Browse by Person
Up a level |
Pfitzmann, Birgit ; Waidner, Michael (2011)
Efficient browser-based identity management providing personal control and anonymity.
Norm, patent, standard, Bibliographie
Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011)
Reducing access to sensitive information.
Norm, patent, standard, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007)
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12)
Article, Bibliographie
Sprenger, Christoph ; Backes, Michael ; Basin, David ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Cryptographically Sound Theorem Proving.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Formal Methods and Cryptography.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Non-determinism in multi-party computation.
Report, Bibliographie
Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006)
Reactively Simulatable Certified Mail.
Report, Bibliographie
Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006)
Service-oriented Assurance -- Comprehensive Security by Explicit
Assurances.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Soundness limits of Dolev-Yao models.
Report, Bibliographie
Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006)
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer
Ad Hoc Networks.
Conference or Workshop Item, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
European Symposium for Research in Computer Science (ESORICS).
Conference or Workshop Item, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Book, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Conference or Workshop Item, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Browser Model for Security Analysis of Browser-Based Protocols.
Report, Bibliographie
Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005)
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2005)
Digital Rights Management.
Norm, patent, standard, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Justifying a Dolev-Yao Model under Active Attacks.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Workshop on Secure Web Services (SWS).
Conference or Workshop Item, Bibliographie
Sadeghi, Ahmad-Reza ; Groß, Thomas ; Pfitzmann, Birgit (2005)
Proving a WS-Federation Passive Requestor Profile with a Browser Model.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4)
Article, Bibliographie
Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005)
Service-oriented Assurance -- Comprehensive Security by Explicit
Assurances.
Report, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3)
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
A General Composition Theorem for Secure Reactive Systems.
Conference or Workshop Item, Bibliographie
Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004)
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
Norm, patent, standard, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
Low-Level Ideal Signatures and General Integrity Idealization.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004)
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Federated Identity-Management Protocols -- Where User Authentication
Protocols May Go.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Identity Management System Using Single Sign-on.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
Norm, patent, standard, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Reactively Secure Signature Schemes.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Security in Business Process Engineering.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Symmetric Authentication Within a Simulatable Cryptographic Library.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library with Nested Operations.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library.
Report, Bibliographie
Adelsbach, Andre ; Stüble, Christian ; Creese, Sadie ; Pfitzmann, Birgit ; Ryan, Peter Y. A. ; Simmonds, William ; Steinbrecher, Sandra ; Steiner, Michael ; Waidner, Michael
eds.: Adelsbach, Andre ; Steiner, Michael (2002)
Cryptographic Semantics For The Algebraic Models : MAFTIA Deliverable D.
Report, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2002)
BBAE -- A General Protocol for Browser-based Attribute Exchange.
Report, Bibliographie
Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002)
A Formal Model for Multiparty Group Key Agreement.
Report, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002)
Polynomial Fairness and Liveness.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2002)
Privacy in Browser-Based Attribute Exchange.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2002)
Token-based Web Single Signon with Enabled Clients.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Geraldy, Alexander ; Pfitzmann, Birgit (2001)
Optimized Self-Synchronizing Mode of Operation.
Yokohama, Japan
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001)
Die PERSEUS Systemarchitektur.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2001)
A Model for Asynchronous Reactive Systems and its Application to
Secure Message Transmission.
Conference or Workshop Item, Bibliographie
Stüble, Christian ; Pfitzmann, Birgit ; Riordan, James ; Waidner, Michael ; Weber, Arnd (2001)
The PERSEUS System Architecture.
In: Verlässliche Informationssysteme (VIS) '01, DuD Fachbeiträge
Book Section, Bibliographie
Pfitzmann, Birgit ; Riordan, James ; Stüble, Christian ; Waidner, Michael ; Weber, Arnd (2001)
The PERSEUS System Architecture.
Report, Bibliographie
Stüble, Christian ; Pfitzmann, Birgit (2001)
PERSEUS: A Quick Open-source Path to Secure Signatures.
Banff, Canada
Conference or Workshop Item, Bibliographie
Adelsbach, Andre ; Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Proving ownership of digital content.
3rd International Workshop on Information Hiding, IH 1999.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Sadeghi, Ahmad-Reza (2000)
Self-escrowed cash against user black-mailing.
Fourth Conference on Financial Cryptography (FC 2000 Anguilla).
Conference or Workshop Item, Bibliographie
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (2000)
Self-escrowed cash against user black-mailing.
Anguilla, British West Indies
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2000)
Composition and Integrity Preservation of Secure Reactive Systems.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000)
Cryptographic Security of Reactive Systems.
Conference or Workshop Item, Bibliographie
Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2000)
SEMPER - Secure Electronic Marketplace for Europe.
Book, Bibliographie
Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2000)
Secure Reactive Systems.
Report, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (2000)
Secure and Anonymous Electronic Commerce --- Providing Legal Certainty
in Open Digital Systems Without Compromising Anonymity.
Report, Bibliographie
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Coin-based anonymous fingerprinting.
Conference or Workshop Item, Bibliographie
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Book Section, Bibliographie
Sadeghi, Ahmad-Reza ; Pfitzmann, Birgit (1999)
Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen.
In: Verlässliche IT-Systeme, GI-Fachtagung VIS 99
Book Section, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1998)
Digital Signatures.
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph
Urban and Partha Dasgupta, Kluwer Academic Publishers
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1998)
How to Break Fraud-Detectable Key Recovery.
In: ACM Operating Systems Review, 32 (1)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1998)
Kopierschutz durch asymmetrisches Fingerprinting (Copy protection
by asymmetric fingerprinting).
In: Datenschutz und Datensicherung DuD, 22 (5)
Article, Bibliographie
Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1998)
Optimal Efficiency of Optimistic Contract Signing.
Conference or Workshop Item, Bibliographie
Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998)
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1997)
Anonymous Fingerprinting.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1997)
Asymmetric Fingerprinting for Larger Collusions.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1997)
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1997)
Strong Loss Tolerance of Electronic Coin Systems.
In: ACM Transactions on Computer Systems, 15 (2)
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1997)
Trusting mobile user devices and security modules.
In: IEEE Computer, 30 (2)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1996)
Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3.
Report, Bibliographie
Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1996)
Method for Tracing Payment Data in an Anonymous Payment System, as Well as Payment System in Which the Method is Applied.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1996)
Properties of Payment Systems - General Definition Sketch and Classification.
Report, Bibliographie
Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (1995)
How to Break Another "Provably Secure" Payment System.
Conference or Workshop Item, Bibliographie
Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995)
Secure International Payment and Information Transfer - Towards a
Multi-Currency Electronic Wallet.
Report, Bibliographie
Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994)
The ESPRIT Project CAFE - High Security Digital Payment Systems.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1994)
A General Framework for Formal Notions of "Secure" Systems.
Report, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1993)
Attacks on Protocols for Server-Aided RSA Computation.
Conference or Workshop Item, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1993)
Datenschutz garantierende offene Kommunikationsnetze; Dokumentation
Fachseminar Sicherheit in Netzen.
In: SYSTEMS 93, München
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1992)
How to Break and Repair a "Provably Secure" Untraceable Payment System.
Conference or Workshop Item, Bibliographie
Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1992)
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im
Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1992)
Unconditional Byzantine Agreement for any Number of Faulty Processors.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1992)
Unconditionally Untraceable and Fault-tolerant Broadcast and Secret
Ballot Election.
Report, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1991)
Fail-stop Signatures and their Application.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1991)
Fail-stop-Signaturen und ihre Anwendung.
Conference or Workshop Item, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1991)
ISDN-MIXes - Untraceable Communication with Very Small Bandwidth
Overhead.
Conference or Workshop Item, Bibliographie
Waidner, Michael ; Pfitzmann, Birgit (1991)
Loss-tolerant electronic wallet.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1991)
Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit.
Conference or Workshop Item, Bibliographie
Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
Unconditional Byzantine Agreement with Good Majority.
Conference or Workshop Item, Bibliographie
Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
A remark on a signature scheme where forgery can be proved.
Conference or Workshop Item, Bibliographie
Waidner, Michael ; Pfitzmann, Birgit (1990)
The Dining Cryptographers in the Disco: Unconditional Sender and
Recipient Untraceability with Computationally Secure Serviceability.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (1990)
Formal Aspects of Fail-stop Signatures.
Report, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1990)
Rechtssicherheit trotz Anonymität in offenen digitalen Systemen.
In: Datenschutz und Datensicherung DuD, 14 (5--6)
Article, Bibliographie
Waidner, Michael ; Pfitzmann, Birgit (1990)
Unconditional Sender and Recipient Untraceability in spite of Active
Attacks - Some Remarks.
Report, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1989)
Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss.
In: Datenschutz und Datensicherung DuD, 13 (12)
Article, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1988)
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
In: PIK, Praxis der Informationsverarbeitung und Kommunikation, 11 (1)
Article, Bibliographie
Waidner, Michael ; Pfitzmann, Birgit (1987)
Anonyme und verlusttolerante elektronische Brieftaschen.
Report, Bibliographie
Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1987)
"Uber die Notwendigkeit genormter kryptographischer Verfahren.
In: Datenschutz und Datensicherung DuD, 11 (6)
Article, Bibliographie
Waidner, Michael ; Pfitzmann, Birgit (1987)
Verlusttolerante elektronische Brieftaschen.
In: Datenschutz und Datensicherung DuD, 11 (10)
Article, Bibliographie