Search the dblp DataBase
Michael Waidner :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
José L. Abad Peiro , N. Asokan , Michael Steiner , Michael Waidner Designing a Generic Payment Service. [Citation Graph (1, 0)][DBLP ] IBM Systems Journal, 1998, v:37, n:1, pp:72-88 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Security in Business Process Engineering. [Citation Graph (0, 0)][DBLP ] Business Process Management, 2003, pp:168-183 [Conf ] N. Asokan , Matthias Schunter , Michael Waidner Optimistic Protocols for Fair Exchange. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:7-17 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner A composable cryptographic library with nested operations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:220-230 [Conf ] Birgit Pfitzmann , Michael Waidner Composition and integrity preservation of secure reactive systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:245-254 [Conf ] Birgit Pfitzmann , Michael Waidner Asymmetric Fingerprinting for Larger Collusions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:151-160 [Conf ] Michael Steiner , Gene Tsudik , Michael Waidner Diffie-Hellman Key Distribution Extended to Group Communication. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:31-37 [Conf ] Birgit Pfitzmann , Michael Waidner How To Break and Repair A "Provably Secure" Untraceable Payment System. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:338-350 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Steiner , Michael Waidner Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:160-174 [Conf ] Andre Scedrov , Ran Canetti , Joshua D. Guttman , David Wagner , Michael Waidner Relating Cryptography and Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:111-114 [Conf ] Christoph Sprenger , Michael Backes , David A. Basin , Birgit Pfitzmann , Michael Waidner Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:153-166 [Conf ] Michael Waidner , Andreas Pfitzmann Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherung, 1985, pp:128-141 [Conf ] Günter Karjoth , Matthias Schunter , Els Van Herreweghen , Michael Waidner Amending P3P for Clearer Privacy Promises. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:445-449 [Conf ] Günter Karjoth , Matthias Schunter , Michael Waidner Privacy-Enabled Services for Enterprises. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:483-487 [Conf ] Zinaida Benenson , Felix C. Freiling , Birgit Pfitzmann , Christian Rohner , Michael Waidner Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ESAS, 2006, pp:165-178 [Conf ] N. Asokan , Gene Tsudik , Michael Waidner Server-Supported Signatures. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:131-143 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Symmetric Authentication within a Simulatable Cryptographic Library. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:271-290 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:404-423 [Conf ] Jean-Paul Boly , Antoon Bosselaers , Ronald Cramer , Rolf Michelsen , Stig Fr. Mjølsnes , Frank Muller , Torben P. Pedersen , Birgit Pfitzmann , Peter de Rooij , Berry Schoenmakers , Matthias Schunter , Luc Vallée , Michael Waidner The ESPRIT Project CAFE - High Security Digital Payment Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:217-230 [Conf ] Michael Waidner Development of a Secure Electronic Marketplace for Europe. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:1-14 [Conf ] N. Asokan , Victor Shoup , Michael Waidner Optimistic Fair Exchange of Digital Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:591-606 [Conf ] Gerrit Bleumer , Birgit Pfitzmann , Michael Waidner A Remark on a Signature Scheme Where Forgery Can Be Proved. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:441-445 [Conf ] Birgit Pfitzmann , Matthias Schunter , Michael Waidner How to Break Another Provably Secure Payment System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:121-132 [Conf ] Andreas Pfitzmann , Michael Waidner Networks Without User Observability: Design Options. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:245-253 [Conf ] Birgit Pfitzmann , Michael Waidner Attacks on Protocols for Server-Aided RSA Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:153-162 [Conf ] Birgit Pfitzmann , Michael Waidner Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:88-102 [Conf ] Michael Waidner Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:302-319 [Conf ] Michael Waidner , Birgit Pfitzmann The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:690- [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Formal Methods and Cryptography. [Citation Graph (0, 0)][DBLP ] FM, 2006, pp:612-616 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP ] FOSAD, 2004, pp:1-41 [Conf ] Birgit Baum-Waidner , Michael Waidner Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. [Citation Graph (0, 0)][DBLP ] ICALP, 2000, pp:524-535 [Conf ] Michael Steiner , Gene Tsudik , Michael Waidner CLIQUES: A New Approach to Group Key Agreement. [Citation Graph (0, 0)][DBLP ] ICDCS, 1998, pp:380-387 [Conf ] Michael Waidner , Birgit Pfitzmann Verlusttolerante elektronische Brieftaschen. [Citation Graph (0, 0)][DBLP ] Fehlertolerierende Rechensysteme, 1987, pp:36-50 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:84-95 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:39-51 [Conf ] Andreas Pfitzmann , Birgit Pfitzmann , Michael Waidner ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. [Citation Graph (0, 0)][DBLP ] Kommunikation in Verteilten Systemen, 1991, pp:451-463 [Conf ] Peter Buhler , Thomas Eirich , Michael Waidner , Michael Steiner Secure Password-Based Cipher Suite for TLS. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Günter Karjoth , Matthias Schunter , Michael Waidner Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:69-84 [Conf ] Birgit Pfitzmann , Matthias Schunter , Michael Waidner Optimal Efficiency of Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP ] PODC, 1998, pp:113-122 [Conf ] Birgit Pfitzmann , Michael Waidner A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:184-0 [Conf ] Birgit Pfitzmann , Michael Waidner Federated Identity-Management Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:153-174 [Conf ] Birgit Baum-Waidner , Birgit Pfitzmann , Michael Waidner Unconditional Byzantine Agreement with Good Majority. [Citation Graph (0, 0)][DBLP ] STACS, 1991, pp:285-295 [Conf ] Birgit Pfitzmann , Michael Waidner Unconditional Byzantine Agreement for any Number of Faulty Processors. [Citation Graph (0, 0)][DBLP ] STACS, 1992, pp:339-350 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner A General Composition Theorem for Secure Reactive Systems. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:336-354 [Conf ] Andreas Pfitzmann , Birgit Pfitzmann , Matthias Schunter , Michael Waidner Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. [Citation Graph (0, 0)][DBLP ] VIS, 1995, pp:329-0 [Conf ] Birgit Pfitzmann , Michael Waidner Fail-stop-Signaturen und ihre Anwendung. [Citation Graph (0, 0)][DBLP ] VIS, 1991, pp:289-301 [Conf ] Birgit Pfitzmann , Michael Waidner Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. [Citation Graph (0, 0)][DBLP ] VIS, 1991, pp:302-320 [Conf ] Birgit Pfitzmann , Michael Waidner Privacy in browser-based attribute exchange. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:52-62 [Conf ] N. Asokan , Philippe A. Janson , Michael Steiner , Michael Waidner State of the art in electronic payment systems. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2000, v:53, n:, pp:426-451 [Journal ] N. Asokan , Hervé Debar , Michael Steiner , Michael Waidner Authenticating public terminals. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:861-870 [Journal ] Simon Field , Michael Waidner Electronic Commerce. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:32, n:6, pp:667-668 [Journal ] Matthias Schunter , Michael Waidner , Dale Whinnett A Status Report on the SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1998, v:30, n:16-18, pp:1501-1510 [Journal ] N. Asokan , Philippe A. Janson , Michael Steiner , Michael Waidner The State of the Art in Electronic Payment Systems. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1997, v:30, n:9, pp:28-35 [Journal ] Andreas Pfitzmann , Birgit Pfitzmann , Matthias Schunter , Michael Waidner Trusting Mobile User Devices and Security Modules. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1997, v:30, n:2, pp:61-68 [Journal ] Günter Karjoth , Matthias Schunter , Michael Waidner Privacy-enabled Management of Customer Data. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 2004, v:27, n:1, pp:3-9 [Journal ] Birgit Pfitzmann , Matthias Schunter , Michael Waidner Cryptographic Security of Reactive Systems. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal ] Michael Waidner Preface. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:1- [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:3, pp:135-154 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Reactively secure signature schemes. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:4, pp:242-252 [Journal ] Andreas Pfitzmann , Birgit Pfitzmann , Michael Waidner Datenschutz garantierende offene Kommunikationsnetze. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 1988, v:11, n:3, pp:118-142 [Journal ] Birgit Pfitzmann , Michael Waidner Analysis of Liberty Single-Sign-on with Enabled Clients. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2003, v:7, n:6, pp:38-44 [Journal ] N. Asokan , Gene Tsudik , Michael Waidner Server-Supported Signatures. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:1, pp:91-108 [Journal ] Michael Backes , Birgit Pfitzmann , Michael Waidner Polynomial liveness. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:3-4, pp:589-617 [Journal ] Birgit Pfitzmann , Michael Waidner How to Break Fraud-Detectable Key Recovery. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:1, pp:23-28 [Journal ] Michael Steiner , Gene Tsudik , Michael Waidner Refinement and Extension of Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1995, v:29, n:3, pp:22-30 [Journal ] Vern Paxson , Michael Waidner Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:81- [Journal ] Michael Steiner , Peter Buhler , Thomas Eirich , Michael Waidner Secure password-based cipher suite for TLS. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:2, pp:134-157 [Journal ] Birgit Pfitzmann , Michael Waidner Strong Loss Tolerance of Electronic Coin Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1997, v:15, n:2, pp:194-213 [Journal ] Michael Steiner , Gene Tsudik , Michael Waidner Key Agreement in Dynamic Peer Groups. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:8, pp:769-780 [Journal ] Matthias Schunter , Michael Waidner , Dale Whinnett The SEMPER Framework for Secure Electronic Commerce. [Citation Graph (0, 0)][DBLP ] Wirtschaftsinformatik, 1999, v:41, n:3, pp:238-247 [Journal ] Matthias Schunter , Michael Waidner Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:218-232 [Conf ] Asynchronous Protocols for Optimistic Fair Exchange. [Citation Graph (, )][DBLP ] Search in 0.070secs, Finished in 0.073secs