Publications

Some presentations (titles and, where appropriate, slides) of our research group are listed here.

Some publications of our research group are listed at the end of this page.

Publications of individual researchers can be most easily found at the DBLP Computer Science Bibliography. Please contact the author/s in case you cannot obtain a copy of a specific paper. Students of TU Darmstadt have access to all ACM and IEEE publications, and many others, through the Universitäts- und Landesbibliothek.

Other Publications and Media Information  

Publications of Michael Waidner's Research Groups Prior to 2010

General Information on Publications in Security, Privacy and Cryptography

Publications

2016

Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten

Marco Ghiglieri, Marit Hansen, Maxi Nebel, Julia Victoria Pörschke, Hervais Simo Fhom
Februar 2016
[Online-Edition: https://www.forum-privatheit.de/forum-privatheit-de/impressum/index.php]
[Techreport]

2015

Detection and Forensics of Domains Hijacking

Andreas Borgwart, Spyros Boukoros, Haya Shulman, Michael Waidner, Carel van Royeen
In: IEEE Global Communications Conference, Dezember 2015
IEEE
[Online-Edition: globecom2015.ieee-globecom.org/]
[Inproceedings]

DNSSEC for Cyber Forensics

Haya Shulman, Michael Waidner
In: EURASIP J. Information Security, p. 14, Oktober 2015
[Online-Edition: www.jis.eurasipjournals.com/content/pdf/s13635-014-0016-2.pdf]
[Article]

Towards Security of Internet's Naming Infrastructure

Haya Shulman, Michael Waidner
In: Computer Security ESORICS, September 2015
[Online-Edition: esorics2015.sba-research.org/]
[Inproceedings]

Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze

Marco Ghiglieri, Benjamin Lange, Hervais Simo, Michael Waidner
In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, p. 67-84, Juli 2015
[Online-Edition: https://www.boell.de/de/2015/07/31/digitale-schwellen]
[Inproceedings]

Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten

Marco Ghiglieri, Jan Müller
In: 14. Deutscher IT-Sicherheitskongress, Mai 2015
[Inproceedings]

SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client

Marco Ghiglieri, Florian Oswald
In: 14. Deutscher IT-Sicherheitskongress, Mai 2015
[Inproceedings]

Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?

Amir Herzberg, Haya Shulman
In: Internet Computing, IEEE , p. 80-84, Februar 2015
[Online-Edition: ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7031814]
[Article]

PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices

Marco Ghiglieri
In: IEEE CCNC, Januar 2015
[Inproceedings]

2014

DNS Authentication as a Service: Preventing Amplifikation Attacks

Amir Herzberg, Haya Shulman
In: 30th Annual Computer Security Applications Conference, p. 356-365, Dezember 2014
[Inproceedings]

Less is More: Cipher-Suite Negotiation for DNSSEC

Amir Herzberg, Haya Shulman, Bruno Crispo
In: Computer Security Applications Conference (ACM ACSAC), Dezember 2014
ACSAC, IEEE
[Online-Edition: www.acsac.org/2014/]
[Inproceedings]

HbbTV – aktueller Stand 2014

Marco Ghiglieri
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, Vol. 11/2014, November 2014
[Inproceedings]

Poster: On the Resilience of DNS Infrastructure

Haya Shulman, Shiran Ezra
In: ACM Conference on Computer and Communications Security (ACM CCS), November 2014
ACM
[Online-Edition: www.sigsac.org/ccs/CCS2014/index.html]
[Inproceedings]

Reducing User Tracking through Automatic Web Site State Isolations

Martin Stopczynski, Michael Zugelder
In: Information Security, Vol. 8783, p. 309-327, Oktober 2014
Springer
[Inproceedings]

DNS Security: Past, Present and Future

Amir Herzberg, Haya Shulman
In: Future Security Conference 2014, September 2014
[Inproceedings]

Personal DLP for Facebook

Marco Ghiglieri, Martin Stopczynski, Michael Waidner
In: Pervasive Computing and Communications Workshops (PERCOM Workshops), p. 629 - 634, März 2014
IEEE
[Inproceedings]

Web-Tracking-Report 2014

Markus Schneider, Matthias Enzmann, Martin Stopczynski
Februar 2014
[Techreport]

A Privacy Protection System for HbbTV in Smart TVs

Marco Ghiglieri, Erik Tews
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), p. 648-653, Januar 2014
IEEE
[Inproceedings]

Pretty Bad Privacy: Pitfalls of DNS Encryption

Haya Shulman
In: Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, p. 191-200 (9), 2014
[Online-Edition: https://www.cylab.cmu.edu/news_events/events/wpes2014/]
[Inproceedings]

2013

HbbTV: Neue Funktionen mit möglichen Nebenwirkungen

Marco Ghiglieri, Florian Oswald, Erik Tews
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, Vol. 10/2013, p. 563-566, Oktober 2013
[Inproceedings]

Sichere Nutzung von Cloud-Speicherdiensten

Lukas Kalabis, Ruben Wolf, Thomas Kunz
In: Datenschutz und Datensicherheit, Vol. 37, p. 512-516, August 2013
[Article]

HbbTV - I Know What You Are Watching

Marco Ghiglieri, Florian Oswald, Erik Tews
In: 13. Deutschen IT-Sicherheitskongresses, Mai 2013
SecuMedia Verlags-GmbH
[Inproceedings]

Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass

Marco Ghiglieri, Lukas Kalabis, David Kelm
In: 13. Deutschen IT-Sicherheitskongress, 2013
SecuMedia Verlags-GmbH
[Inproceedings]

2012

SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs

Florian Oswald
Dezember 2012
[Thesis (Master, Bachelor, Diploma)]

Smart Home Dashboard – Das intelligente Energiemanagement

Martin Stopczynski, Marco Ghiglieri
In: VDE KONGRESS 2012 Smart Grid, November 2012
VDE Verlag GmbH
[Online-Edition: www.vde-verlag.de/proceedings-de/453446061.html _blank]
[Inproceedings]

Security Analysis of HTML5 Features

Markus Heinrich
Oktober 2012
[Thesis (Master, Bachelor, Diploma)]

Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds

Florian Kirchbuchner
September 2012
[Thesis (Master, Bachelor, Diploma)]

CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages

Klaus Wilhelmi
August 2012
[Thesis (Master, Bachelor, Diploma)]

Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass

David Kelm
Juli 2012
[Thesis (Master, Bachelor, Diploma)]

C4PS: colors for privacy settings

Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe
In: Proceedings of the 21st international conference companion on World Wide Web, Vol. WWW '12 Companion, p. 585--586, Mai 2012
ACM
[Online-Edition: doi.acm.org/10.1145/2187980.2188139 _blank]
[Inproceedings]

Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps

Natalie Faber
April 2012
[Thesis (Master, Bachelor, Diploma)]

Technical Aspects of Online Privacy

Marco Ghiglieri, Hervais Simo, Michael Waidner
Februar 2012
[Techreport]

Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet

Lukas Kalabis, Annika Selzer
In: Datenschutz und Datensicherheit, Vol. 36, p. 670--675 , 2012
[Article]

C4PS - Helping Facebookers Manage Their Privacy Settings

Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe
In: Social Informatics, p. 188-201, 2012
Springer
[Inproceedings]

2011

Exponent Blinding Does not Always Lift (Partial) SPA Resistance to Higher-Level Security

Werner Schindler, Kouichi Itoh
In: ACNS 2011, p. 73-90, Juni 2011
Springer
[Inproceedings]

Andreas Pfitzmann 1958 - 2010

Hannes Federrath, Marit Hansen, Michael Waidner
In: it - Information Technology, Vol. 53, p. 5--7, 2011
[Article]

Online Privacy: Towards Informational Self-Determination on the Internet

Simone Fischer-Hübner, Chris Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer
In: Dagstuhl Perspectives Workshop 11061, 2011
Dagstuhl Reports
[Inproceedings]

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061)

Simone Fischer-Hübner, Chris Jay Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer
In: Dagstuhl Reports, Vol. 1, p. 1--15, 2011
[Article]

Data network and method for checking nodes of a data network

Birgit Baum-Waidner, Christopher Kenyon, Michael Waidner
2011
[Patent]

Reducing access to sensitive information

Jan Camenisch, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2011
[Patent]

Method and System for Policy Driven Data Distribution

Ivan Milman, Charles Wolfson, Matthias Schunter, Heather Hinton, Michael Waidner
2011
[Patent]

2009

Software protection using an installation product having an entitlement file

Timothy Hahn, Bernard Palmer, Michael Waidner, James Whitmore
2009
[Patent]

Software Protection Using an Installaton Product Having an Entitlement File

Timothy Hahn, Michael Waidner, Jim Whitmore
2009
[Patent]

End-of-Session Authentication

Michael Waidner
2009
[Patent]

2008

Method and Device for Verifying the Security of a Computing Platform

Matthias Schunter, Jonathan Poritz, Michael Waidner, Els Van Herreweghen
2008
[Patent]

2007

Simplified Privacy Controls for Aggregated Services -- Suspend and Resume of Personal Data

Matthias Schunter, Michael Waidner
In: 2007 Workshop on Privacy Enhancing Technologies (PET 2007), 2007
[Inproceedings]

Preface

Michael Backes, David Basin, Michael Waidner
In: Journal of Computer Security, Vol. 15, p. 561, 2007
[Article]

The Reactive Simulatability (RSIM) Framework for Asynchronous Systems

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: Information and Computation, Vol. 205, p. 1685--1720, 2007
[Article]

2006

Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element

Michael Backes, Günter Karjoth, Birgit Pitzmann, Matthias Schunter, Michael Waidner
2006
[Patent]

Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information

Steven Adler, Nigel Brown, Art Gilbert, Charles Palmer, Michael Schnyder, Michael Waidner
2006
[Patent]

Cryptographically Sound Theorem Proving

Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner
In: IEEE Computer Security Foundations Workshop (CSFW), 2006
IEEE Computer Society Press
[Inproceedings]

Reactively Simulatable Certified Mail

Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2006
[Techreport]

Service-oriented Assurance -- Comprehensive Security by Explicit Assurances

Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
In: First Workshop on Quality of Protection 2005 (QoP 2005); Advances in Information Security, p. 13--24, 2006
Springer-Verlag, Berlin
[Inproceedings]

Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks

Zinaida Benenson, Felix Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
In: ESAS'06 European Workshop on Security and Privacy in Ad hoc and Sensor Networks (held in conjunction with ESORICS 2006), 2006
[Inproceedings]

Non-determinism in multi-party computation

Michael Backes, Birgit Pfitzmann, Michael Waidner
2006
[Techreport]

Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: ESORICS '06 (European Symposium on Research in Computer Security), 2006
Springer-Verlag, Berlin
[Inproceedings]

Formal Methods and Cryptography

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: FM 2006: Formal Methods, 2006
Springer-Verlag, Berlin
[Inproceedings]

Soundness limits of Dolev-Yao models

Michael Backes, Birgit Pfitzmann, Michael Waidner
2006
[Techreport]

Method, system and computer program product for privacy-protecting integrity attestation of computing platform

Endre Felix Bangerter, Jan Camenisch, Matthias Schunter, Michael Waidner
2006
[Patent]

2005

Creating a Privacy Policy From a Process Model and Verifying the Compliance

Michael Backes, Guenter Karioth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2005
[Patent]

Service-oriented Assurance -- Comprehensive Security by Explicit Assurances

Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2005
[Techreport]

Trusted Virtual Domains: Secure Foundations for Business and IT Services

Anthony Bussani, John Linwood Griffin, Bernhard Jansen, Klaus Julisch, Günter Karjoth, Hiroshi Maruyama, Megumi Nakamura, Ronald Perez, Matthias Schunter, Axel Tanner, Leendert Van Doorn, Els Van Herreweghen, Michael Waidner, Sachiko Yosh
2005
[Techreport]

On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions

Michael Backes, Birgit Pfitzmann, Michael Waidner
2005
[Techreport]

Justifying a Dolev-Yao Model under Active Attacks

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: Special Issue of International School of Foundations of Security Analysis and Design (FOSAD), 2005
Springer-Verlag, Berlin
[Inproceedings]

Symmetric Authentication Within a Simulatable Cryptographic Library

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: International Journal of Information Security (IJIS), Springer-Verlag, Vol. 4, p. 135--154, 2005
[Article]

Reactively Secure Signature Schemes

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: International Journal of Information Security (IJIS), Vol. 4, p. 242--252, 2005
[Article]

Privacy-protecting Integrity Attestation of a Computing Platform

Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
2005
[Patent]

Digital Rights Management

Birgit Pfitzmann, Michael Waidner
2005
[Patent]

2004

Low-Level Ideal Signatures and General Integrity Idealization

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: 7th Information Security Conference (ISC), 2004
[Inproceedings]

A General Composition Theorem for Secure Reactive Systems

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: Theory of Cryptography Conference (TCC), p. 336--354, 2004
Springer-Verlag, Berlin
[Inproceedings]

Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004

Vijayalakshmi Atluri, Michael Backes, David Basin, Michael Waidner
In: FMSE, 2004
ACM
[Inproceedings]

Polynomial Liveness

Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
In: Journal of Computer Security (JCS), Vol. 12, p. 589--617, 2004
[Article]

Privacy-enhancing identity management

Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner
In: Information Security Technical Report, Elsevier, Vol. 9, p. 35--44, 2004
[Article]

Privacy-enabled Management of Customer Data

Günter Karjoth, Matthias Schunter, Michael Waidner
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer Society, Vol. 27, p. 3--9, 2004
[Article]

Ist Anonymität praktisch realisierbar?

Günter Karjoth, Michael Waidner
In: digma Zeitschrift für Datenrecht und Informationssicherheit, Vol. 4, p. 18--21, 2004
[Article]

Preface

Michael Waidner
In: Int. J. Inf. Sec., Vol. 3, p. 1, 2004
[Article]

Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets

Linda Betz, John Dayka, Walter Farrell, Richard Guski, Günter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2004
[Patent]

Data Processing System

Morton Swimmer, Michael Waidner, Andreas Wespi
2004
[Patent]

2003

Federated Identity-Management Protocols -- Where User Authentication Protocols May Go

Birgit Pfitzmann, Michael Waidner
In: International Workshop on Security Protocols, 2003
[Inproceedings]

Amending P3P for Clearer Privacy Promises

Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 14th International Conference on Database and Expert Systems Applications (DEXA'03)), 2003
[Inproceedings]

A Universally Composable Cryptographic Library

Michael Backes, Birgit Pfitzmann, Michael Waidner
2003
[Techreport]

A Universally Composable Cryptographic Library with Nested Operations

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: 10th ACM Conference on Computer and Communications Security, 2003
[Inproceedings]

Reactively Secure Signature Schemes

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: 6th Information Security Conference (ISC), p. 84--95, 2003
Springer-Verlag, Berlin
[Inproceedings]

Symmetric Authentication Within a Simulatable Cryptographic Library

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: ESORICS 2003, 2003
Springer-Verlag, Berlin
[Inproceedings]

Security in Business Process Engineering

Michael Backes, Birgit Pfitzmann, Michael Waidner
In: Conference on Business Process Management (BPM 2003), p. 168--183, 2003
Springer-Verlag, Berlin
[Inproceedings]

Analysis of Liberty Single-Sign-on with Enabled Clients

Birgit Pfitzmann, Michael Waidner
In: IEEE Internet Computing, Vol. 7, p. 38--44, 2003
[Article]

Anonymous Access to a Service

Jan Camenisch, Els Van Herreweghen, Michael Waidner
2003
[Patent]

Identity Management System Using Single Sign-on

Birgit Pfitzmann, Michael Waidner
2003
[Patent]

2002

Token-based Web Single Signon with Enabled Clients

Birgit Pfitzmann, Michael Waidner
2002
[Techreport]

BBAE -- A General Protocol for Browser-based Attribute Exchange

Birgit Pfitzmann, Michael Waidner
2002
[Techreport]

Privacy in Browser-Based Attribute Exchange

Birgit Pfitzmann, Michael Waidner
In: ACM Workshop on Privacy in the Electronic Society, 2002
ACM
[Inproceedings]

A Formal Model for Multiparty Group Key Agreement

Birgit Pfitzmann, Michael Steiner, Michael Waidner
2002
[Techreport]

Privacy-enabled Services for Enterprises

Günter Karjoth, Matthias Schunter, Michael Waidner
In: TrustBus -- International Workshop on Trust and Privacy in Digital Business (in conjunction with the 13th International Conference on Database and Expert Systems Applications (DEXA'02)), p. 2--6, 2002
Aix-en-Provence
[Inproceedings]

The Platform for Enterprise Privacy Practices -- Privacy-enabled Management of Customer Data

Günter Karjoth, Matthias Schunter, Michael Waidner
In: Workshop on Privacy Enhancing Technologies, p. 14--15, 2002
[Inproceedings]

Privacy-enabled Services for Enterprises

Günter Karjoth, Matthias Schunter, Michael Waidner
2002
[Techreport]

Polynomial Fairness and Liveness

Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
In: IEEE Computer Security Foundations Workshop (CSFW), p. 160--174, 2002
IEEE Computer Society Press
[Inproceedings]

2001

Using a Rules Model to Improve Handling of Personally Identifiable Information

Steven Adler, Endre Bangerter, Nigel Brown, Jan Camenisch, Arthur Gilbert, Günter Karjoth, Dogan Kesdogan, Michael McCullough, Adam Nelson, Charles Palmer, Martin Presler-Marshall, Michael Schnyder, Els Van Herreweghen, Michael Waidner
2001
[Patent]

Using an Object Model to Improve Handling of Personally Identifiable Information

Steven Adler, Endre Bangerter, Kathy Bohrer, Nigel Brown, Jan Camenisch, Arthur Gilbert, Dogan Kesdogan, Matthew Leonard, Xuan Liu, Michael McCullough, Adam Nelson, Charles Palmer, Calvin Powers, Michael Schnyder, Edith Schonberg, Matthias Schunter
2001
[Patent]

MAFTIA---Malicious- and Accidental-Fault Tolerance for Internet Applications

D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. Verissimo, M. Waidner
In: Supplement of the 2001 Int. Conf. on Dependable Systems and Networks, p. D32--D35, 2001
[Inproceedings]

A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission

Birgit Pfitzmann, Michael Waidner
In: IEEE Symposium on Security and Privacy, 2001
[Inproceedings]

The PERSEUS System Architecture

Birgit Pfitzmann, James Riordana, Christian Stüble, Michael Waidner, Arnd Weber
2001
[Techreport]

Die PERSEUS Systemarchitektur

Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, Arnd Weber
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '01, 2001
[Inproceedings]

Unternehmensweites Datenschutzmanagement

Günter Karjoth, Matthias Schunter, Michael Waidner
In: Datenschutz Sommerakademie 2001, 2001
Datenschuts als Wettbewerbsvorteil, Vieweg Verlag
[Inproceedings]

Zurückhaltung bei der Preisgabe von Daten Pseudonyme für den elektronischen Geschäftsverkehr

Jan Camenisch, Michael Waidner
In: Neue Zürcher Zeitung (NZZ), Vol. 9, 2001
[Article]

Relating Cryptography and Cryptographic Protocols

Andre Scedrov, Ran Canetti, Joshua Guttman, David Wagner, Michael Waidner
In: CSFW, p. 111--114, 2001
[Inproceedings]

Secure Password-based Cipher Suite for TLS

Michael Steiner, Peter Buhler, Thomas Eiricha, Michael Waidner
In: ACM Transactions on Information and System Security, Vol. 4, p. 134--157, 2001
[Article]

2000

Composition and Integrity Preservation of Secure Reactive Systems

Birgit Pfitzmann, Michael Waidner
In: 7th ACM Conference on Computer and Communications Security, p. 245--254, 2000
[Inproceedings]

Secure Reactive Systems

Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2000
[Techreport]

Secure Password-based Cipher Suite for TLS

Peter Buhler, Thomas Eirich, Michael Steiner, Michael Waidner
In: Symposium on Network and Distributed Systems Security (NDSS '00), 2000
CA, Internet Society
[Inproceedings]

Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing

Birgit Baum-Waidner, Michael Waidner
In: 27th International Colloquium on Automata, Languages and Programming (ICALP' 2000), p. 524--535, 2000
Springer-Verlag, Berlin
[Inproceedings]

Design, Implementation and Deployment of the iKP Secure Electronic Payment System

Mihir Bellare, Juan Garay, Ralf Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner
In: IEEE Journal on Selected Areas in Communications, Vol. 18, p. 611--627, 2000
[Article]

Electronic Commerce

Simon Field, Michael Waidner
In: Computer Networks, Vol. 32, p. 667--668, 2000
[Article]

SEMPER - Secure Electronic Marketplace for Europe

Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner
2000
Springer-Verlag
[Book]

SEMPER---Security Framework for Electronic Commerce

Gérard Lacoste, Michael Waidner
In: IOS Press, p. 147--157, 2000
[Article]

Cryptographic Security of Reactive Systems

Birgit Pfitzmann, Matthias Schunter, Michael Waidner
In: DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), 2000
[Inproceedings]

Key Agreement in Dynamic Peer Groups

Michael Steiner, Gene Tsudik, Michael Waidner
In: IEEE Transactions on Parallel and Distributed Systems, Vol. 11, p. 769--780, 2000
[Article]

1999

Cybercrime

Michael Waidner
In: IST 99, Workshop ``Towards a Safer Information Society by Combating Cybercrime'', 1999
European Commission
[Inproceedings]

The SEMPER Framework for Secure Electronic Commerce

Matthias Schunter, Michael Waidner, Dale Whinnett
In: Wirtschaftsinformatik 1999, 1999
[Inproceedings]

1998

Open Issues in Secure Electronic Commerce

Michael Waidner
1998
[Techreport]

A protocol suite for key agreement in dynamic groups

Michael Steiner, Gene Tsudik, Michael Waidner
In: The 18th International Conference on Distributed Computing Systems, 1998
IEEE Computer Society
[Inproceedings]

Optimal Efficiency of Optimistic Contract Signing

Birgit Pfitzmann, Matthias Schunter, Michael Waidner
In: ACM Principles of Distributed Computing (PODC), p. 113--122, 1998
[Inproceedings]

Optimistic Asynchronous Multi-Party Contract Signing

Birgit Baum-Waidner, Michael Waidner
1998
[Techreport]

Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol

Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: IEEE Journal on Selected Areas in Communications, Vol. April, Special Issue "Copyright and privacy protection, p. 495--509, 1998
[Article]

Digital Signatures

Birgit Pfitzmann, Michael Waidner
In: Accepted for Encyclopedia of Distributed Computing, edited by Joseph Urban and Partha Dasgupta, Kluwer Academic Publishers, 1998
[Article]

Kopierschutz durch asymmetrisches Fingerprinting (Copy protection by asymmetric fingerprinting)

Birgit Pfitzmann, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 22, p. 258--264, 1998
[Article]

How to Break Fraud-Detectable Key Recovery

Birgit Pfitzmann, Michael Waidner
In: ACM Operating Systems Review, Vol. 32, p. 23--28, 1998
[Article]

A Status Report on the SEMPER Framework for Secure Electronic Commerce

Matthias Schunter, Michael Waidner, Dale Whinnett
In: Computer Networks & ISDN Systems, Vol. 30, p. 1501--1510, 1998
[Article]

1997

Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten

Birgit Pfitzmann, Michael Waidner
In: Verlässliche IT-Systeme, GI-Fachtagung VIS '97, 1997
DuD Fachbeiträge
[Inproceedings]

Anonymous Fingerprinting

Birgit Pfitzmann, Michael Waidner
In: Eurocrypt '97, LNCS 1233, p. 88--102, 1997
Springer-Verlag, Berlin
[Inproceedings]

Architecture and Design of a Secure Electronic Marketplace

Michael Waidner, Matthias Schunter
In: Joint European Networking Conference (JENC8), p. 712.1--712.5, 1997
[Inproceedings]

Trusting mobile user devices and security modules

Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
In: IEEE Computer, Vol. 30, p. 61--68, 1997
[Article]

Strong Loss Tolerance of Electronic Coin Systems

Birgit Pfitzmann, Michael Waidner
In: ACM Transactions on Computer Systems, Vol. 15, p. 194--213, 1997
[Article]

Asymmetric Fingerprinting for Larger Collusions

Birgit Pfitzmann, Michael Waidner
In: 4th ACM Conference on Computer and Communications Security, p. 151--160, 1997
[Inproceedings]

1996

Electronic Payment Systems

Michael Waidner
In: Public Key Solutions, 1996
[Inproceedings]

SEMPER and Applications for Electronic Commerce

Maria Tsakali, Michael Waidner
In: SmartCard 96, p. 13--15, 1996
[Inproceedings]

Diffie-Hellman Key Distribution Extended to Groups

Michael Steiner, Gene Tsudik, Michael Waidner
In: 3rd ACM Conference on Computer and Communications Security, p. 31--37, 1996
ACM Press
[Inproceedings]

Information-Theoretic Pseudosignatures and Byzantine Agreement for t >= n/3

Birgit Pfitzmann, Michael Waidner
1996
[Techreport]

Properties of Payment Systems - General Definition Sketch and Classification

Birgit Pfitzmann, Michael Waidner
1996
[Techreport]

Micro-payments based on iKP

Ralf Hauser, Michael Steiner, Michael Waidner
In: SECURICOM 96, 14th Worldwide Congress on Computer and Communications Security and Protection, p. 67--82, 1996
[Inproceedings]

Electronic Payment over Open Networks

Phil Janson, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 20, p. 10--15, 1996
[Article]

Development of a Secure Electronic Marketplace for Europe

Michael Waidner
In: EDI Forum, Vol. 9, p. 98--106, 1996
[Article]

Keine Angst um Ihr Geld! -- Entwicklung des sicheren Zahlungsverkehrs im Internet

Michael Waidner
In: Neue Zürcher Zeitung (NZZ), Vol. 234, p. B51, 1996
[Article]

1995

How to Break Another "Provably Secure" Payment System

Birgit Pfitzmann, Matthias Schunter, Michael Waidner
In: Eurocrypt 95, LNCS 921, p. 121--132, 1995
Springer-Verlag, Berlin
[Inproceedings]

Secure International Payment and Information Transfer - Towards a Multi-Currency Electronic Wallet

Bob Carter, Birgit Pfitzmann, Matthias Schunter, Chris Stanford, Michael Waidner, Arnd Weber
1995
[Techreport]

iKP -- a family of secure electronic payment protocols

Mihir Bellare, Juan Garay, Ralf Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Michael Waidner
In: Proc. First USENIX Workshop on Electronic Commerce, p. 89--106, 1995
[Inproceedings]

Refinement and Extension of Encrypted Key Exchange

Michael Steiner, Gene Tsudik, Michael Waidner
In: ACM Operating Systems Review, Vol. 29, p. 22--30, 1995
[Article]

1994

Das ESPRIT-Projekt "Conditional Access for Europe"

Michael Waidner
In: 4. GMD-SmartCard Workshop, 1994
[Inproceedings]

A General Framework for Formal Notions of "Secure" Systems

Birgit Pfitzmann, Michael Waidner
1994
[Techreport]

Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar SS 1993 & WS 1993/94

Ludwig Keller, Dietmar Kottmann, Michael Waidner
1994
[Techreport]

The ESPRIT Project CAFE - High Security Digital Payment Systems

Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjolsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner
In: The ESPRIT Project CAFE - High Security Digital Payment Systems; ESORICS '94 (Third European Symposium on Research in Computer Security), Brighton, LNCS 875,, p. 217--230, 1994
Springer-Verlag, Berlin
[Inproceedings]

Europäisches Industrie- und Forschungskonsortium entwickelt neuartiges Zahlungsverfahren

Michael Waidner, Arnd Weber
In: Datenschutz-Berater, Vol. 18, p. 4--7, 1994
[Article]

1993

Attacks on Protocols for Server-Aided RSA Computation

Birgit Pfitzmann, Michael Waidner
In: Eurocrypt '92, LNCS 658, p. 153--162, 1993
Springer-Verlag, Berlin
[Inproceedings]

Datenschutz garantierende offene Kommunikationsnetze; Dokumentation Fachseminar Sicherheit in Netzen

Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: SYSTEMS 93, München, p. 75--121, 1993
[Article]

1992

Unconditional Byzantine Agreement for any Number of Faulty Processors

Birgit Pfitzmann, Michael Waidner
In: STACS 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, LNCS 577, p. 339--350, 1992
Springer-Verlag, Heidelberg
[Inproceedings]

How to Break and Repair a "Provably Secure" Untraceable Payment System

Birgit Pfitzmann, Michael Waidner
In: Crypto '91, LNCS 576, p. 338--350, 1992
Springer-Verlag, Berlin
[Inproceedings]

Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im Informatik-Hauptstudium

Andreas Ort, Ralf Assmann, Gerrit Bleumer, Manfred Böttger, Dirk Fox, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 16, p. 571--579, 1992
[Article]

1991

Loss-tolerant electronic wallet

Michael Waidner, Birgit Pfitzmann
In: {D. Chaum (eds.)}: Smart Card 2000, Selected Papers from the Second International Smart Card 2000 Conference, p. 127--150, 1991
[Inproceedings]

Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit

Birgit Pfitzmann, Michael Waidner
In: Verlässliche Informationssysteme (VIS'91), p. 302--320, 1991
Springer-Verlag, Heidelberg
[Inproceedings]

Fail-stop-Signaturen und ihre Anwendung

Birgit Pfitzmann, Michael Waidner
In: Verlässliche Informationssysteme (VIS'91), p. 289--301, 1991
Springer-Verlag, Heidelberg
[Inproceedings]

Fail-stop Signatures and their Application

Birgit Pfitzmann, Michael Waidner
In: SECURICOM 91, p. 145--160, 1991
[Inproceedings]

ISDN-MIXes - Untraceable Communication with Very Small Bandwidth Overhead

Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: Information Security, IFIP/Sec'91, p. 245--258, 1991
[Inproceedings]

Netze mit unbeobachtbarer Kommunikation

Andreas Pfitzmann, Michael Waidner
In: Symposium ``Datenschutz: Komfort und Freiheit des Kunden in der Telekommunikation'', p. 209--235, 1991
Berliner Datenschutzbeauftragter, Hildegardstr. 28/29, 1000 Berlin 31, Mai 1992
[Inproceedings]

A remark on a signature scheme where forgery can be proved

Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner
In: Eurocrypt '90, LNCS 473, p. 441--445, 1991
Springer-Verlag, Berlin
[Inproceedings]

Unconditional Byzantine Agreement with Good Majority

Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner
In: STACS '91, LNCS 480, p. 285--295, 1991
Springer-Verlag, Heidelberg
[Inproceedings]

Effizientere fail-stop Schlüsselerzeugung für das DC-Netz

Jörg Lukat, Andreas Pfitzmann, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 15, p. 71--75, 1991
[Article]

1990

Unconditional Sender and Recipient Untraceability in spite of Active Attacks

Michael Waidner
In: Eurocrypt '89, LNCS 434, p. 302--319, 1990
Springer-Verlag, Berlin
[Inproceedings]

Formal Aspects of Fail-stop Signatures

Birgit Pfitzmann, Michael Waidner
1990
[Techreport]

Rechtssicherheit trotz Anonymität in offenen digitalen Systemen

Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 14, p. 305--315, 1990
[Article]

1989

The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability

Michael Waidner, Birgit Pfitzmann
In: Eurocrypt '89, LNCS 434, p. 690, 1989
Springer-Verlag, Berlin 1990
[Inproceedings]

Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluss

Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 13, p. 605--622, 1989
[Article]

1988

Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN

Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: PIK, Praxis d. Informationsverarbeitung u. Kommunikation, Vol. 11, p. 5--7, 1988
[Article]

Betrugssicherheit durch kryptographische Protokolle beim Wertetransfer über Kommunikationsnetze

Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 12, p. 448--459, 1988
[Article]

1987

Anonyme und verlusttolerante elektronische Brieftaschen

Michael Waidner, Birgit Pfitzmann
1987
[Techreport]

"Uber die Notwendigkeit genormter kryptographischer Verfahren

Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 11, p. 293--299, 1987
[Article]

Verlusttolerante elektronische Brieftaschen

Michael Waidner, Birgit Pfitzmann
In: Datenschutz und Datensicherung DuD, Vol. 11, p. 487--497, 1987
[Article]

1986

Networks without user observability---design options

Andreas Pfitzmann, Michael Waidner
In: Computer & Security, Vol. 6, p. 158--166, 1986
[Article]

Betrugssicherheit trotz Anonymität: Abrechnung und Geldtransfer in Netzen

Andreas Pfitzmann, Michael Waidner
In: Datenschutz und Datensicherung DuD, Vol. 10, p. 16--22, 1986
[Article]

1985

 

SIT Research Group

Security in Information Technology

Sicherheit in der Informationstechnik

Prof. Dr. Michael Waidner

Upcoming Events

No events found.

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang