The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Steiner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner
    Designing a Generic Payment Service. [Citation Graph (1, 0)][DBLP]
    IBM Systems Journal, 1998, v:37, n:1, pp:72-88 [Journal]
  2. Giuseppe Ateniese, Michael Steiner, Gene Tsudik
    Authenticated Group Key Agreement and Friends. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:17-26 [Conf]
  3. Michael Steiner, Gene Tsudik, Michael Waidner
    Diffie-Hellman Key Distribution Extended to Group Communication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:31-37 [Conf]
  4. Ran Canetti, Shai Halevi, Michael Steiner
    Mitigating Dictionary Attacks on Password-Protected Local Storage. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:160-179 [Conf]
  5. Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
    Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:160-174 [Conf]
  6. Ahmad-Reza Sadeghi, Michael Steiner
    Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:244-261 [Conf]
  7. Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner
    A Privacy-Protecting Coupon System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:93-108 [Conf]
  8. Michael Steiner, Gene Tsudik, Michael Waidner
    CLIQUES: A New Approach to Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1998, pp:380-387 [Conf]
  9. Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner
    Secure Password-Based Cipher Suite for TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  10. Ran Canetti, Shai Halevi, Michael Steiner
    Hardness Amplification of Weakly Verifiable Puzzles. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:17-33 [Conf]
  11. N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
    State of the art in electronic payment systems. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2000, v:53, n:, pp:426-451 [Journal]
  12. N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner
    Authenticating public terminals. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:861-870 [Journal]
  13. N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
    The State of the Art in Electronic Payment Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:9, pp:28-35 [Journal]
  14. Michael Steiner, Gene Tsudik, Michael Waidner
    Refinement and Extension of Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:3, pp:22-30 [Journal]
  15. Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner
    Secure password-based cipher suite for TLS. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:2, pp:134-157 [Journal]
  16. Michael Steiner, Gene Tsudik, Michael Waidner
    Key Agreement in Dynamic Peer Groups. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:8, pp:769-780 [Journal]
  17. Armin Scholl, Laura Manthey, Roland Helm, Michael Steiner
    Solving multiattribute design problems with analytic hierarchy process and conjoint analysis: An empirical comparison. [Citation Graph (0, 0)][DBLP]
    European Journal of Operational Research, 2005, v:164, n:3, pp:760-777 [Journal]

  18. Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]


  19. Risks of the CardSpace Protocol. [Citation Graph (, )][DBLP]


  20. SMash: secure component model for cross-domain mashups on unmodified browsers. [Citation Graph (, )][DBLP]


Search in 0.037secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002