TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 195.

Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020):
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Conference or Workshop Item]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Conference or Workshop Item]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Conference or Workshop Item]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
pp. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Conference or Workshop Item]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018):
Off-path Attacks Against PKI.
pp. 2213-2215, ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, DOI: 10.1145/3243734.3278516,
[Conference or Workshop Item]

Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
pp. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Conference or Workshop Item]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Denver, CO, USA, [Conference or Workshop Item]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM),
Atlanta, GA, USA, [Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI),
Boston, MA, USA, [Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, pp. 131-144,
USENIX Association, 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Conference or Workshop Item]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052, In: Cryptology and Network Security. CANS 2016,
Springer, Cham, Milano, Italy, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW),
Vienna, Austria, [Conference or Workshop Item]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops,
Toulouse, France, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Ghiglieri, Marco ; Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3), pp. pp. 61-67. [Article]

Shulman, Haya ; Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA),
Louvain La Neuve, Belgium, [Conference or Workshop Item]

Waidner, Michael ; Kasper, Michael (2016):
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
In: DATE 2016 (Design, Automation and Test in Europe),
Dresden, Germany, [Conference or Workshop Item]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference,
IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, (16), p. 14. [Article]

Shulman, Haya ; Waidner, Michael
Pernul, Günther ; Ryan, Michael Y. A. ; Weippl, Edgar (eds.) (2015):
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: Lecture Notes in Computer Science 9326, 1, In: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, pp. 3-22,
Springer-Verlag New York, Inc., Vienna, Austria, ISBN 978-3-319-24173-9,
DOI: 10.1007/978-3-319-24174-6_1,
[Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS,
Vienna, Austria, [Conference or Workshop Item]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research,
[Conference or Workshop Item]

Shannon, Greg ; Waidner, Michael ; Sonalker, Anuja (2015):
Ask The Experts: Cybersecurity.
[Report]

Waidner, Michael (2015):
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.
[Report]

Krauß, Christoph ; Waidner, Michael (2015):
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, 39 (6), pp. 383-387. [Article]

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 629 - 634,
IEEE, Budapest, Hungary, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Shulman, Haya ; Waidner, Michael (2014):
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
In: International Conference on Applied Cryptography and Network Security (ACNS 2014), pp. 531-548,
[Conference or Workshop Item]

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hildebrandt, Mireille (ed.) (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013, pp. 139-164, Amsterdam, Iso Press, ISBN 978-1-61499-294-3 (print) ; 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book Section]

Kalabis, Lukas ; Waidner, Michael
Anzinger, Heribert ; Hamacher, Kay ; Katzenbeisser, Stefan (eds.) (2013):
Federated Identity Management.
In: Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe, pp. 189-218, Berlin, Springer, ISBN 978-3-642-34741-2,
[Book Section]

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4), pp. 305-308. [Article]

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), pp. 189-279, Springer Verlag Heidelberg, ISBN 978-3-642-31942-6,
[Book Section]

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI, 195, In: Sicherheit, pp. 187-198,
GI, Darmstadt, Germany, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Suri, Neeraj ; Waidner, Michael (eds.) (2012):
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt.
In: LNI, 195, GI, [Conference or Workshop Item]

Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1), pp. 5--7. [Article]

Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
7,412,724,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2011):
Efficient browser-based identity management providing personal control and anonymity.
7,992,195,
[Standards, patents]

Milman, Ivan ; Wolfson, Charles ; Schunter, Matthias ; Hinton, Heather ; Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
12/648,876,
[Standards, patents]

Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2), pp. 1--15. [Article]

Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061,
Dagstuhl Reports, [Conference or Workshop Item]

Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011):
Reducing access to sensitive information.
7,941,859,
[Standards, patents]

Waidner, Michael (2009):
End-of-Session Authentication.
12/545,136,
[Standards, patents]

Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
12/393,242,
[Standards, patents]

Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
12/393,242,
[Standards, patents]

Schunter, Matthias ; Poritz, Jonathan ; Waidner, Michael ; Herreweghen, Els Van (2008):
Method and Device for Verifying the Security of a Computing Platform.
7,770,000,
[Standards, patents]

Waidner, Michael (2008):
Method and system for processing of documents with electronic signatures.
WO 2002/055,976,
[Standards, patents]

Backes, Michael ; Basin, David ; Waidner, Michael (2007):
Preface.
In: Journal of Computer Security, 15 (6), p. 561. [Article]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12), pp. 1685--1720. [Article]

Schunter, Matthias ; Waidner, Michael (2007):
Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data.
In: 2007 Workshop on Privacy Enhancing Technologies (PET 2007),
[Conference or Workshop Item]

Sprenger, Christoph ; Backes, Michael ; Basin, David ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Cryptographically Sound Theorem Proving.
In: IEEE Computer Security Foundations Workshop (CSFW),
IEEE Computer Society Press, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
1,675,047,
[Standards, patents]

Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
1,617,587,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, pp. 13--24,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
7,603,317,
[Standards, patents]

Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006),
[Conference or Workshop Item]

Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
11/317,396,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2005):
Digital Rights Management.
WO 2005/076,104,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD),
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
11/178,722,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4), pp. 242--252. [Article]

Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3), pp. 135--154. [Article]

Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]

Swimmer, Morton ; Waidner, Michael ; Wespi, Andreas (2004):
Data Processing System.
2004/0236747 A1,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), pp. 336--354,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
7,617,393,
[Standards, patents]

Karjoth, Günter ; Waidner, Michael (2004):
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1), pp. 18--21. [Article]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC),
[Conference or Workshop Item]

Camenisch, Jan ; Waidner, Michael (2004):
Minimizing information gathered by access decision engines in access control systems.
10/874,431,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4), pp. 589--617. [Article]

Waidner, Michael (2004):
Preface.
In: Int. J. Inf. Sec., 3 (1), p. 1. [Article]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2004):
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, 27 (1), pp. 3--9. [Article]

Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004):
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1), pp. 35--44. [Article]

Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE,
ACM, [Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael (2003):
Amending P3P for Clearer Privacy Promises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)),
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6), pp. 38--44. [Article]

Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael (2003):
Anonymous Access to a Service.
10/432,266,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
7,992,195,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
In: International Workshop on Security Protocols,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Identity Management System Using Single Sign-on.
WO 2003/091861,
[Standards, patents]

Pfitzmann, Birgit ; Waidner, Michael (2003):
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
7,240,362,
[Standards, patents]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), pp. 84--95,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), pp. 168--183,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael (2003):
Translating EPAL to P3P -- How to Keep Enterprise Privacy Promises in Sync With the Actual Practices (Position Papers).
[Report]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security,
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrechner, Sandra ; Steiner, Michael ; Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Pfitzmann, Birgit ; Waidner, Michael (2002):
BBAE -- A General Protocol for Browser-based Attribute Exchange.
[Report]

Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
A Formal Model for Multiparty Group Key Agreement.
[Report]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
In: Workshop on Privacy Enhancing Technologies, pp. 14--15,
[Conference or Workshop Item]

Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), pp. 160--174,
IEEE Computer Society Press, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2002):
Privacy in Browser-Based Attribute Exchange.
In: ACM Workshop on Privacy in the Electronic Society,
ACM, [Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), pp. 2--6,
Aix-en-Provence, [Conference or Workshop Item]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (2002):
Token-based Web Single Signon with Enabled Clients.
[Report]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (2001):
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
In: IEEE Symposium on Security and Privacy,
[Conference or Workshop Item]

Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, pp. 1-18, Vieweg Verlag, [Book Section]

Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Scedrov, Andre ; Canetti, Ran ; Guttman, Joshua ; Wagner, David ; Waidner, Michael (2001):
Relating Cryptography and Cryptographic Protocols.
In: CSFW, pp. 111--114,
[Conference or Workshop Item]

Steiner, Michael ; Buhler, Peter ; Eiricha, Thomas ; Waidner, Michael (2001):
Secure Password-based Cipher Suite for TLS.
In: ACM Transactions on Information and System Security, 4 (2), pp. 134--157. [Article]

Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2001):
Unternehmensweites Datenschutzmanagement.
In: Datenschutz Sommerakademie 2001,
Datenschuts als Wettbewerbsvorteil, Vieweg Verlag, [Conference or Workshop Item]

Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
2003/0014654 A1,
[Standards, patents]

Camenisch, Jan ; Waidner, Michael (2001):
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9, [Article]

Pfitzmann, Birgit ; Waidner, Michael (2000):
Composition and Integrity Preservation of Secure Reactive Systems.
In: 7th ACM Conference on Computer and Communications Security, pp. 245--254,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000):
Cryptographic Security of Reactive Systems.
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS),
[Conference or Workshop Item]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4), pp. 611--627. [Article]

Field, Simon ; Waidner, Michael (2000):
Electronic Commerce.
In: Computer Networks, 32 (6), pp. 667--668. [Article]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (2000):
Key Agreement in Dynamic Peer Groups.
In: IEEE Transactions on Parallel and Distributed Systems, 11 (8), pp. 769--780. [Article]

Baum-Waidner, Birgit ; Waidner, Michael (2000):
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
In: 27th International Colloquium on Automata, Languages and Programming (ICALP' 2000), pp. 524--535,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2000):
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag, [Book]

Lacoste, Gérard ; Waidner, Michael (2000):
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press, pp. 147--157. [Article]

Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael (2000):
Secure Password-based Cipher Suite for TLS.
In: Symposium on Network and Distributed Systems Security (NDSS '00),
CA, Internet Society, [Conference or Workshop Item]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000):
Secure Reactive Systems.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (2000):
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.
[Report]

Waidner, Michael (1999):
Cybercrime.
In: IST 99, Workshop ``Towards a Safer Information Society by Combating Cybercrime'',
European Commission, [Conference or Workshop Item]

Schunter, Matthias ; Waidner, Michael ; Whinnett, Dale (1999):
The SEMPER Framework for Secure Electronic Commerce.
In: Wirtschaftsinformatik 1999,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1998):
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers, [Article]

Pfitzmann, Birgit ; Waidner, Michael (1998):
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1), pp. 23--28. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1998):
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5), pp. 258--264. [Article]

Waidner, Michael (1998):
Open Issues in Secure Electronic Commerce.
[Report]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1998):
Optimal Efficiency of Optimistic Contract Signing.
In: ACM Principles of Distributed Computing (PODC), pp. 113--122,
[Conference or Workshop Item]

Baum-Waidner, Birgit ; Waidner, Michael (1998):
Optimistic Asynchronous Multi-Party Contract Signing.
[Report]

Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998):
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4), pp. 495-509. [Article]

Schunter, Matthias ; Waidner, Michael ; Whinnett, Dale (1998):
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
In: Computer Networks & ISDN Systems, 30, pp. 1501--1510. [Article]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1998):
A protocol suite for key agreement in dynamic groups.
In: The 18th International Conference on Distributed Computing Systems,
IEEE Computer Society, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Anonymous Fingerprinting.
In: Eurocrypt '97, LNCS 1233, pp. 88--102,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Waidner, Michael ; Schunter, Matthias (1997):
Architecture and Design of a Secure Electronic Marketplace.
In: Joint European Networking Conference (JENC8), pp. 712.1--712.5,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Asymmetric Fingerprinting for Larger Collusions.
In: 4th ACM Conference on Computer and Communications Security, pp. 151--160,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '97,
DuD Fachbeiträge, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1997):
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2), pp. 194--213. [Article]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1997):
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2), pp. 61--68. [Article]

Waidner, Michael (1996):
Development of a Secure Electronic Marketplace for Europe.
In: EDI Forum, 9 (2), pp. 98--106. [Article]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1996):
Diffie-Hellman Key Distribution Extended to Groups.
In: 3rd ACM Conference on Computer and Communications Security, pp. 31--37,
ACM Press, [Conference or Workshop Item]

Waidner, Michael (1996):
Electronic Payment Systems.
In: Public Key Solutions,
[Conference or Workshop Item]

Janson, Phil ; Waidner, Michael (1996):
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6), pp. 10--15. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1996):
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.
[Report]

Waidner, Michael (1996):
Keine Angst um Ihr Geld! -- Entwicklung des sicheren Zahlungsverkehrs im Internet.
In: Neue Zürcher Zeitung (NZZ), 234, pp. B51. [Article]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1996):
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
0,836,730,
[Standards, patents]

Hauser, Ralf ; Steiner, Michael ; Waidner, Michael (1996):
Micro-payments based on iKP.
In: SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection, pp. 67--82,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1996):
Properties of Payment Systems - General Definition Sketch and Classification.
[Report]

Tsakali, Maria ; Waidner, Michael (1996):
SEMPER and Applications for Electronic Commerce.
In: SmartCard 96, pp. 13--15,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1995):
How to Break Another "Provably Secure" Payment System.
In: Eurocrypt 95, LNCS 921, pp. 121--132,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995):
Refinement and Extension of Encrypted Key Exchange.
In: ACM Operating Systems Review, 29 (3), pp. 22--30. [Article]

Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX Workshop on Electronic Commerce, pp. 89--106,
[Conference or Workshop Item]

Waidner, Michael (1994):
Das ESPRIT-Projekt "Conditional Access for Europe".
In: 4. GMD-SmartCard Workshop,
[Conference or Workshop Item]

Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, p. 217,
Berlin, Springer-Verlag, [Conference or Workshop Item]

Waidner, Michael ; Weber, Arnd (1994):
Europäisches Industrie- und Forschungskonsortium entwickelt neuartiges Zahlungsverfahren.
In: Datenschutz-Berater, 18 (10), pp. 4--7. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1994):
A General Framework for Formal Notions of "Secure" Systems.
[Report]

Keller, Ludwig ; Kottmann, Dietmar ; Waidner, Michael (1994):
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (1993):
Attacks on Protocols for Server-Aided RSA Computation.
In: Eurocrypt '92, LNCS 658, pp. 153--162,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1993):
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München, pp. 75--121. [Article]

Waidner, Michael (1992):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
[Report]

Pfitzmann, Birgit ; Waidner, Michael (1992):
How to Break and Repair a "Provably Secure" Untraceable Payment System.
In: Crypto '91, LNCS 576, pp. 338--350,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1992):
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11), pp. 571--579. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1992):
Unconditional Byzantine Agreement for any Number of Faulty Processors.
In: STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577, pp. 339--350,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1992):
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.
[Report]

Waidner, Michael (1991):
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.
[Report]

Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael (1991):
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2), pp. 71--75. [Article]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Fail-stop Signatures and their Application.
In: SECURICOM 91, pp. 145--160,
[Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Fail-stop-Signaturen und ihre Anwendung.
In: Verlässliche Informationssysteme (VIS'91), pp. 289--301,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1991):
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
In: Information Security, IFIP/Sec'91, pp. 245--258,
[Conference or Workshop Item]

Waidner, Michael ; Pfitzmann, Birgit (1991):
Loss-tolerant electronic wallet.
In: {D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference, pp. 127--150,
[Conference or Workshop Item]

Pfitzmann, Andreas ; Waidner, Michael (1991):
Netze mit unbeobachtbarer Kommunikation.
In: Symposium ``Datenschutz: Komfort und Freiheit des Kunden in der Telekommunikation'', pp. 209--235,
Berliner Datenschutzbeauftragter, Hildegardstr. 28/29, 1000 Berlin 31, Mai 1992, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1991):
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
In: Verlässliche Informationssysteme (VIS'91), pp. 302--320,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, pp. 285--295,
Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, pp. 441--445,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit ; Waidner, Michael (1990):
Formal Aspects of Fail-stop Signatures.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1990):
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6), pp. 305--315. [Article]

Waidner, Michael (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks.
In: Eurocrypt '89, LNCS 434, pp. 302--319,
Springer-Verlag, Berlin, [Conference or Workshop Item]

Waidner, Michael ; Pfitzmann, Birgit (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.
[Report]

Waidner, Michael ; Pfitzmann, Birgit (1989):
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
In: Eurocrypt '89, LNCS 434, p. 690,
Springer-Verlag, Berlin 1990, [Conference or Workshop Item]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1989):
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12), pp. 605--622. [Article]

Waidner, Michael (1988):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
In: Datenschutz und Datensicherung DuD, 12 (9), pp. 448--459. [Article]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1988):
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, 11 (1), pp. 5--7. [Article]

Waidner, Michael ; Pfitzmann, Birgit (1987):
Anonyme und verlusttolerante elektronische Brieftaschen.
[Report]

Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1987):
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6), pp. 293--299. [Article]

Waidner, Michael ; Pfitzmann, Birgit (1987):
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10), pp. 487--497. [Article]

Pfitzmann, Andreas ; Waidner, Michael (1986):
Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen.
In: Datenschutz und Datensicherung DuD, 10 (1), pp. 16--22. [Article]

Pfitzmann, Andreas ; Waidner, Michael (1986):
Networks without user observability---design options.
In: Computer & Security, 6 (2), pp. 158--166. [Article]

Waidner, Michael (1985):
Datenschutz und Betrugssicherheit garantierende Kommunikationsnetze - Systematisierung der Datenschutzmassnahmen und Ansätze zur Verifikation der Betrugssicherheit.
[Report]

This list was generated on Sat Oct 23 05:21:26 2021 CEST.