TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 188.

Brand, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Domain Validation ++ for MitM-Resilient PKI.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: ACM CCS 2018, 15.-19.10. 2018, Toronto, Canada.
[Konferenz- oder Workshop-Beitrag], (2018)

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Practical Experience: Methodologies for Measuring Route Origin Validation.
[Online-Edition: http://dsn2017.github.io/]
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, 26.-29.06.2018, Denver,CO,USA.
[Konferenz- oder Workshop-Beitrag], (2018)

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael :
Path MTU Discovery Considered Harmful.
[Online-Edition: http://icdcs2018.ocg.at]
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, 2.-5.7.2018, Vienna, Austria.
[Konferenz- oder Workshop-Beitrag], (2018)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2017)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Internet-Wide Study of DNS Cache Injections.
IEEE International Conference on Computer Communications (INFOCOM)
[Konferenz- oder Workshop-Beitrag], (2017)

Shulman, Haya ; Waidner, Michael :
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI)
[Konferenz- oder Workshop-Beitrag], (2017)

Shulman, Haya ; Waidner, Michael :
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 27.-29.03. 2017, Boston, MA, USA. Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation USENIX Association
[Konferenz- oder Workshop-Beitrag], (2017)

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael :
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052 . Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2016)

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Stratum Filtering: Cloud-Based Detection of Attack Sources.
ACM Cloud Computing Security Workshop (CCSW)
[Konferenz- oder Workshop-Beitrag], (2016)

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens :
NetCo: Reliable Routing with Unreliable Routers.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Konferenz- oder Workshop-Beitrag], (2016)

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Survey of Software Protection with Minimal Hardware.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Konferenz- oder Workshop-Beitrag], (2016)

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael :
Towards Automated Measurements of Internets Naming Infrastructure.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Konferenz- oder Workshop-Beitrag], (2016)

Ghiglieri, Marco ; Waidner, Michael :
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, vol. 14, no. (IEEE 14/3) pp. 61-67.
[Artikel], (2016)

Shulman, Haya ; Waidner, Michael :
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In Traffic Monitoring and Analysis (TMA)
[Konferenz- oder Workshop-Beitrag], (2016)

Waidner, Michael ; Kasper, Michael :
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
DATE 2016 (Design, Automation and Test in Europe)
[Konferenz- oder Workshop-Beitrag], (2016)

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel :
Detection and Forensics of Domains Hijacking.
IEEE Global Communications Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security (16) p. 14.
[Artikel], (2015)

Shulman, Haya ; Waidner, Michael
Pernul, Günther ; Ryan, Michael Y. A. ; Weippl, Edgar (eds.) :

DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: Lecture Notes in Computer Science 9326 , 1 . Springer-Verlag New York, Inc.
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
Towards Security of Internet's Naming Infrastructure.
Computer Security ESORICS
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael :
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken .
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael :
Security and Privacy Challenges in Industrial Internet of Things.
52nd Design Automation Conference (DAC) Research
[Konferenz- oder Workshop-Beitrag], (2015)

Shannon, Greg ; Waidner, Michael ; Sonalker, Anuja :
Ask The Experts: Cybersecurity.

[Report], (2015)

Waidner, Michael :
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.

[Report], (2015)

Krauß, Christoph ; Waidner, Michael :
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, 39(6) pp. 383-387.
[Artikel], (2015)

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael :
Personal DLP for Facebook.
In: 6 . IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya ; Waidner, Michael :
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
International Conference on Applied Cryptography and Network Security (ACNS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch], (2013)

Kalabis, Lukas ; Waidner, Michael
Anzinger, Heribert ; Hamacher, Kay ; Katzenbeisser, Stefan (eds.) :

Federated Identity Management.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-34741-2]
In: Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe. Springer, Berlin , pp. 189-218. ISBN 978-3-642-34741-2
[Buchkapitel], (2013)

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes :
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4) pp. 305-308.
[Artikel], (2012)

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) :

State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE). Springer Verlag Heidelberg , pp. 189-279. ISBN 978-3-642-31942-6
[Buchkapitel], (2012)

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) :

It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI , 195 . GI
[Konferenz- oder Workshop-Beitrag], (2012)

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael :
Technical Aspects of Online Privacy.

[Report], (2012)

Suri, Neeraj ; Waidner, Michael (eds.) :
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt.
Suri, Neeraj ; Waidner, Michael (eds.), In: LNI , 195 . GI
[Konferenz- oder Workshop-Beitrag], (2012)

Federrath, Hannes ; Hansen, Marit ; Waidner, Michael :
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1) 5--7.
[Artikel], (2011)

Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael :
Data network and method for checking nodes of a data network.

[Norm, Patent, Standard], (2011)

Pfitzmann, Birgit ; Waidner, Michael :
Efficient browser-based identity management providing personal control and anonymity.

[Norm, Patent, Standard], (2011)

Milman, Ivan ; Wolfson, Charles ; Schunter, Matthias ; Hinton, Heather ; Waidner, Michael :
Method and System for Policy Driven Data Distribution.

[Norm, Patent, Standard], (2011)

Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael :
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2) 1--15.
[Artikel], (2011)

Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael :
Online Privacy: Towards Informational Self-Determination on the Internet.
Dagstuhl Perspectives Workshop 11061 Dagstuhl Reports
[Konferenz- oder Workshop-Beitrag], (2011)

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Reducing access to sensitive information.

[Norm, Patent, Standard], (2011)

Waidner, Michael :
End-of-Session Authentication.

[Norm, Patent, Standard], (2009)

Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim :
Software Protection Using an Installaton Product Having an Entitlement File.

[Norm, Patent, Standard], (2009)

Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James :
Software protection using an installation product having an entitlement file.

[Norm, Patent, Standard], (2009)

Schunter, Matthias ; Poritz, Jonathan ; Waidner, Michael ; Herreweghen, Els Van :
Method and Device for Verifying the Security of a Computing Platform.

[Norm, Patent, Standard], (2008)

Waidner, Michael :
Method and system for processing of documents with electronic signatures.

[Norm, Patent, Standard], (2008)

Backes, Michael ; Basin, David ; Waidner, Michael :
Preface.
In: Journal of Computer Security, 15 (6) p. 561.
[Artikel], (2007)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12) 1685--1720.
[Artikel], (2007)

Schunter, Matthias ; Waidner, Michael :
Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data.
2007 Workshop on Privacy Enhancing Technologies (PET 2007)
[Konferenz- oder Workshop-Beitrag], (2007)

Sprenger, Christoph ; Backes, Michael ; Basin, David ; Pfitzmann, Birgit ; Waidner, Michael :
Cryptographically Sound Theorem Proving.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Formal Methods and Cryptography.
FM 2006: Formal Methods Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
ESORICS '06 (European Symposium on Research in Computer Security) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.

[Norm, Patent, Standard], (2006)

Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael :
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.

[Norm, Patent, Standard], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Non-determinism in multi-party computation.

[Report], (2006)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Reactively Simulatable Certified Mail.

[Report], (2006)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Soundness limits of Dolev-Yao models.

[Report], (2006)

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael :
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard], (2006)

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael :
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006)
[Konferenz- oder Workshop-Beitrag], (2006)

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Creating a Privacy Policy From a Process Model and Verifying the Compliance.

[Norm, Patent, Standard], (2005)

Pfitzmann, Birgit ; Waidner, Michael :
Digital Rights Management.

[Norm, Patent, Standard], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Justifying a Dolev-Yao Model under Active Attacks.
Special Issue of International School of Foundations of Security Analysis and Design (FOSAD) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.

[Report], (2005)

Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan :
Privacy-protecting Integrity Attestation of a Computing Platform.

[Norm, Patent, Standard], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4) 242--252.
[Artikel], (2005)

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.

[Report], (2005)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3) 135--154.
[Artikel], (2005)

Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko :
Trusted Virtual Domains: Secure Foundations for Business and IT Services.

[Report], (2005)

Swimmer, Morton ; Waidner, Michael ; Wespi, Andreas :
Data Processing System.

[Norm, Patent, Standard], (2004)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A General Composition Theorem for Secure Reactive Systems.
Theory of Cryptography Conference (TCC) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2004)

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.

[Norm, Patent, Standard], (2004)

Karjoth, Günter ; Waidner, Michael :
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1) 18--21.
[Artikel], (2004)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Low-Level Ideal Signatures and General Integrity Idealization.
7th Information Security Conference (ISC)
[Konferenz- oder Workshop-Beitrag], (2004)

Camenisch, Jan ; Waidner, Michael :
Minimizing information gathered by access decision engines in access control systems.

[Norm, Patent, Standard], (2004)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4) 589--617.
[Artikel], (2004)

Waidner, Michael :
Preface.
In: Int. J. Inf. Sec., 3 (1) p. 1.
[Artikel], (2004)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, 27 (1) 3--9.
[Artikel], (2004)

Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael :
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1) 35--44.
[Artikel], (2004)

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael :
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
FMSE ACM
[Konferenz- oder Workshop-Beitrag], (2004)

Karjoth, Günter ; Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael :
Amending P3P for Clearer Privacy Promises.
TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03))
[Konferenz- oder Workshop-Beitrag], (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6) 38--44.
[Artikel], (2003)

Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael :
Anonymous Access to a Service.

[Norm, Patent, Standard], (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.

[Norm, Patent, Standard], (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
International Workshop on Security Protocols
[Konferenz- oder Workshop-Beitrag], (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Identity Management System Using Single Sign-on.

[Norm, Patent, Standard], (2003)

Pfitzmann, Birgit ; Waidner, Michael :
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.

[Norm, Patent, Standard], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Reactively Secure Signature Schemes.
6th Information Security Conference (ISC) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Security in Business Process Engineering.
Conference on Business Process Management (BPM 2003) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
Symmetric Authentication Within a Simulatable Cryptographic Library.
ESORICS 2003 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2003)

Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael :
Translating EPAL to P3P -- How to Keep Enterprise Privacy Promises in Sync With the Actual Practices (Position Papers).

[Report], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library with Nested Operations.
10th ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2003)

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael :
A Universally Composable Cryptographic Library.

[Report], (2003)

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael :
Cryptographic Semantics For The Algebraic Models.

[Report], (2002)

Pfitzmann, Birgit ; Waidner, Michael :
BBAE -- A General Protocol for Browser-based Attribute Exchange.

[Report], (2002)

Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
A Formal Model for Multiparty Group Key Agreement.

[Report], (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
Workshop on Privacy Enhancing Technologies
[Konferenz- oder Workshop-Beitrag], (2002)

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael :
Polynomial Fairness and Liveness.
IEEE Computer Security Foundations Workshop (CSFW) IEEE Computer Society Press
[Konferenz- oder Workshop-Beitrag], (2002)

Pfitzmann, Birgit ; Waidner, Michael :
Privacy in Browser-Based Attribute Exchange.
ACM Workshop on Privacy in the Electronic Society ACM
[Konferenz- oder Workshop-Beitrag], (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Services for Enterprises.
TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)) Aix-en-Provence
[Konferenz- oder Workshop-Beitrag], (2002)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Privacy-enabled Services for Enterprises.

[Report], (2002)

Pfitzmann, Birgit ; Waidner, Michael :
Token-based Web Single Signon with Enabled Clients.

[Report], (2002)

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd :
Die PERSEUS Systemarchitektur.
Verlässliche IT-Systeme, GI-Fachtagung VIS '01
[Konferenz- oder Workshop-Beitrag], (2001)

Pfitzmann, Birgit ; Waidner, Michael :
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IEEE Symposium on Security and Privacy
[Konferenz- oder Workshop-Beitrag], (2001)

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd :
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge. Vieweg Verlag Kiel, Germany , pp. 1-18.
[Buchkapitel], (2001)

Pfitzmann, Birgit ; Riordana, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd :
The PERSEUS System Architecture.

[Report], (2001)

Scedrov, Andre ; Canetti, Ran ; Guttman, Joshua ; Wagner, David ; Waidner, Michael :
Relating Cryptography and Cryptographic Protocols.
CSFW
[Konferenz- oder Workshop-Beitrag], (2001)

Steiner, Michael ; Buhler, Peter ; Eiricha, Thomas ; Waidner, Michael :
Secure Password-based Cipher Suite for TLS.
In: ACM Transactions on Information and System Security, 4 (2) 134--157.
[Artikel], (2001)

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael :
Unternehmensweites Datenschutzmanagement.
Datenschutz Sommerakademie 2001 Datenschuts als Wettbewerbsvorteil, Vieweg Verlag
[Konferenz- oder Workshop-Beitrag], (2001)

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael :
Using a Rules Model to Improve Handling of Personally Identifiable Information.

[Norm, Patent, Standard], (2001)

Camenisch, Jan ; Waidner, Michael :
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9
[Artikel], (2001)

Pfitzmann, Birgit ; Waidner, Michael :
Composition and Integrity Preservation of Secure Reactive Systems.
7th ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2000)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Cryptographic Security of Reactive Systems.
DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS)
[Konferenz- oder Workshop-Beitrag], (2000)

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael :
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4) 611--627.
[Artikel], (2000)

Field, Simon ; Waidner, Michael :
Electronic Commerce.
In: Computer Networks, 32 (6) 667--668.
[Artikel], (2000)

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael :
Key Agreement in Dynamic Peer Groups.
In: IEEE Transactions on Parallel and Distributed Systems, 11 (8) 769--780.
[Artikel], (2000)

Baum-Waidner, Birgit ; Waidner, Michael :
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
27th International Colloquium on Automata, Languages and Programming (ICALP' 2000) Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (2000)

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael:
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag
[Buch], (2000)

Lacoste, Gérard ; Waidner, Michael :
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press 147--157.
[Artikel], (2000)

Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael :
Secure Password-based Cipher Suite for TLS.
Symposium on Network and Distributed Systems Security (NDSS '00) CA, Internet Society
[Konferenz- oder Workshop-Beitrag], (2000)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Secure Reactive Systems.

[Report], (2000)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.

[Report], (2000)

Waidner, Michael :
Cybercrime.
IST 99, Workshop ``Towards a Safer Information Society by Combating Cybercrime'' European Commission
[Konferenz- oder Workshop-Beitrag], (1999)

Schunter, Matthias ; Waidner, Michael ; Whinnett, Dale :
The SEMPER Framework for Secure Electronic Commerce.
Wirtschaftsinformatik 1999
[Konferenz- oder Workshop-Beitrag], (1999)

Pfitzmann, Birgit ; Waidner, Michael :
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers
[Artikel], (1998)

Pfitzmann, Birgit ; Waidner, Michael :
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1) 23--28.
[Artikel], (1998)

Pfitzmann, Birgit ; Waidner, Michael :
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5) 258--264.
[Artikel], (1998)

Waidner, Michael :
Open Issues in Secure Electronic Commerce.

[Report], (1998)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Optimal Efficiency of Optimistic Contract Signing.
ACM Principles of Distributed Computing (PODC)
[Konferenz- oder Workshop-Beitrag], (1998)

Baum-Waidner, Birgit ; Waidner, Michael :
Optimistic Asynchronous Multi-Party Contract Signing.

[Report], (1998)

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, April, Special Issue "Cop 495--509.
[Artikel], (1998)

Schunter, Matthias ; Waidner, Michael ; Whinnett, Dale :
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
In: Computer Networks & ISDN Systems, 30 1501--1510.
[Artikel], (1998)

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael :
A protocol suite for key agreement in dynamic groups.
The 18th International Conference on Distributed Computing Systems IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (1998)

Pfitzmann, Birgit ; Waidner, Michael :
Anonymous Fingerprinting.
Eurocrypt '97, LNCS 1233 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1997)

Waidner, Michael ; Schunter, Matthias :
Architecture and Design of a Secure Electronic Marketplace.
Joint European Networking Conference (JENC8)
[Konferenz- oder Workshop-Beitrag], (1997)

Pfitzmann, Birgit ; Waidner, Michael :
Asymmetric Fingerprinting for Larger Collusions.
4th ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (1997)

Pfitzmann, Birgit ; Waidner, Michael :
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
Verlässliche IT-Systeme, GI-Fachtagung VIS '97 DuD Fachbeiträge
[Konferenz- oder Workshop-Beitrag], (1997)

Pfitzmann, Birgit ; Waidner, Michael :
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2) 194--213.
[Artikel], (1997)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2) 61--68.
[Artikel], (1997)

Waidner, Michael :
Development of a Secure Electronic Marketplace for Europe.
In: EDI Forum, 9 (2) 98--106.
[Artikel], (1996)

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael :
Diffie-Hellman Key Distribution Extended to Groups.
3rd ACM Conference on Computer and Communications Security ACM Press
[Konferenz- oder Workshop-Beitrag], (1996)

Waidner, Michael :
Electronic Payment Systems.
Public Key Solutions
[Konferenz- oder Workshop-Beitrag], (1996)

Janson, Phil ; Waidner, Michael :
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6) 10--15.
[Artikel], (1996)

Pfitzmann, Birgit ; Waidner, Michael :
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.

[Report], (1996)

Waidner, Michael :
Keine Angst um Ihr Geld! -- Entwicklung des sicheren Zahlungsverkehrs im Internet.
In: Neue Zürcher Zeitung (NZZ), 234 B51.
[Artikel], (1996)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.

[Norm, Patent, Standard], (1996)

Hauser, Ralf ; Steiner, Michael ; Waidner, Michael :
Micro-payments based on iKP.
SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection
[Konferenz- oder Workshop-Beitrag], (1996)

Pfitzmann, Birgit ; Waidner, Michael :
Properties of Payment Systems - General Definition Sketch and Classification.

[Report], (1996)

Tsakali, Maria ; Waidner, Michael :
SEMPER and Applications for Electronic Commerce.
SmartCard 96
[Konferenz- oder Workshop-Beitrag], (1996)

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael :
How to Break Another "Provably Secure" Payment System.
Eurocrypt 95, LNCS 921 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1995)

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael :
Refinement and Extension of Encrypted Key Exchange.
In: ACM Operating Systems Review, 29 (3) 22--30.
[Artikel], (1995)

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd :
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.

[Report], (1995)

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael :
iKP -- a family of secure electronic payment protocols.
Proc. First USENIX Workshop on Electronic Commerce
[Konferenz- oder Workshop-Beitrag], (1995)

Waidner, Michael :
Das ESPRIT-Projekt "Conditional Access for Europe".
4. GMD-SmartCard Workshop
[Konferenz- oder Workshop-Beitrag], (1994)

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; de Rooij, Peter ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael :
The ESPRIT Project CAFE - High Security Digital Payment Systems.
The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875, Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1994)

Waidner, Michael ; Weber, Arnd :
Europäisches Industrie- und Forschungskonsortium entwickelt neuartiges Zahlungsverfahren.
In: Datenschutz-Berater, 18 (10) 4--7.
[Artikel], (1994)

Pfitzmann, Birgit ; Waidner, Michael :
A General Framework for Formal Notions of "Secure" Systems.

[Report], (1994)

Keller, Ludwig ; Kottmann, Dietmar ; Waidner, Michael :
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.

[Report], (1994)

Pfitzmann, Birgit ; Waidner, Michael :
Attacks on Protocols for Server-Aided RSA Computation.
Eurocrypt '92, LNCS 658 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1993)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München 75--121.
[Artikel], (1993)

Waidner, Michael :
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.

[Report], (1992)

Pfitzmann, Birgit ; Waidner, Michael :
How to Break and Repair a "Provably Secure" Untraceable Payment System.
Crypto '91, LNCS 576 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1992)

Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11) 571--579.
[Artikel], (1992)

Pfitzmann, Birgit ; Waidner, Michael :
Unconditional Byzantine Agreement for any Number of Faulty Processors.
STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577 Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag], (1992)

Pfitzmann, Birgit ; Waidner, Michael :
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.

[Report], (1992)

Waidner, Michael :
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.

[Report], (1991)

Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael :
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2) 71--75.
[Artikel], (1991)

Pfitzmann, Birgit ; Waidner, Michael :
Fail-stop Signatures and their Application.
SECURICOM 91
[Konferenz- oder Workshop-Beitrag], (1991)

Pfitzmann, Birgit ; Waidner, Michael :
Fail-stop-Signaturen und ihre Anwendung.
Verlässliche Informationssysteme (VIS'91) Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag], (1991)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
Information Security, IFIP/Sec'91
[Konferenz- oder Workshop-Beitrag], (1991)

Waidner, Michael ; Pfitzmann, Birgit :
Loss-tolerant electronic wallet.
{D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference
[Konferenz- oder Workshop-Beitrag], (1991)

Pfitzmann, Andreas ; Waidner, Michael :
Netze mit unbeobachtbarer Kommunikation.
Symposium ``Datenschutz: Komfort und Freiheit des Kunden in der Telekommunikation'' Berliner Datenschutzbeauftragter, Hildegardstr. 28/29, 1000 Berlin 31, Mai 1992
[Konferenz- oder Workshop-Beitrag], (1991)

Pfitzmann, Birgit ; Waidner, Michael :
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
Verlässliche Informationssysteme (VIS'91) Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag], (1991)

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael :
Unconditional Byzantine Agreement with Good Majority.
STACS '91, LNCS 480 Springer-Verlag, Heidelberg
[Konferenz- oder Workshop-Beitrag], (1991)

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael :
A remark on a signature scheme where forgery can be proved.
Eurocrypt '90, LNCS 473 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1991)

Pfitzmann, Birgit ; Waidner, Michael :
Formal Aspects of Fail-stop Signatures.

[Report], (1990)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6) 305--315.
[Artikel], (1990)

Waidner, Michael :
Unconditional Sender and Recipient Untraceability in spite of Active Attacks.
Eurocrypt '89, LNCS 434 Springer-Verlag, Berlin
[Konferenz- oder Workshop-Beitrag], (1990)

Waidner, Michael ; Pfitzmann, Birgit :
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.

[Report], (1990)

Waidner, Michael ; Pfitzmann, Birgit :
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
Eurocrypt '89, LNCS 434 Springer-Verlag, Berlin 1990
[Konferenz- oder Workshop-Beitrag], (1989)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12) 605--622.
[Artikel], (1989)

Waidner, Michael :
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
In: Datenschutz und Datensicherung DuD, 12 (9) 448--459.
[Artikel], (1988)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, 11 (1) 5--7.
[Artikel], (1988)

Waidner, Michael ; Pfitzmann, Birgit :
Anonyme und verlusttolerante elektronische Brieftaschen.

[Report], (1987)

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael :
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6) 293--299.
[Artikel], (1987)

Waidner, Michael ; Pfitzmann, Birgit :
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10) 487--497.
[Artikel], (1987)

Pfitzmann, Andreas ; Waidner, Michael :
Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen.
In: Datenschutz und Datensicherung DuD, 10 (1) 16--22.
[Artikel], (1986)

Pfitzmann, Andreas ; Waidner, Michael :
Networks without user observability---design options.
In: Computer & Security, 6 (2) 158--166.
[Artikel], (1986)

Waidner, Michael :
Datenschutz und Betrugssicherheit garantierende Kommunikationsnetze - Systematisierung der Datenschutzmassnahmen und Ansätze zur Verifikation der Betrugssicherheit.

[Report], (1985)

Diese Liste wurde am Tue Oct 16 03:47:11 2018 CEST generiert.