The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andreas Pfitzmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Elke Franz, A. Graubner, Anja Jerichow, Andreas Pfitzmann
    Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:111-122 [Conf]
  2. Andreas Pfitzmann
    Festlegung des Ortes und Umfangs von Rücksetzpunkten in Prozeß-Systemen bei der Übersetyung und Berücksichtigung der Programm-Redundanz zur Ausnahmebehandlung. [Citation Graph (0, 0)][DBLP]
    ARCS, 1984, pp:362-377 [Conf]
  3. Maritta Heisel, Andreas Pfitzmann, Thomas Santen
    Confidentiality-Preserving Refinement. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:295-306 [Conf]
  4. Andreas Pfitzmann
    Multilateral Security: Enabling Technologies and Their Evaluation. [Citation Graph (0, 0)][DBLP]
    Informatics, 2001, pp:50-62 [Conf]
  5. Günter Höckel, Andreas Pfitzmann
    Untersuchung der Datenschutzeigenschaften von Ringzugriffsmechanismen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherung, 1985, pp:113-127 [Conf]
  6. Andreas Pfitzmann
    Technischer Datenschutz in dienstintegrierenden Digitalnetzen - Problemanalyse, Lösungsansätze und eine angepasste Systemstruktur. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherung, 1985, pp:96-112 [Conf]
  7. Michael Waidner, Andreas Pfitzmann
    Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherung, 1985, pp:128-141 [Conf]
  8. Stefan Köpsell, Andreas Pfitzmann
    Wie viel Anonymität verträgt unsere Gesellschaft? [Citation Graph (0, 0)][DBLP]
    DFN-Arbeitstagung über Kommunikationsnetze, 2003, pp:13-26 [Conf]
  9. Oliver Berthold, Andreas Pfitzmann, Ronny Standtke
    The Disadvantages of Free MIX Routes and how to Overcome Them. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:30-45 [Conf]
  10. Andreas Pfitzmann, Marit Köhntopp
    Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:1-9 [Conf]
  11. Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitzmann
    Usable presentation of secure pseudonyms. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:70-76 [Conf]
  12. Thomas Santen, Maritta Heisel, Andreas Pfitzmann
    Confidentiality-Preserving Refinement is Compositional - Sometimes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:194-211 [Conf]
  13. Andreas Pfitzmann
    Multilateral Security: Enabling Technologies and Their Evaluation. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:1-13 [Conf]
  14. Birgit Pfitzmann, Andreas Pfitzmann
    How to Break the Direct RSA-Implementation of Mixes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:373-381 [Conf]
  15. Andreas Pfitzmann, Michael Waidner
    Networks Without User Observability: Design Options. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:245-253 [Conf]
  16. Hermann Härtig, Thomas Krause, Andreas Pfitzmann
    Rechnerunterstützte Konstruktion von Spezialrechnern aus Programmen anwendungsorientierter höherer Programmiersprachen. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1982, pp:105-119 [Conf]
  17. Andreas Pfitzmann
    Ein Vermittlungs-/Verteilnetz zur Erhöhung des Datenschutzes in Bildschirm-ähnlichen Neuen Medien. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1983, pp:411-418 [Conf]
  18. Andreas Pfitzmann, Hermann Härtig
    Grenzwerte der Zurverlässigkeit von Parallel-Serien-Systemen. [Citation Graph (0, 0)][DBLP]
    Fehlertolerierende Rechensysteme, 1982, pp:1-16 [Conf]
  19. Andreas Pfitzmann
    Strategien zur Festlegung von Rücksetzpunkten in Prozeß-Systemen unter Berücksichtigung der Programm-Redundanz zur Ausnahmebehandlung. [Citation Graph (0, 0)][DBLP]
    Software-Fehlertoleranz und -Zuverlässigkeit, 1984, pp:105-117 [Conf]
  20. Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
    Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:579-587 [Conf]
  21. Andreas Pfitzmann, Alexander Schill, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner
    A Java-Based Distributed Platform for Multilateral Security. [Citation Graph (0, 0)][DBLP]
    Trends in Distributed Systems for Electronic Commerce, 1998, pp:52-64 [Conf]
  22. Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann
    Efficiency Improvements of the Private Message Service. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:112-125 [Conf]
  23. Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    MIXes in Mobile Communication Systems: Location Management with Privacy. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:121-135 [Conf]
  24. Elke Franz, Anja Jerichow, Steffen Möller, Andreas Pfitzmann, Ingo Stierand
    Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:7-21 [Conf]
  25. Elke Franz, Andreas Pfitzmann
    Steganography Secure against Cover-Stego-Attacks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:29-46 [Conf]
  26. Andreas Westfeld, Andreas Pfitzmann
    Attacks on Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:61-76 [Conf]
  27. Jan Zöllner, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf
    Modeling the Security of Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:344-354 [Conf]
  28. Hannes Federrath, Elke Franz, Anja Jerichow, Jan Müller, Andreas Pfitzmann
    Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren: Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1997, pp:77-91 [Conf]
  29. Andreas Mann, Andreas Pfitzmann
    Technischer Datenschutz und Fehlertoleranz in Kommunikationssystemen. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1987, pp:16-30 [Conf]
  30. Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
    ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1991, pp:451-463 [Conf]
  31. Andreas Pfitzmann, Alexander Schill, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner
    Flexible mehrseitige Sicherheit für verteilte Anwendungen. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1999, pp:132-143 [Conf]
  32. Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann
    On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:243-255 [Conf]
  33. Katrin Borcea, Hilko Donker, Elke Franz, Andreas Pfitzmann, Hagen Wahrig
    Towards Privacy-Aware eLearning. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:167-178 [Conf]
  34. Claudia Díaz, George Danezis, Christian Grothoff, Andreas Pfitzmann, Paul F. Syverson
    Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:242-242 [Conf]
  35. Andreas Pfitzmann
    Why Safety and Security Should and Will Merge. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2004, pp:1-2 [Conf]
  36. Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann
    Location management strategies increasing privacy in mobile communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:39-48 [Conf]
  37. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:329-0 [Conf]
  38. Gritta Wolf, Andreas Pfitzmann
    Properties of protection goals and their integration into a user interface. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:32, n:6, pp:685-700 [Journal]
  39. Marit Hansen, Kristian Köhntopp, Andreas Pfitzmann
    The Open Source approach opportunities and limitations with respect to security and privacy. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:461-471 [Journal]
  40. Andreas Pfitzmann, Ralf Aßmann
    More efficient software implementations of (generalized) DES. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:5, pp:477-500 [Journal]
  41. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Trusting Mobile User Devices and Security Modules. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:2, pp:61-68 [Journal]
  42. Hannes Federrath, Andreas Pfitzmann
    Gliederung und Systematisierung von Schutzzielen in IT-Systemen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:12, pp:- [Journal]
  43. Kristian Köhntopp, Marit Köhntopp, Andreas Pfitzmann
    Sicherheit durch Open Source? - Chancen und Grenzen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:9, pp:- [Journal]
  44. Andreas Pfitzmann
    Entwicklung der Informations- und Kommunikationstechnik. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2001, v:25, n:4, pp:- [Journal]
  45. Andreas Pfitzmann
    Datenschutz durch Technik - Vorschlag für eine Systematik. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 1999, v:23, n:7, pp:- [Journal]
  46. Alexander Roßnagel, Andreas Pfitzmann, Hans-Jürgen Garstka
    Modernisierung des Datenschutzrechts. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2001, v:25, n:5, pp:- [Journal]
  47. Ronald Aigner, Henrike Berthold, Elke Franz, Steffen Göbel, Hermann Härtig, Heinrich Hußmann, Klaus Meißner, Klaus Meyer-Wegener, Marcus Meyerhöfer, Andreas Pfitzmann, Simone Röttger, Alexander Schill, Thomas Springer, Frank Wehner
    COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 2003, v:18, n:1, pp:39-40 [Journal]
  48. Andreas Pfitzmann, Alexander Schill, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner
    SSONET: Systemunterstützung für mehrseitige Sicherheit in offenen Datennetzen. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1999, v:14, n:2, pp:95-108 [Journal]
  49. Elke Franz, Andreas Pfitzmann
    Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1998, v:21, n:4, pp:183-193 [Journal]
  50. Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
    Datenschutz garantierende offene Kommunikationsnetze. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1988, v:11, n:3, pp:118-142 [Journal]
  51. Gritta Wolf, Andreas Pfitzmann
    Charakteristika von Schutzzielen und Konsequenzen fuer Benutzungsschnittstellen. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2000, v:23, n:3, pp:173-191 [Journal]
  52. Andreas Pfitzmann
    Biometrie - wie einsetzen und wie keinesfalls? [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2006, v:29, n:5, pp:353-356 [Journal]
  53. Marit Hansen, Katrin Borcea-Pfitzmann, Andreas Pfitzmann
    PRIME - Ein europäisches Projekt fur nutzerbestimmtes Identitätsmanagement. [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2005, v:47, n:6, pp:352-359 [Journal]
  54. Hanns-Wilhelm Heibey, Andreas Pfitzmann, Ulrich Sandl
    Kryptographie - Herausforderung für Staat und Gesellschaft. [Citation Graph (0, 0)][DBLP]
    LOG IN, 1996, v:16, n:5/6, pp:37-0 [Journal]
  55. Guntram Wicke, Michaela Huhn, Andreas Pfitzmann, Peter Stahlknecht
    Kryptoregulierung. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1997, v:39, n:3, pp:279-282 [Journal]

  56. 05411 Abstracts Collection -- Anonymous Communication and its Applications. [Citation Graph (, )][DBLP]


  57. Biometrics - How to Put to Use and How Not at All?. [Citation Graph (, )][DBLP]


  58. Value exchange systems enabling security and unobservability. [Citation Graph (, )][DBLP]


  59. Digital payment systems enabling security and unobservability. [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002