The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Birgit Pfitzmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Anonymous Fingerprinting with Direct Non-repudiation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:401-414 [Conf]
  2. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Security in Business Process Engineering. [Citation Graph (0, 0)][DBLP]
    Business Process Management, 2003, pp:168-183 [Conf]
  3. Michael Backes, Birgit Pfitzmann, Michael Waidner
    A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf]
  4. Birgit Pfitzmann
    Sorting Out Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:74-85 [Conf]
  5. Birgit Pfitzmann, Michael Waidner
    Composition and integrity preservation of secure reactive systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:245-254 [Conf]
  6. Birgit Pfitzmann, Michael Waidner
    Asymmetric Fingerprinting for Larger Collusions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:151-160 [Conf]
  7. David Chaum, Eugène van Heijst, Birgit Pfitzmann
    Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:470-484 [Conf]
  8. Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann
    On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:250-265 [Conf]
  9. Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
    Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:153-168 [Conf]
  10. Eugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann
    New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:15-30 [Conf]
  11. Birgit Pfitzmann, Michael Waidner
    How To Break and Repair A "Provably Secure" Untraceable Payment System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:338-350 [Conf]
  12. Michael Backes, Birgit Pfitzmann
    Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:204-218 [Conf]
  13. Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
    Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:160-174 [Conf]
  14. Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner
    Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:153-166 [Conf]
  15. Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
    Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:165-178 [Conf]
  16. Michael Backes, Birgit Pfitzmann
    Computational Probabilistic Non-interference. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:1-23 [Conf]
  17. Michael Backes, Birgit Pfitzmann
    Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:178-196 [Conf]
  18. Michael Backes, Birgit Pfitzmann, Matthias Schunter
    A Toolkit for Managing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:162-180 [Conf]
  19. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Symmetric Authentication within a Simulatable Cryptographic Library. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:271-290 [Conf]
  20. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:404-423 [Conf]
  21. Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Browser Model for Security Analysis of Browser-Based Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:489-508 [Conf]
  22. Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner
    The ESPRIT Project CAFE - High Security Digital Payment Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:217-230 [Conf]
  23. Niko Bari, Birgit Pfitzmann
    Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:480-494 [Conf]
  24. Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner
    A Remark on a Signature Scheme Where Forgery Can Be Proved. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:441-445 [Conf]
  25. Birgit Pfitzmann
    Breaking Efficient Anonymous Channel. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:332-340 [Conf]
  26. Birgit Pfitzmann, Andreas Pfitzmann
    How to Break the Direct RSA-Implementation of Mixes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:373-381 [Conf]
  27. Birgit Pfitzmann, Matthias Schunter
    Asymmetric Fingerprinting (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:84-95 [Conf]
  28. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Coin-Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:150-164 [Conf]
  29. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:121-132 [Conf]
  30. Birgit Pfitzmann, Michael Waidner
    Attacks on Protocols for Server-Aided RSA Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:153-162 [Conf]
  31. Birgit Pfitzmann, Michael Waidner
    Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:88-102 [Conf]
  32. Michael Waidner, Birgit Pfitzmann
    The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:690- [Conf]
  33. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Self-Escrowed Cash against User Blackmailing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:42-52 [Conf]
  34. Michael Backes, Christian Jacobi 0002, Birgit Pfitzmann
    Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. [Citation Graph (0, 0)][DBLP]
    FME, 2002, pp:310-329 [Conf]
  35. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Formal Methods and Cryptography. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:612-616 [Conf]
  36. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:1-41 [Conf]
  37. Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
    Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2006, pp:428-445 [Conf]
  38. Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Optimized Self-Synchronizing Mode of Operation. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:78-91 [Conf]
  39. Michael Backes, Birgit Pfitzmann
    A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2003, pp:1-12 [Conf]
  40. Ivan Damgård, Birgit Pfitzmann
    Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP. [Citation Graph (0, 0)][DBLP]
    ICALP, 1998, pp:772-783 [Conf]
  41. Michael Waidner, Birgit Pfitzmann
    Verlusttolerante elektronische Brieftaschen. [Citation Graph (0, 0)][DBLP]
    Fehlertolerierende Rechensysteme, 1987, pp:36-50 [Conf]
  42. André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:117-133 [Conf]
  43. Hans-Jürgen Guth, Birgit Pfitzmann
    Error- and Collusion-Secure Fingerprinting for Digital Data. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:134-145 [Conf]
  44. Birgit Pfitzmann
    Trials of Traced Traitors. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:49-64 [Conf]
  45. Birgit Pfitzmann
    Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:347-350 [Conf]
  46. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:84-95 [Conf]
  47. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:39-51 [Conf]
  48. Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
    ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1991, pp:451-463 [Conf]
  49. Birgit Pfitzmann
    Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2003, pp:189-204 [Conf]
  50. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Optimal Efficiency of Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:113-122 [Conf]
  51. Michael Backes, Birgit Pfitzmann
    On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:233-245 [Conf]
  52. Michael Backes, Birgit Pfitzmann
    Intransitive Non-Interference for Cryptographic Purpose. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:140-0 [Conf]
  53. Michael Backes, Birgit Pfitzmann
    Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:171-182 [Conf]
  54. Birgit Pfitzmann, Michael Waidner
    A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:184-0 [Conf]
  55. Birgit Pfitzmann
    Federated Identity-Management Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:175-177 [Conf]
  56. Birgit Pfitzmann, Michael Waidner
    Federated Identity-Management Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:153-174 [Conf]
  57. Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner
    Unconditional Byzantine Agreement with Good Majority. [Citation Graph (0, 0)][DBLP]
    STACS, 1991, pp:285-295 [Conf]
  58. Birgit Pfitzmann, Michael Waidner
    Unconditional Byzantine Agreement for any Number of Faulty Processors. [Citation Graph (0, 0)][DBLP]
    STACS, 1992, pp:339-350 [Conf]
  59. Michael Backes, Birgit Pfitzmann, Michael Waidner
    A General Composition Theorem for Secure Reactive Systems. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:336-354 [Conf]
  60. Dirk Fox, Birgit Pfitzmann
    Effiziente Software-Implementierung des GMR-Signatursystems. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:329-345 [Conf]
  61. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:329-0 [Conf]
  62. Birgit Pfitzmann, Michael Waidner
    Fail-stop-Signaturen und ihre Anwendung. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:289-301 [Conf]
  63. Birgit Pfitzmann, Michael Waidner
    Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:302-320 [Conf]
  64. Birgit Pfitzmann, Michael Waidner
    Privacy in browser-based attribute exchange. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:52-62 [Conf]
  65. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Trusting Mobile User Devices and Security Modules. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:2, pp:61-68 [Journal]
  66. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Cryptographic Security of Reactive Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
  67. Michael Backes, Birgit Pfitzmann
    Computational probabilistic noninterference. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:1, pp:42-60 [Journal]
  68. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal]
  69. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Reactively secure signature schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:242-252 [Journal]
  70. Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
    Datenschutz garantierende offene Kommunikationsnetze. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1988, v:11, n:3, pp:118-142 [Journal]
  71. Birgit Pfitzmann, Michael Waidner
    Analysis of Liberty Single-Sign-on with Enabled Clients. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:6, pp:38-44 [Journal]
  72. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Polynomial liveness. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:589-617 [Journal]
  73. Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann
    On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:3, pp:163-194 [Journal]
  74. Torben P. Pedersen, Birgit Pfitzmann
    Fail-Stop Signatures. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1997, v:26, n:2, pp:291-330 [Journal]
  75. Birgit Pfitzmann, Michael Waidner
    How to Break Fraud-Detectable Key Recovery. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:1, pp:23-28 [Journal]
  76. Michael Backes, Birgit Pfitzmann
    Relating Symbolic and Cryptographic Secrecy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:109-123 [Journal]
  77. Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann
    Statistical Secrecy and Multibit Commitments. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:3, pp:1143-1151 [Journal]
  78. Birgit Pfitzmann, Michael Waidner
    Strong Loss Tolerance of Electronic Coin Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1997, v:15, n:2, pp:194-213 [Journal]
  79. Birgit Pfitzmann
    Multi-layer Audit of Access Rights. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:18-32 [Conf]

  80. ITBVM: IT Business Value Modeler. [Citation Graph (, )][DBLP]


  81. Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. [Citation Graph (, )][DBLP]


  82. Runtime Monitoring of Metric First-order Temporal Properties. [Citation Graph (, )][DBLP]


  83. Proving a WS-Federation passive requestor profile. [Citation Graph (, )][DBLP]


  84. Proving a WS-federation passive requestor profile with a browser model. [Citation Graph (, )][DBLP]


  85. Regulations Expressed As Logical Models (REALM). [Citation Graph (, )][DBLP]


  86. Application-storage discovery. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002