|
Search the dblp DataBase
Michael Steiner:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner
Designing a Generic Payment Service. [Citation Graph (1, 0)][DBLP] IBM Systems Journal, 1998, v:37, n:1, pp:72-88 [Journal]
- Giuseppe Ateniese, Michael Steiner, Gene Tsudik
Authenticated Group Key Agreement and Friends. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1998, pp:17-26 [Conf]
- Michael Steiner, Gene Tsudik, Michael Waidner
Diffie-Hellman Key Distribution Extended to Group Communication. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:31-37 [Conf]
- Ran Canetti, Shai Halevi, Michael Steiner
Mitigating Dictionary Attacks on Password-Protected Local Storage. [Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:160-179 [Conf]
- Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:160-174 [Conf]
- Ahmad-Reza Sadeghi, Michael Steiner
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:244-261 [Conf]
- Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner
A Privacy-Protecting Coupon System. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:93-108 [Conf]
- Michael Steiner, Gene Tsudik, Michael Waidner
CLIQUES: A New Approach to Group Key Agreement. [Citation Graph (0, 0)][DBLP] ICDCS, 1998, pp:380-387 [Conf]
- Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner
Secure Password-Based Cipher Suite for TLS. [Citation Graph (0, 0)][DBLP] NDSS, 2000, pp:- [Conf]
- Ran Canetti, Shai Halevi, Michael Steiner
Hardness Amplification of Weakly Verifiable Puzzles. [Citation Graph (0, 0)][DBLP] TCC, 2005, pp:17-33 [Conf]
- N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
State of the art in electronic payment systems. [Citation Graph (0, 0)][DBLP] Advances in Computers, 2000, v:53, n:, pp:426-451 [Journal]
- N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner
Authenticating public terminals. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:8, pp:861-870 [Journal]
- N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner
The State of the Art in Electronic Payment Systems. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1997, v:30, n:9, pp:28-35 [Journal]
- Michael Steiner, Gene Tsudik, Michael Waidner
Refinement and Extension of Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1995, v:29, n:3, pp:22-30 [Journal]
- Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner
Secure password-based cipher suite for TLS. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:2, pp:134-157 [Journal]
- Michael Steiner, Gene Tsudik, Michael Waidner
Key Agreement in Dynamic Peer Groups. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:8, pp:769-780 [Journal]
- Armin Scholl, Laura Manthey, Roland Helm, Michael Steiner
Solving multiattribute design problems with analytic hierarchy process and conjoint analysis: An empirical comparison. [Citation Graph (0, 0)][DBLP] European Journal of Operational Research, 2005, v:164, n:3, pp:760-777 [Journal]
Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]
Risks of the CardSpace Protocol. [Citation Graph (, )][DBLP]
SMash: secure component model for cross-domain mashups on unmodified browsers. [Citation Graph (, )][DBLP]
Search in 0.034secs, Finished in 0.035secs
|