TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 188.

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference or Workshop Item]

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Conference or Workshop Item]

Göhring, Matthias and Shulman, Haya and Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Conference or Workshop Item]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, [Conference or Workshop Item]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI), Boston, MA, USA, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Conference or Workshop Item]

Dai, Tianxiang and Shulman, Haya and Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: Cryptology and Network Security. CANS 2016, Springer, Cham, Milano, Italy, In: vol 10052, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW), Vienna, Austria, [Conference or Workshop Item]

Feldmann, Anja and Heyder, Philipp and Kreutzer, Michael and Schmid, Stefan and Seifert, Jean-Pierre and Shulman, Haya and Thimmaraju, Kashyap and Waidner, Michael and Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops, Toulouse, France, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Borgwart, Andreas and Shulman, Haya and Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference or Workshop Item]

Ghiglieri, Marco and Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, pp. pp. 61-67, vol. 14, no., (IEEE 14/3), [Article]

Shulman, Haya and Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA), Louvain La Neuve, Belgium, [Conference or Workshop Item]

Waidner, Michael and Kasper, Michael (2016):
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
In: DATE 2016 (Design, Automation and Test in Europe), Dresden, Germany, [Conference or Workshop Item]

Borgwart, Andreas and Boukoros, Spyros and Shulman, Haya and Waidner, Michael and van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, p. 14, (16), [Article]

Shulman, Haya and Waidner, Michael
Pernul, Günther and Ryan, Michael Y. A. and Weippl, Edgar (eds.) (2015):
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, Springer-Verlag New York, Inc., Vienna, Austria, In: Lecture Notes in Computer Science 9326, 1, ISBN 978-3-319-24173-9,
DOI: 10.1007/978-3-319-24174-6_1,
[Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS, Vienna, Austria, [Conference or Workshop Item]

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, In: Weiterdenken, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research, [Conference or Workshop Item]

Shannon, Greg and Waidner, Michael and Sonalker, Anuja (2015):
Ask The Experts: Cybersecurity.
[Report]

Waidner, Michael (2015):
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.
[Report]

Krauß, Christoph and Waidner, Michael (2015):
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, pp. 383-387, 39(6), [Article]

Ghiglieri, Marco and Stopczynski, Martin and Waidner, Michael (2014):
Personal DLP for Facebook.
In: Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, Budapest, Hungary, In: 6, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2014):
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
In: International Conference on Applied Cryptography and Network Security (ACNS 2014), [Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Kalabis, Lukas and Waidner, Michael
Anzinger, Heribert and Hamacher, Kay and Katzenbeisser, Stefan (eds.) (2013):
Federated Identity Management.
In: Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe, Berlin, Springer, pp. 189-218, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-34741-2],
[Book Section]

Kreutzer, Michael and Waidner, Michael and Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, pp. 305-308, 35, (4), [Article]

Kelbert, Florian and Shirazi, Fatemeh and Simo, Hervais and Wüchner, Tobias and Buchmann, Johannes and Pretschner, Alexander and Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), Springer Verlag Heidelberg, pp. 189-279, [Book Section]

Kauer, Michaela and Pfeiffer, Thomas and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: Sicherheit, GI, Darmstadt, Germany, In: LNI, 195, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Ghiglieri, Marco and Simo, Hervais and Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Suri, Neeraj and Waidner, Michael (eds.) (2012):
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt.
GI, In: LNI, 195, [Conference or Workshop Item]

Federrath, Hannes and Hansen, Marit and Waidner, Michael (2011):
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, pp. 5--7, 53, (1), [Article]

Baum-Waidner, Birgit and Kenyon, Christopher and Waidner, Michael (2011):
Data network and method for checking nodes of a data network.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2011):
Efficient browser-based identity management providing personal control and anonymity.
[Standards, patents]

Milman, Ivan and Wolfson, Charles and Schunter, Matthias and Hinton, Heather and Waidner, Michael (2011):
Method and System for Policy Driven Data Distribution.
[Standards, patents]

Fischer-Hübner, Simone and Hoofnagle, Chris Jay and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, pp. 1--15, 1, (2), [Article]

Fischer-Hübner, Simone and Hoofnagle, Chris and Rannenberg, Kai and Waidner, Michael and Krontiris, Ioannis and Marhöfer, Michael (2011):
Online Privacy: Towards Informational Self-Determination on the Internet.
In: Dagstuhl Perspectives Workshop 11061, Dagstuhl Reports, [Conference or Workshop Item]

Camenisch, Jan and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2011):
Reducing access to sensitive information.
[Standards, patents]

Waidner, Michael (2009):
End-of-Session Authentication.
[Standards, patents]

Hahn, Timothy and Waidner, Michael and Whitmore, Jim (2009):
Software Protection Using an Installaton Product Having an Entitlement File.
[Standards, patents]

Hahn, Timothy and Palmer, Bernard and Waidner, Michael and Whitmore, James (2009):
Software protection using an installation product having an entitlement file.
[Standards, patents]

Schunter, Matthias and Poritz, Jonathan and Waidner, Michael and Herreweghen, Els Van (2008):
Method and Device for Verifying the Security of a Computing Platform.
[Standards, patents]

Waidner, Michael (2008):
Method and system for processing of documents with electronic signatures.
[Standards, patents]

Backes, Michael and Basin, David and Waidner, Michael (2007):
Preface.
In: Journal of Computer Security, p. 561, 15, (6), [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2007):
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, pp. 1685--1720, 205, (12), [Article]

Schunter, Matthias and Waidner, Michael (2007):
Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data.
In: 2007 Workshop on Privacy Enhancing Technologies (PET 2007), [Conference or Workshop Item]

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael (2006):
Cryptographically Sound Theorem Proving.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Formal Methods and Cryptography.
In: FM 2006: Formal Methods, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
In: ESORICS '06 (European Symposium on Research in Computer Security), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Karjoth, Günter and Pitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
[Standards, patents]

Bangerter, Endre Felix and Camenisch, Jan and Schunter, Matthias and Waidner, Michael (2006):
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Non-determinism in multi-party computation.
[Report]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Reactively Simulatable Certified Mail.
[Report]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2006):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2006):
Soundness limits of Dolev-Yao models.
[Report]

Adler, Steven and Brown, Nigel and Gilbert, Art and Palmer, Charles and Schnyder, Michael and Waidner, Michael (2006):
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Benenson, Zinaida and Freiling, Felix and Pfitzmann, Birgit and Rohner, Christian and Waidner, Michael (2006):
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006), [Conference or Workshop Item]

Backes, Michael and Karioth, Guenter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2005):
Digital Rights Management.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Justifying a Dolev-Yao Model under Active Attacks.
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
[Report]

Bangerter, Endre and Schunter, Matthias and Waidner, Michael and Camenisch, Jan (2005):
Privacy-protecting Integrity Attestation of a Computing Platform.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), pp. 242--252, 4, (4), [Article]

Karjoth, Günter and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2005):
Service-oriented Assurance -- Comprehensive Security by Explicit Assurances.
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2005):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, pp. 135--154, 4, (3), [Article]

Bussani, Anthony and Griffin, John Linwood and Jansen, Bernhard and Julisch, Klaus and Karjoth, Günter and Maruyama, Hiroshi and Nakamura, Megumi and Perez, Ronald and Schunter, Matthias and Tanner, Axel and Doorn, Leendert Van and Herreweghen, Els Van and Waidner, Michael and Yosh, Sachiko (2005):
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
[Report]

Swimmer, Morton and Waidner, Michael and Wespi, Andreas (2004):
Data Processing System.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
A General Composition Theorem for Secure Reactive Systems.
In: Theory of Cryptography Conference (TCC), Springer-Verlag, Berlin, [Conference or Workshop Item]

Betz, Linda and Dayka, John and Farrell, Walter and Guski, Richard and Karjoth, Günter and Nelson, Mark and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2004):
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
[Standards, patents]

Karjoth, Günter and Waidner, Michael (2004):
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, pp. 18--21, 4, (1), [Article]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2004):
Low-Level Ideal Signatures and General Integrity Idealization.
In: 7th Information Security Conference (ISC), [Conference or Workshop Item]

Camenisch, Jan and Waidner, Michael (2004):
Minimizing information gathered by access decision engines in access control systems.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2004):
Polynomial Liveness.
In: Journal of Computer Security (JCS), pp. 589--617, 12, (3-4), [Article]

Waidner, Michael (2004):
Preface.
In: Int. J. Inf. Sec., p. 1, 3, (1), [Article]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2004):
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, pp. 3--9, 27, (1), [Article]

Hansen, Marit and Berlich, Peter and Camenisch, Jan and Clauß, Sebastian and Pfitzmann, Andreas and Waidner, Michael (2004):
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, pp. 35--44, 9, (1), [Article]

Atluri, Vijayalakshmi and Backes, Michael and Basin, David and Waidner, Michael (2004):
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
In: FMSE, ACM, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Herreweghen, Els Van and Waidner, Michael (2003):
Amending P3P for Clearer Privacy Promises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)), [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2003):
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, pp. 38--44, 7, (6), [Article]

Camenisch, Jan and Herreweghen, Els Van and Waidner, Michael (2003):
Anonymous Access to a Service.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Federated Identity-Management Protocols -- Where User Authentication Protocols May Go.
In: International Workshop on Security Protocols, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2003):
Identity Management System Using Single Sign-on.
[Standards, patents]

Pfitzmann, Birgit and Waidner, Michael (2003):
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
[Standards, patents]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Reactively Secure Signature Schemes.
In: 6th Information Security Conference (ISC), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Security in Business Process Engineering.
In: Conference on Business Process Management (BPM 2003), Springer-Verlag, Berlin, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: ESORICS 2003, Springer-Verlag, Berlin, [Conference or Workshop Item]

Schunter, Matthias and Herreweghen, Els Van and Waidner, Michael (2003):
Translating EPAL to P3P -- How to Keep Enterprise Privacy Promises in Sync With the Actual Practices (Position Papers).
[Report]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library with Nested Operations.
In: 10th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael (2003):
A Universally Composable Cryptographic Library.
[Report]

Adelsbach, Andre and Stüble, Christian and Creese, Sadie and Pfitzmann, Birgit and Ryan, Peter Y. A. and Simmonds, William and Steinbrechner, Sandra and Steiner, Michael and Waidner, Michael (2002):
Cryptographic Semantics For The Algebraic Models.
(MAF­TIA De­li­ver­a­ble D), [Report]

Pfitzmann, Birgit and Waidner, Michael (2002):
BBAE -- A General Protocol for Browser-based Attribute Exchange.
[Report]

Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2002):
A Formal Model for Multiparty Group Key Agreement.
[Report]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data.
In: Workshop on Privacy Enhancing Technologies, [Conference or Workshop Item]

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2002):
Polynomial Fairness and Liveness.
In: IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2002):
Privacy in Browser-Based Attribute Exchange.
In: ACM Workshop on Privacy in the Electronic Society, ACM, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), Aix-en-Provence, [Conference or Workshop Item]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2002):
Privacy-enabled Services for Enterprises.
[Report]

Pfitzmann, Birgit and Waidner, Michael (2002):
Token-based Web Single Signon with Enabled Clients.
[Report]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
Die PERSEUS Systemarchitektur.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (2001):
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
In: IEEE Symposium on Security and Privacy, [Conference or Workshop Item]

Stüble, Christian and Pfitzmann, Birgit and Riordan, James and Waidner, Michael and Weber, Arnd (2001):
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge, Vieweg Verlag, pp. 1-18, [Book Section]

Pfitzmann, Birgit and Riordan, James and Stüble, Christian and Waidner, Michael and Weber, Arnd (2001):
The PERSEUS System Architecture.
[Report]

Scedrov, Andre and Canetti, Ran and Guttman, Joshua and Wagner, David and Waidner, Michael (2001):
Relating Cryptography and Cryptographic Protocols.
In: CSFW, [Conference or Workshop Item]

Steiner, Michael and Buhler, Peter and Eiricha, Thomas and Waidner, Michael (2001):
Secure Password-based Cipher Suite for TLS.
In: ACM Transactions on Information and System Security, pp. 134--157, 4, (2), [Article]

Karjoth, Günter and Schunter, Matthias and Waidner, Michael (2001):
Unternehmensweites Datenschutzmanagement.
In: Datenschutz Sommerakademie 2001, Datenschuts als Wettbewerbsvorteil, Vieweg Verlag, [Conference or Workshop Item]

Adler, Steven and Bangerter, Endre and Brown, Nigel and Camenisch, Jan and Gilbert, Arthur and Karjoth, Günter and Kesdogan, Dogan and McCullough, Michael and Nelson, Adam and Palmer, Charles and Presler-Marshall, Martin and Schnyder, Michael and Herreweghen, Els Van and Waidner, Michael (2001):
Using a Rules Model to Improve Handling of Personally Identifiable Information.
[Standards, patents]

Camenisch, Jan and Waidner, Michael (2001):
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9, [Article]

Pfitzmann, Birgit and Waidner, Michael (2000):
Composition and Integrity Preservation of Secure Reactive Systems.
In: 7th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Cryptographic Security of Reactive Systems.
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), [Conference or Workshop Item]

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Herreweghen, Els Van and Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, pp. 611--627, 18, (4), [Article]

Field, Simon and Waidner, Michael (2000):
Electronic Commerce.
In: Computer Networks, pp. 667--668, 32, (6), [Article]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (2000):
Key Agreement in Dynamic Peer Groups.
In: IEEE Transactions on Parallel and Distributed Systems, pp. 769--780, 11, (8), [Article]

Baum-Waidner, Birgit and Waidner, Michael (2000):
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
In: 27th International Colloquium on Automata, Languages and Programming (ICALP' 2000), Springer-Verlag, Berlin, [Conference or Workshop Item]

Lacoste, Gérard and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael (2000):
SEMPER - Secure Electronic Marketplace for Europe.
Springer-Verlag, [Book]

Lacoste, Gérard and Waidner, Michael (2000):
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press, pp. 147--157, [Article]

Buhler, Peter and Eirich, Thomas and Steiner, Michael and Waidner, Michael (2000):
Secure Password-based Cipher Suite for TLS.
In: Symposium on Network and Distributed Systems Security (NDSS '00), CA, Internet Society, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (2000):
Secure Reactive Systems.
[Report]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (2000):
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty in Open Digital Systems Without Compromising Anonymity.
[Report]

Waidner, Michael (1999):
Cybercrime.
In: IST 99, Workshop ``Towards a Safer Information Society by Combating Cybercrime'', European Commission, [Conference or Workshop Item]

Schunter, Matthias and Waidner, Michael and Whinnett, Dale (1999):
The SEMPER Framework for Secure Electronic Commerce.
In: Wirtschaftsinformatik 1999, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1998):
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers, [Article]

Pfitzmann, Birgit and Waidner, Michael (1998):
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, pp. 23--28, 32, (1), [Article]

Pfitzmann, Birgit and Waidner, Michael (1998):
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, pp. 258--264, 22, (5), [Article]

Waidner, Michael (1998):
Open Issues in Secure Electronic Commerce.
[Report]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1998):
Optimal Efficiency of Optimistic Contract Signing.
In: ACM Principles of Distributed Computing (PODC), [Conference or Workshop Item]

Baum-Waidner, Birgit and Waidner, Michael (1998):
Optimistic Asynchronous Multi-Party Contract Signing.
[Report]

Jerichow, Anja and Müller, Jan and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1998):
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, pp. 495--509, April, Special Issue "Cop, [Article]

Schunter, Matthias and Waidner, Michael and Whinnett, Dale (1998):
A Status Report on the SEMPER Framework for Secure Electronic Commerce.
In: Computer Networks & ISDN Systems, pp. 1501--1510, 30, [Article]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (1998):
A protocol suite for key agreement in dynamic groups.
In: The 18th International Conference on Distributed Computing Systems, IEEE Computer Society, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1997):
Anonymous Fingerprinting.
In: Eurocrypt '97, LNCS 1233, Springer-Verlag, Berlin, [Conference or Workshop Item]

Waidner, Michael and Schunter, Matthias (1997):
Architecture and Design of a Secure Electronic Marketplace.
In: Joint European Networking Conference (JENC8), [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1997):
Asymmetric Fingerprinting for Larger Collusions.
In: 4th ACM Conference on Computer and Communications Security, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1997):
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '97, DuD Fachbeiträge, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1997):
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, pp. 194--213, 15, (2), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1997):
Trusting mobile user devices and security modules.
In: IEEE Computer, pp. 61--68, 30, (2), [Article]

Waidner, Michael (1996):
Development of a Secure Electronic Marketplace for Europe.
In: EDI Forum, pp. 98--106, 9, (2), [Article]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (1996):
Diffie-Hellman Key Distribution Extended to Groups.
In: 3rd ACM Conference on Computer and Communications Security, ACM Press, [Conference or Workshop Item]

Waidner, Michael (1996):
Electronic Payment Systems.
In: Public Key Solutions, [Conference or Workshop Item]

Janson, Phil and Waidner, Michael (1996):
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, pp. 10--15, 20, (6), [Article]

Pfitzmann, Birgit and Waidner, Michael (1996):
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.
[Report]

Waidner, Michael (1996):
Keine Angst um Ihr Geld! -- Entwicklung des sicheren Zahlungsverkehrs im Internet.
In: Neue Zürcher Zeitung (NZZ), pp. B51, 234, [Article]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1996):
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
[Standards, patents]

Hauser, Ralf and Steiner, Michael and Waidner, Michael (1996):
Micro-payments based on iKP.
In: SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1996):
Properties of Payment Systems - General Definition Sketch and Classification.
[Report]

Tsakali, Maria and Waidner, Michael (1996):
SEMPER and Applications for Electronic Commerce.
In: SmartCard 96, [Conference or Workshop Item]

Pfitzmann, Birgit and Schunter, Matthias and Waidner, Michael (1995):
How to Break Another "Provably Secure" Payment System.
In: Eurocrypt 95, LNCS 921, Springer-Verlag, Berlin, [Conference or Workshop Item]

Steiner, Michael and Tsudik, Gene and Waidner, Michael (1995):
Refinement and Extension of Encrypted Key Exchange.
In: ACM Operating Systems Review, pp. 22--30, 29, (3), [Article]

Carter, Bob and Pfitzmann, Birgit and Schunter, Matthias and Stanford, Chris and Waidner, Michael and Weber, Arnd (1995):
Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet.
[Report]

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX Workshop on Electronic Commerce, [Conference or Workshop Item]

Waidner, Michael (1994):
Das ESPRIT-Projekt "Conditional Access for Europe".
In: 4. GMD-SmartCard Workshop, [Conference or Workshop Item]

Boly, Jean-Paul and Bosselaers, Antoon and Cramer, Ronald and Michelsen, Rolf and Mjolsnes, Stig and Muller, Frank and Pedersen, Torben and Pfitzmann, Birgit and de Rooij, Peter and Schoenmakers, Berry and Schunter, Matthias and Vallée, Luc and Waidner, Michael (1994):
The ESPRIT Project CAFE - High Security Digital Payment Systems.
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, Springer-Verlag, Berlin, [Conference or Workshop Item]

Waidner, Michael and Weber, Arnd (1994):
Europäisches Industrie- und Forschungskonsortium entwickelt neuartiges Zahlungsverfahren.
In: Datenschutz-Berater, pp. 4--7, 18, (10), [Article]

Pfitzmann, Birgit and Waidner, Michael (1994):
A General Framework for Formal Notions of "Secure" Systems.
[Report]

Keller, Ludwig and Kottmann, Dietmar and Waidner, Michael (1994):
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1993):
Attacks on Protocols for Server-Aided RSA Computation.
In: Eurocrypt '92, LNCS 658, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1993):
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München, pp. 75--121, [Article]

Waidner, Michael (1992):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
[Report]

Pfitzmann, Birgit and Waidner, Michael (1992):
How to Break and Repair a "Provably Secure" Untraceable Payment System.
In: Crypto '91, LNCS 576, Springer-Verlag, Berlin, [Conference or Workshop Item]

Ort, Andreas and Assmann, Ralf and Bleumer, Gerrit and Böttger, Manfred and Fox, Dirk and Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1992):
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, pp. 571--579, 16, (11), [Article]

Pfitzmann, Birgit and Waidner, Michael (1992):
Unconditional Byzantine Agreement for any Number of Faulty Processors.
In: STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577, Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1992):
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret Ballot Election.
[Report]

Waidner, Michael (1991):
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.
[Report]

Lukat, Jörg and Pfitzmann, Andreas and Waidner, Michael (1991):
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, pp. 71--75, 15, (2), [Article]

Pfitzmann, Birgit and Waidner, Michael (1991):
Fail-stop Signatures and their Application.
In: SECURICOM 91, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Fail-stop-Signaturen und ihre Anwendung.
In: Verlässliche Informationssysteme (VIS'91), Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1991):
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead.
In: Information Security, IFIP/Sec'91, [Conference or Workshop Item]

Waidner, Michael and Pfitzmann, Birgit (1991):
Loss-tolerant electronic wallet.
In: {D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference, [Conference or Workshop Item]

Pfitzmann, Andreas and Waidner, Michael (1991):
Netze mit unbeobachtbarer Kommunikation.
In: Symposium ``Datenschutz: Komfort und Freiheit des Kunden in der Telekommunikation'', Berliner Datenschutzbeauftragter, Hildegardstr. 28/29, 1000 Berlin 31, Mai 1992, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1991):
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
In: Verlässliche Informationssysteme (VIS'91), Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Baum-Waidner, Birgit and Pfitzmann, Birgit and Waidner, Michael (1991):
Unconditional Byzantine Agreement with Good Majority.
In: STACS '91, LNCS 480, Springer-Verlag, Heidelberg, [Conference or Workshop Item]

Bleumer, Gerrit and Pfitzmann, Birgit and Waidner, Michael (1991):
A remark on a signature scheme where forgery can be proved.
In: Eurocrypt '90, LNCS 473, Springer-Verlag, Berlin, [Conference or Workshop Item]

Pfitzmann, Birgit and Waidner, Michael (1990):
Formal Aspects of Fail-stop Signatures.
[Report]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1990):
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, pp. 305--315, 14, (5--6), [Article]

Waidner, Michael (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks.
In: Eurocrypt '89, LNCS 434, Springer-Verlag, Berlin, [Conference or Workshop Item]

Waidner, Michael and Pfitzmann, Birgit (1990):
Unconditional Sender and Recipient Untraceability in spite of Active Attacks - Some Remarks.
[Report]

Waidner, Michael and Pfitzmann, Birgit (1989):
The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability.
In: Eurocrypt '89, LNCS 434, Springer-Verlag, Berlin 1990, [Conference or Workshop Item]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1989):
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, pp. 605--622, 13, (12), [Article]

Waidner, Michael (1988):
Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze.
In: Datenschutz und Datensicherung DuD, pp. 448--459, 12, (9), [Article]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1988):
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, pp. 5--7, 11, (1), [Article]

Waidner, Michael and Pfitzmann, Birgit (1987):
Anonyme und verlusttolerante elektronische Brieftaschen.
[Report]

Pfitzmann, Andreas and Pfitzmann, Birgit and Waidner, Michael (1987):
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, pp. 293--299, 11, (6), [Article]

Waidner, Michael and Pfitzmann, Birgit (1987):
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, pp. 487--497, 11, (10), [Article]

Pfitzmann, Andreas and Waidner, Michael (1986):
Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen.
In: Datenschutz und Datensicherung DuD, pp. 16--22, 10, (1), [Article]

Pfitzmann, Andreas and Waidner, Michael (1986):
Networks without user observability---design options.
In: Computer & Security, pp. 158--166, 6, (2), [Article]

Waidner, Michael (1985):
Datenschutz und Betrugssicherheit garantierende Kommunikationsnetze - Systematisierung der Datenschutzmassnahmen und Ansätze zur Verifikation der Betrugssicherheit.
[Report]

This list was generated on Sat Oct 19 01:56:36 2019 CEST.