birgit and Waidner, Michael :
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6) 38--44.
[Article] , (2003)

Pfitzmann, Birgit and Waidner, Michael :
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.

[Standards, patents] , (2003)

Pfitzmann, Birgit and Waidner, Michael :
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
International Workshop on Security Protocols
[Conference or Workshop Item] , (2003)

Pfitzmann, Birgit and Waidner, Michael :
Identity Management System Using Single Sign-on.

[Standards, patents] , (2003)

Pfitzmann, Birgit and Waidner, Michael :
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.

[Standards, patents] , (2003)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Reactively Secure Signature Schemes.
6th Information Security Conference (ISC) Springer-Verlag, Berlin
[Conference or Workshop Item] , (2003)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Security in Business Process Engineering.
Conference on Business Process Management (BPM 2003) Springer-Verlag, Berlin
[Conference or Workshop Item] , (2003)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
ESORICS 2003 Springer-Verlag, Berlin
[Conference or Workshop Item] , (2003)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
A Universally Composable Cryptographic Library with Nested Operations.
10th ACM Conference on Computer and Communications Security
[Conference or Workshop Item] , (2003)

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael :
A Universally Composable Cryptographic Library.

[Report] , (2003)

Adelsbach, Andre and Stüble, Christian and Creese, Sadie and Pfitzmann, Birgit and Ryan, Peter Y. A. and Simmonds, William and Steinbrechner, Sandra and Steiner, Michael and Waidner, Michael :
Cryptographic Semantics For The Algebraic Models.

[Report] , (2002)

Pfitzmann, Birgit and Waidner, Michael :
BBAE -- A General Protocol for Browser-based Attribute Exchange.

[Report] , (2002)

Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael :
A Formal Model for Multiparty Group Key Agreement.

[Report] , (2002)

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael :
Polynomial Fairness and Liveness.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[Conference or Workshop Item] , (2002)

Pfitzmann, Birgit and Waidner, Michael :
Privacy in Browser-Based Attribute Exchange.
ACM Workshop on Privacy in the Electronic Society ACM
[Conference or Workshop Item] , (2002)

Pfitzmann, Birgit and Waidner, Michael :
Token-based Web Single Signon with Enabled Clients.

[Report] , (2002)

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Geraldy, Alexander and Pfitzmann, Birgit :
Optimized Self-Synchronizing Mode of Operation.
8th International Workshop on Fast Software Encryption
[Conference or Workshop Item] , (2001)

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd :
Die PERSEUS Systemarchitektur.
Verlässliche IT-Systeme, GI-Fachtagung VIS '01
[Conference or Workshop Item] , (2001)

Pfitzmann, Birgit and Waidner, Michael :
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IEEE Symposium on Security and Privacy
[Conference or Workshop Item] , (2001)

Stüble, Christian and Pfitzmann, Birgit and Riordan, James and Waidner, Michael and Weber, Arnd :
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge. Vieweg Verlag Kiel, Germany , pp. 1-18.
[Book Section] , (2001)

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd :
The PERSEUS System Architecture.

[Report] , (2001)

Stüble, Christian and Pfitzmann, Birgit :
PERSEUS: A Quick Open-source Path to Secure Signatures.
2nd Workshop on Microkernel-based Systems
[Conference or Workshop Item] , (2001)

Adelsbach, Andre and Pfitzmann, Birgit and Sadeghi, Ahmad-Reza :
Proving ownership of digital content.
In: 3rd International Workshop on Information Hiding, IH 1999. In: LNCS , 1768 . Springer-Verlag
[Conference or Workshop Item] , (2000)

Pfitzmann, Birgit and Sadeghi, Ahmad-Reza :
Self-escrowed cash against user black-mailing.
In: Fourth Conference on Financial Cryptography (FC 2000 Anguilla). In: LNCS , 1962 . Springer-Verlag
[Conference or Workshop Item] , (2000)

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit :
Self-escrowed cash against user black-mailing.
In: LNCS , 1962 . Springer-Verlag
[Conference or Workshop Item] , (2000)

Pfitzmann, Birgit and Waidner, Michael :
Composition and Integrity Preservation of Secure Reactive Systems.
7th ACM Conference on Computer and Communications Security
[Conference or Workshop Item] , (2000)

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Cryptographic Security of Reactive Systems.
DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS)
[Conference or Workshop Item] , (2000)

Lacoste, Gérard and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael:
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag
[Book] , (2000)

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Secure Reactive Systems.

[Report] , (2000)

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.

[Report] , (2000)

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit :
Coin-based anonymous fingerprinting.
In: LNCS , 1599 . Springer-Verlag
[Conference or Workshop Item] , (1999)

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Book Section] , (1999)

Sadeghi, Ahmad-Reza and Pfitzmann, Birgit :
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99. Vieweg Verlag , pp. 35-48.
[Book Section] , (1999)

Pfitzmann, Birgit and Waidner, Michael :
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers
[Article] , (1998)

Pfitzmann, Birgit and Waidner, Michael :
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1) 23--28.
[Article] , (1998)

Pfitzmann, Birgit and Waidner, Michael :
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5) 258--264.
[Article] , (1998)

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Optimal Efficiency of Optimistic Contract Signing.
ACM Principles of Distributed Computing (PODC)
[Conference or Workshop Item] , (1998)

Jerichow, Anja and Müller, Jan and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, April, Special Issue "Cop 495--509.
[Article] , (1998)

Pfitzmann, Birgit and Waidner, Michael :
Anonymous Fingerprinting.
Eurocrypt '97, LNCS 1233 Springer-Verlag, Berlin
[Conference or Workshop Item] , (1997)

Pfitzmann, Birgit and Waidner, Michael :
Asymmetric Fingerprinting for Larger Collusions.
4th ACM Conference on Computer and Communications Security
[Conference or Workshop Item] , (1997)

Pfitzmann, Birgit and Waidner, Michael :
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
Verlässliche IT-Systeme, GI-Fachtagung VIS '97 DuD Fachbeiträge
[Conference or Workshop Item] , (1997)

Pfitzmann, Birgit and Waidner, Michael :
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2) 194--213.
[Article] , (1997)

Pfitzmann, Andreas and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2) 61--68.
[Article] , (1997)

Pfitzmann, Birgit and Waidner, Michael :
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.

[Report] , (1996)

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.

[Standards, patents] , (1996)

Pfitzmann, Birgit and Waidner, Michael :
Properties of Payment Systems - General Definition Sketch and Classification.

[Report] , (1996)

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael :
How to Break Another "Provably Secure" Payment System.
Eurocrypt 95, LNCS 921 Springer-Verlag, Berlin
[Conference or Workshop Item] , (1995)

Carter, Bob and Pfitzmann, Birgit and Schunter, Matthias and Stanford, Chris and Waidner, Michael and Weber, Arnd :
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.

[Report] , (1995)

Boly, Jean-Paul and Bosselaers, Antoon and Cramer, Ronald and Michelsen, Rolf and Mjolsnes, Stig and Muller, Frank and Pedersen, Torben and Pfitzmann, Birgit and de Rooij, Peter and Schoenmakers, Berry and Schunter, Matthias and Vallée, Luc and Waidner, Michael :
The ESPRIT Project CAFE - High Security Digital Payment Systems.
The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875, Springer-Verlag, Berlin
[Conference or Workshop Item] , (1994)

Pfitzmann, Birgit and Waidner, Michael :
A General Framework for Formal Notions of "Secure" Systems.

[Report] , (1994)

Pfitzmann, Birgit and Waidner, Michael :
Attacks on Protocols for Server-Aided RSA Computation.
Eurocrypt '92, LNCS 658 Springer-Verlag, Berlin
[Conference or Workshop Item] , (1993)

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München 75--121.
[Article] , (1993)

Pfitzmann, Birgit and Waidner, Michael :
How to Break and Repair a "Provably Secure" Untraceable Payment System.
Crypto '91, LNCS 576 Springer-Verlag, Berlin
[Conference or Workshop Item] , (1992)

Ort, Andreas and Assmann, Ralf and Bleumer, Gerrit and Böttger, Manfred and Fox, Dirk and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11) 571--579.
[Article] , (1992)

Pfitzmann, Birgit and Waidner, Michael :
Unconditional Byzantine Agreement for any Number of Faulty Processors.
STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577 Springer-Verlag, Heidelberg
[Conference or Workshop Item] , (1992)

Pfitzmann, Birgit and Waidner, Michael :
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.

[Report] , (1992)

Pfitzmann, Birgit and Waidner, Michael :
Fail-stop Signatures and their Application.
SECURICOM 91
[Conference or Workshop Item] , (1991)

Pfitzmann, Birgit and Waidner, Michael :
Fail-stop-Signaturen und ihre Anwendung.
Verlässliche Informationssysteme (VIS'91) Springer-Verlag, Heidelberg
[Conference or Workshop Item] , (1991)

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
Information Security, IFIP/Sec'91
[Conference or Workshop Item] , (1991)

Waidner, Michael and Pfitzmann, Birgit :
Loss-tolerant electronic wallet.
{D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference
[Conference or Workshop Item] , (1991)

Pfitzmann, Birgit and Waidner, Michael :
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
Verlässliche Informationssysteme (VIS'91) Springer-Verlag, Heidelberg
[Conference or Workshop Item] , (1991)

Baum-Waidner, Birgit and Pfitzmann, Birgit and Waidner, Michael :
Unconditional Byzantine Agreement with Good Majority.
STACS '91, LNCS 480 Springer-Verlag, Heidelberg
[Conference or Workshop Item] , (1991)

Bleumer, Gerrit and Pfitzmann, Birgit and Waidner, Michael :
A remark on a signature scheme where forgery can be proved.
Eurocrypt '90, LNCS 473 Springer-Verlag, Berlin
[Conference or Workshop Item] , (1991)

Pfitzmann, Birgit and Waidner, Michael :
Formal Aspects of Fail-stop Signatures.

[Report] , (1990)

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6) 305--315.
[Article] , (1990)

Waidner, Michael and Pfitzmann, Birgit :
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.

[Report] , (1990)

Waidner, Michael and Pfitzmann, Birgit :
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
Eurocrypt '89, LNCS 434 Springer-Verlag, Berlin 1990
[Conference or Workshop Item] , (1989)

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12) 605--622.
[Article] , (1989)

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, 11 (1) 5--7.
[Article] , (1988)

Waidner, Michael and Pfitzmann, Birgit :
Anonyme und verlusttolerante elektronische Brieftaschen.

[Report] , (1987)

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael :
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6) 293--299.
[Article] , (1987)

Waidner, Michael and Pfitzmann, Birgit :
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10) 487--497.
[Article] , (1987)

This list was generated on Sat Apr 20 00:07:27 2019 CEST.