The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Waidner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner
    Designing a Generic Payment Service. [Citation Graph (1, 0)][DBLP]
    IBM Systems Journal, 1998, v:37, n:1, pp:72-88 [Journal]
  2. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Security in Business Process Engineering. [Citation Graph (0, 0)][DBLP]
    Business Process Management, 2003, pp:168-183 [Conf]
  3. N. Asokan, Matthias Schunter, Michael Waidner
    Optimistic Protocols for Fair Exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:7-17 [Conf]
  4. Michael Backes, Birgit Pfitzmann, Michael Waidner
    A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf]
  5. Birgit Pfitzmann, Michael Waidner
    Composition and integrity preservation of secure reactive systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:245-254 [Conf]
  6. Birgit Pfitzmann, Michael Waidner
    Asymmetric Fingerprinting for Larger Collusions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:151-160 [Conf]
  7. Michael Steiner, Gene Tsudik, Michael Waidner
    Diffie-Hellman Key Distribution Extended to Group Communication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:31-37 [Conf]
  8. Birgit Pfitzmann, Michael Waidner
    How To Break and Repair A "Provably Secure" Untraceable Payment System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:338-350 [Conf]
  9. Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
    Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:160-174 [Conf]
  10. Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner
    Relating Cryptography and Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:111-114 [Conf]
  11. Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner
    Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:153-166 [Conf]
  12. Michael Waidner, Andreas Pfitzmann
    Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherung, 1985, pp:128-141 [Conf]
  13. Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner
    Amending P3P for Clearer Privacy Promises. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:445-449 [Conf]
  14. Günter Karjoth, Matthias Schunter, Michael Waidner
    Privacy-Enabled Services for Enterprises. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:483-487 [Conf]
  15. Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
    Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:165-178 [Conf]
  16. N. Asokan, Gene Tsudik, Michael Waidner
    Server-Supported Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:131-143 [Conf]
  17. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Symmetric Authentication within a Simulatable Cryptographic Library. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:271-290 [Conf]
  18. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:404-423 [Conf]
  19. Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner
    The ESPRIT Project CAFE - High Security Digital Payment Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:217-230 [Conf]
  20. Michael Waidner
    Development of a Secure Electronic Marketplace for Europe. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:1-14 [Conf]
  21. N. Asokan, Victor Shoup, Michael Waidner
    Optimistic Fair Exchange of Digital Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:591-606 [Conf]
  22. Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner
    A Remark on a Signature Scheme Where Forgery Can Be Proved. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:441-445 [Conf]
  23. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:121-132 [Conf]
  24. Andreas Pfitzmann, Michael Waidner
    Networks Without User Observability: Design Options. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:245-253 [Conf]
  25. Birgit Pfitzmann, Michael Waidner
    Attacks on Protocols for Server-Aided RSA Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:153-162 [Conf]
  26. Birgit Pfitzmann, Michael Waidner
    Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:88-102 [Conf]
  27. Michael Waidner
    Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:302-319 [Conf]
  28. Michael Waidner, Birgit Pfitzmann
    The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:690- [Conf]
  29. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Formal Methods and Cryptography. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:612-616 [Conf]
  30. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:1-41 [Conf]
  31. Birgit Baum-Waidner, Michael Waidner
    Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. [Citation Graph (0, 0)][DBLP]
    ICALP, 2000, pp:524-535 [Conf]
  32. Michael Steiner, Gene Tsudik, Michael Waidner
    CLIQUES: A New Approach to Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1998, pp:380-387 [Conf]
  33. Michael Waidner, Birgit Pfitzmann
    Verlusttolerante elektronische Brieftaschen. [Citation Graph (0, 0)][DBLP]
    Fehlertolerierende Rechensysteme, 1987, pp:36-50 [Conf]
  34. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:84-95 [Conf]
  35. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:39-51 [Conf]
  36. Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
    ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1991, pp:451-463 [Conf]
  37. Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner
    Secure Password-Based Cipher Suite for TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  38. Günter Karjoth, Matthias Schunter, Michael Waidner
    Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:69-84 [Conf]
  39. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Optimal Efficiency of Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:113-122 [Conf]
  40. Birgit Pfitzmann, Michael Waidner
    A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:184-0 [Conf]
  41. Birgit Pfitzmann, Michael Waidner
    Federated Identity-Management Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:153-174 [Conf]
  42. Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner
    Unconditional Byzantine Agreement with Good Majority. [Citation Graph (0, 0)][DBLP]
    STACS, 1991, pp:285-295 [Conf]
  43. Birgit Pfitzmann, Michael Waidner
    Unconditional Byzantine Agreement for any Number of Faulty Processors. [Citation Graph (0, 0)][DBLP]
    STACS, 1992, pp:339-350 [Conf]
  44. Michael Backes, Birgit Pfitzmann, Michael Waidner
    A General Composition Theorem for Secure Reactive Systems. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:336-354 [Conf]
  45. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. [Citation Graph (0, 0)][DBLP]
    VIS, 1995, pp:329-0 [Conf]
  46. Birgit Pfitzmann, Michael Waidner
    Fail-stop-Signaturen und ihre Anwendung. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:289-301 [Conf]
  47. Birgit Pfitzmann, Michael Waidner
    Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. [Citation Graph (0, 0)][DBLP]
    VIS, 1991, pp:302-320 [Conf]
  48. Birgit Pfitzmann, Michael Waidner
    Privacy in browser-based attribute exchange. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:52-62 [Conf]
  49. N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
    State of the art in electronic payment systems. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2000, v:53, n:, pp:426-451 [Journal]
  50. N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner
    Authenticating public terminals. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:861-870 [Journal]
  51. Simon Field, Michael Waidner
    Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:32, n:6, pp:667-668 [Journal]
  52. Matthias Schunter, Michael Waidner, Dale Whinnett
    A Status Report on the SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:16-18, pp:1501-1510 [Journal]
  53. N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
    The State of the Art in Electronic Payment Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:9, pp:28-35 [Journal]
  54. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Trusting Mobile User Devices and Security Modules. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:2, pp:61-68 [Journal]
  55. Günter Karjoth, Matthias Schunter, Michael Waidner
    Privacy-enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:3-9 [Journal]
  56. Birgit Pfitzmann, Matthias Schunter, Michael Waidner
    Cryptographic Security of Reactive Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
  57. Michael Waidner
    Preface. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:1, pp:1- [Journal]
  58. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal]
  59. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Reactively secure signature schemes. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:242-252 [Journal]
  60. Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
    Datenschutz garantierende offene Kommunikationsnetze. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 1988, v:11, n:3, pp:118-142 [Journal]
  61. Birgit Pfitzmann, Michael Waidner
    Analysis of Liberty Single-Sign-on with Enabled Clients. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:6, pp:38-44 [Journal]
  62. N. Asokan, Gene Tsudik, Michael Waidner
    Server-Supported Signatures. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:1, pp:91-108 [Journal]
  63. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Polynomial liveness. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:589-617 [Journal]
  64. Birgit Pfitzmann, Michael Waidner
    How to Break Fraud-Detectable Key Recovery. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:1, pp:23-28 [Journal]
  65. Michael Steiner, Gene Tsudik, Michael Waidner
    Refinement and Extension of Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:3, pp:22-30 [Journal]
  66. Vern Paxson, Michael Waidner
    Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:81- [Journal]
  67. Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner
    Secure password-based cipher suite for TLS. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:2, pp:134-157 [Journal]
  68. Birgit Pfitzmann, Michael Waidner
    Strong Loss Tolerance of Electronic Coin Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1997, v:15, n:2, pp:194-213 [Journal]
  69. Michael Steiner, Gene Tsudik, Michael Waidner
    Key Agreement in Dynamic Peer Groups. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:8, pp:769-780 [Journal]
  70. Matthias Schunter, Michael Waidner, Dale Whinnett
    The SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik, 1999, v:41, n:3, pp:238-247 [Journal]
  71. Matthias Schunter, Michael Waidner
    Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:218-232 [Conf]

  72. Asynchronous Protocols for Optimistic Fair Exchange. [Citation Graph (, )][DBLP]


Search in 0.070secs, Finished in 0.073secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002