Search the dblp DataBase
Birgit Pfitzmann :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Birgit Pfitzmann , Ahmad-Reza Sadeghi Anonymous Fingerprinting with Direct Non-repudiation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:401-414 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Security in Business Process Engineering. [Citation Graph (0, 0)][DBLP ] Business Process Management, 2003, pp:168-183 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf ] Birgit Pfitzmann Sorting Out Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:74-85 [Conf ] Birgit Pfitzmann , Michael Waidner Composition and integrity preservation of secure reactive systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:245-254 [Conf ] Birgit Pfitzmann , Michael Waidner Asymmetric Fingerprinting for Larger Collusions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:151-160 [Conf ] David Chaum , Eugène van Heijst , Birgit Pfitzmann Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:470-484 [Conf ] Ivan Damgård , Torben P. Pedersen , Birgit Pfitzmann On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:250-265 [Conf ] Oded Goldreich , Birgit Pfitzmann , Ronald L. Rivest Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:153-168 [Conf ] Eugène van Heijst , Torben P. Pedersen , Birgit Pfitzmann New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:15-30 [Conf ] Birgit Pfitzmann , Michael Waidner How To Break and Repair A "Provably Secure" Untraceable Payment System. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:338-350 [Conf ] Michael Backes , Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:204-218 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Steiner , Michael Waidner Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:160-174 [Conf ] Christoph Sprenger , Michael Backes , David A. Basin , Birgit Pfitzmann , Michael Waidner Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:153-166 [Conf ] Zinaida Benenson , Felix C. Freiling , Birgit Pfitzmann , Christian Rohner , Michael Waidner Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:165-178 [Conf ] Michael Backes , Birgit Pfitzmann Computational Probabilistic Non-interference. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:1-23 [Conf ] Michael Backes , Birgit Pfitzmann Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:178-196 [Conf ] Michael Backes , Birgit Pfitzmann , Matthias Schunter A Toolkit for Managing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:162-180 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Symmetric Authentication within a Simulatable Cryptographic Library. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:271-290 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:404-423 [Conf ] Thomas Groß , Birgit Pfitzmann , Ahmad-Reza Sadeghi Browser Model for Security Analysis of Browser-Based Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:489-508 [Conf ] Jean-Paul Boly , Antoon Bosselaers , Ronald Cramer , Rolf Michelsen , Stig Fr. Mjølsnes , Frank Muller , Torben P. Pedersen , Birgit Pfitzmann , Peter de Rooij , Berry Schoenmakers , Matthias Schunter , Luc Vallée , Michael Waidner The ESPRIT Project CAFE - High Security Digital Payment Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:217-230 [Conf ] Niko Bari , Birgit Pfitzmann Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:480-494 [Conf ] Gerrit Bleumer , Birgit Pfitzmann , Michael Waidner A Remark on a Signature Scheme Where Forgery Can Be Proved. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:441-445 [Conf ] Birgit Pfitzmann Breaking Efficient Anonymous Channel. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:332-340 [Conf ] Birgit Pfitzmann , Andreas Pfitzmann How to Break the Direct RSA-Implementation of Mixes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:373-381 [Conf ] Birgit Pfitzmann , Matthias Schunter Asymmetric Fingerprinting (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:84-95 [Conf ] Birgit Pfitzmann , Ahmad-Reza Sadeghi Coin-Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:150-164 [Conf ] Birgit Pfitzmann , Matthias Schunter , Michael Waidner How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:121-132 [Conf ] Birgit Pfitzmann , Michael Waidner Attacks on Protocols for Server-Aided RSA Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:153-162 [Conf ] Birgit Pfitzmann , Michael Waidner Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:88-102 [Conf ] Michael Waidner , Birgit Pfitzmann The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:690- [Conf ] Birgit Pfitzmann , Ahmad-Reza Sadeghi Self-Escrowed Cash against User Blackmailing. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:42-52 [Conf ] Michael Backes , Christian Jacobi 0002 , Birgit Pfitzmann Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. [Citation Graph (0, 0)][DBLP ] FME, 2002, pp:310-329 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Formal Methods and Cryptography. [Citation Graph (0, 0)][DBLP ] FM, 2006, pp:612-616 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP ] FOSAD, 2004, pp:1-41 [Conf ] Michael Backes , Sebastian Mödersheim , Birgit Pfitzmann , Luca Viganò Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2006, pp:428-445 [Conf ] Ammar Alkassar , Alexander Geraldy , Birgit Pfitzmann , Ahmad-Reza Sadeghi Optimized Self-Synchronizing Mode of Operation. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:78-91 [Conf ] Michael Backes , Birgit Pfitzmann A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2003, pp:1-12 [Conf ] Ivan Damgård , Birgit Pfitzmann Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP. [Citation Graph (0, 0)][DBLP ] ICALP, 1998, pp:772-783 [Conf ] Michael Waidner , Birgit Pfitzmann Verlusttolerante elektronische Brieftaschen. [Citation Graph (0, 0)][DBLP ] Fehlertolerierende Rechensysteme, 1987, pp:36-50 [Conf ] André Adelsbach , Birgit Pfitzmann , Ahmad-Reza Sadeghi Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:117-133 [Conf ] Hans-Jürgen Guth , Birgit Pfitzmann Error- and Collusion-Secure Fingerprinting for Digital Data. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:134-145 [Conf ] Birgit Pfitzmann Trials of Traced Traitors. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:49-64 [Conf ] Birgit Pfitzmann Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:347-350 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:84-95 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:39-51 [Conf ] Andreas Pfitzmann , Birgit Pfitzmann , Michael Waidner ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1991, pp:451-463 [Conf ] Birgit Pfitzmann Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2003, pp:189-204 [Conf ] Birgit Pfitzmann , Matthias Schunter , Michael Waidner Optimal Efficiency of Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP ] PODC, 1998, pp:113-122 [Conf ] Michael Backes , Birgit Pfitzmann On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:233-245 [Conf ] Michael Backes , Birgit Pfitzmann Intransitive Non-Interference for Cryptographic Purpose. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:140-0 [Conf ] Michael Backes , Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:171-182 [Conf ] Birgit Pfitzmann , Michael Waidner A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:184-0 [Conf ] Birgit Pfitzmann Federated Identity-Management Protocols (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:175-177 [Conf ] Birgit Pfitzmann , Michael Waidner Federated Identity-Management Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:153-174 [Conf ] Birgit Baum-Waidner , Birgit Pfitzmann , Michael Waidner Unconditional Byzantine Agreement with Good Majority. [Citation Graph (0, 0)][DBLP ] STACS, 1991, pp:285-295 [Conf ] Birgit Pfitzmann , Michael Waidner Unconditional Byzantine Agreement for any Number of Faulty Processors. [Citation Graph (0, 0)][DBLP ] STACS, 1992, pp:339-350 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner A General Composition Theorem for Secure Reactive Systems. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:336-354 [Conf ] Dirk Fox , Birgit Pfitzmann Effiziente Software-Implementierung des GMR-Signatursystems. [Citation Graph (0, 0)][DBLP ] VIS, 1991, pp:329-345 [Conf ] Andreas Pfitzmann , Birgit Pfitzmann , Matthias Schunter , Michael Waidner Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. [Citation Graph (0, 0)][DBLP ] VIS, 1995, pp:329-0 [Conf ] Birgit Pfitzmann , Michael Waidner Fail-stop-Signaturen und ihre Anwendung. [Citation Graph (0, 0)][DBLP ] VIS, 1991, pp:289-301 [Conf ] Birgit Pfitzmann , Michael Waidner Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. [Citation Graph (0, 0)][DBLP ] VIS, 1991, pp:302-320 [Conf ] Birgit Pfitzmann , Michael Waidner Privacy in browser-based attribute exchange. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:52-62 [Conf ] Andreas Pfitzmann , Birgit Pfitzmann , Matthias Schunter , Michael Waidner Trusting Mobile User Devices and Security Modules. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1997, v:30, n:2, pp:61-68 [Journal ] Birgit Pfitzmann , Matthias Schunter , Michael Waidner Cryptographic Security of Reactive Systems. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal ] Michael Backes , Birgit Pfitzmann Computational probabilistic noninterference. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:42-60 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Reactively secure signature schemes. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:4, pp:242-252 [Journal ] Andreas Pfitzmann , Birgit Pfitzmann , Michael Waidner Datenschutz garantierende offene Kommunikationsnetze. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 1988, v:11, n:3, pp:118-142 [Journal ] Birgit Pfitzmann , Michael Waidner Analysis of Liberty Single-Sign-on with Enabled Clients. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2003, v:7, n:6, pp:38-44 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Polynomial liveness. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:3-4, pp:589-617 [Journal ] Ivan Damgård , Torben P. Pedersen , Birgit Pfitzmann On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1997, v:10, n:3, pp:163-194 [Journal ] Torben P. Pedersen , Birgit Pfitzmann Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1997, v:26, n:2, pp:291-330 [Journal ] Birgit Pfitzmann , Michael Waidner How to Break Fraud-Detectable Key Recovery. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:1, pp:23-28 [Journal ] Michael Backes , Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:109-123 [Journal ] Ivan Damgård , Torben P. Pedersen , Birgit Pfitzmann Statistical Secrecy and Multibit Commitments. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:3, pp:1143-1151 [Journal ] Birgit Pfitzmann , Michael Waidner Strong Loss Tolerance of Electronic Coin Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1997, v:15, n:2, pp:194-213 [Journal ] Birgit Pfitzmann Multi-layer Audit of Access Rights. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:18-32 [Conf ] ITBVM: IT Business Value Modeler. [Citation Graph (, )][DBLP ] Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. [Citation Graph (, )][DBLP ] Runtime Monitoring of Metric First-order Temporal Properties. [Citation Graph (, )][DBLP ] Proving a WS-Federation passive requestor profile. [Citation Graph (, )][DBLP ] Proving a WS-federation passive requestor profile with a browser model. [Citation Graph (, )][DBLP ] Regulations Expressed As Logical Models (REALM). [Citation Graph (, )][DBLP ] Application-storage discovery. [Citation Graph (, )][DBLP ] Search in 0.024secs, Finished in 0.028secs