default search action
Michael Waidner
Person information
- affiliation: National Research Center for Applied Cybersecurity ATHENE, germany
- affiliation: Technische Universität Darmstadt, Germany
- affiliation: Fraunhofer-Institut für sichere Informationstechnologie SIT, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Haya Schulmann, Michael Waidner:
Wie Deutschland zur Cybernation wird. Datenschutz und Datensicherheit (dud) 48(1): 11-15 (2024) - [c117]Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner:
Protocol Fixes for KeyTrap Vulnerabilities. ANRW 2024 - [c116]Nethanel Gelernter, Haya Schulmann, Michael Waidner:
External Attack-Surface of Modern Organizations. AsiaCCS 2024 - [c115]Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner:
The CURE to Vulnerabilities in RPKI Validation. NDSS 2024 - [c114]Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner:
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. NSDI 2024 - [c113]Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. WOOT @ USENIX Security Symposium 2024: 45-57 - [i26]Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. CoRR abs/2403.15233 (2024) - [i25]Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner:
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. CoRR abs/2403.19368 (2024) - [i24]Jens Friess, Donika Mirdita, Haya Schulmann, Michael Waidner:
Byzantine-Secure Relying Party for Resilient RPKI. CoRR abs/2405.00531 (2024) - [i23]Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner:
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC. CoRR abs/2406.03133 (2024) - [i22]Donika Mirdita, Haya Schulmann, Michael Waidner:
SoK: An Introspective Analysis of RPKI Security. CoRR abs/2408.12359 (2024) - [i21]Haya Schulmann, Niklas Vogel, Michael Waidner:
RPKI: Not Perfect But Good Enough. CoRR abs/2409.14518 (2024) - 2023
- [j39]Haya Schulmann, Michael Waidner:
Aktive Cyberabwehr. Datenschutz und Datensicherheit 47(8): 497-502 (2023) - [j38]Jens Friess, Haya Schulmann, Michael Waidner:
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates. PACMNET 1(CoNEXT3): 26:1-26:20 (2023) - [c112]Fabian Kaiser, Haya Schulmann, Michael Waidner:
Poster: Longitudinal Analysis of DoS Attacks. CCS 2023: 3573-3575 - [c111]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Beyond Limits: How to Disable Validators in Secure Networks. SIGCOMM 2023: 950-966 - [c110]Elias Heftrig, Haya Schulmann, Michael Waidner:
Poster: Off-Path DNSSEC Downgrade Attacks. SIGCOMM 2023: 1120-1122 - [c109]Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner:
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. USENIX Security Symposium 2023: 4841-4858 - [c108]Elias Heftrig, Haya Schulmann, Michael Waidner:
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. USENIX Security Symposium 2023: 7429-7444 - [i20]Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner:
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet. CoRR abs/2303.11772 (2023) - [i19]Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner:
The CURE To Vulnerabilities in RPKI Validation. CoRR abs/2312.01872 (2023) - 2022
- [j37]Elisa Bertino, Haya Schulmann, Michael Waidner:
Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022) - [c107]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Behind the Scenes of RPKI. CCS 2022: 1413-1426 - [c106]Elias Heftrig, Haya Schulmann, Michael Waidner:
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. CCS 2022: 3363-3365 - [c105]Donika Mirdita, Haya Schulmann, Michael Waidner:
Poster: RPKI Kill Switch. CCS 2022: 3423-3425 - [c104]Haya Schulmann, Niklas Vogel, Michael Waidner:
Poster: Insights into Global Deployment of RPKI Validation. CCS 2022: 3467-3469 - [c103]Haya Schulmann, Michael Waidner:
Poster: DNS in Routers Considered Harmful. CCS 2022: 3471-3473 - [c102]Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Smart RPKI Validation: Avoiding Errors and Preventing Hijacks. ESORICS (1) 2022: 509-530 - [c101]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Stalloris: RPKI Downgrade Attack. USENIX Security Symposium 2022: 4455-4471 - [c100]Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner:
XDRI Attacks - and - How to Enhance Resilience of Residential Routers. USENIX Security Symposium 2022: 4473-4490 - [i18]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. CoRR abs/2205.05473 (2022) - [i17]Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Stalloris: RPKI Downgrade Attack. CoRR abs/2205.06064 (2022) - [i16]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
From IP to transport and beyond: cross-layer attacks against applications. CoRR abs/2205.06085 (2022) - [i15]Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner:
XDRI Attacks - and - How to Enhance Resilience of Residential Routers. CoRR abs/2208.12003 (2022) - 2021
- [c99]Tianxiang Dai, Haya Schulmann, Michael Waidner:
DNS-over-TCP considered vulnerable. ANRW 2021: 76-81 - [c98]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Let's Downgrade Let's Encrypt. CCS 2021: 1421-1440 - [c97]Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol:
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425 - [c96]Markus Brandt, Haya Schulmann, Michael Waidner:
Evaluating Resilience of Domains in PKI. CCS 2021: 2444-2446 - [c95]Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner:
The Master and Parasite Attack. DSN 2021: 141-148 - [c94]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Poster: Off-path VoIP Interception Attacks. ICDCS 2021: 1-2 - [c93]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Poster: Fragmentation Attacks on DNS over TCP. ICDCS 2021: 1124-1125 - [c92]Tomas Hlavacek, Haya Schulmann, Michael Waidner:
Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments. INFOCOM Workshops 2021: 1-2 - [c91]Haya Schulmann, Michael Waidner:
SSLChecker. INFOCOM Workshops 2021: 1-2 - [c90]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
From IP to transport and beyond: cross-layer attacks against applications. SIGCOMM 2021: 836-849 - [c89]Tianxiang Dai, Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources. USENIX Security Symposium 2021: 3147-3164 - [e7]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents] - [e6]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents] - [i14]Lukas Baumann, Elias Heftrig, Haya Schulmann, Michael Waidner:
The Master and Parasite Attack. CoRR abs/2107.06415 (2021) - 2020
- [c88]Daniel Senf, Haya Schulmann, Michael Waidner:
Performance penalties of resilient SDN infrastructures. CoNEXT 2020: 528-529 - [c87]Amit Klein, Elias Heftrig, Haya Schulmann, Michael Waidner:
Black-box caches fingerprinting. CoNEXT 2020: 564-565 - [c86]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Secure Consensus Generation with Distributed DoH. DSN (Supplements) 2020: 41-42 - [c85]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP. DSN (Supplements) 2020: 49-50 - [c84]Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Impact of DNS Insecurity on Time. DSN 2020: 266-277 - [c83]Markus Schneider, Haya Schulmann, Adi Sidis, Ravid Sidis, Michael Waidner:
Diving into Email Bomb Attack. DSN 2020: 286-293 - [c82]Amit Klein, Haya Schulmann, Michael Waidner:
Cryptanalysis of FNV-Based Cookies. GLOBECOM 2020: 1-6 - [c81]Markus Schneider, Haya Schulmann, Michael Waidner:
Blocking Email Bombs with EmailGlass. GLOBECOM 2020: 1-6 - [i13]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Pitfalls of Provably Secure Systems in Internet The Case of Chronos-NTP. CoRR abs/2010.08460 (2020) - [i12]Philipp Jeitner, Haya Schulmann, Michael Waidner:
Secure Consensus Generation with Distributed DoH. CoRR abs/2010.09331 (2020) - [i11]Philipp Jeitner, Haya Schulmann, Michael Waidner:
The Impact of DNS Insecurity on Time. CoRR abs/2010.09338 (2020)
2010 – 2019
- 2019
- [c80]Markus Brandt, Haya Schulmann, Michael Waidner:
Internet As a Source of Randomness. Krypto-Tag 2019 - [c79]Markus Brandt, Haya Schulmann, Michael Waidner:
Distributed Domain Validation (DDV). Krypto-Tag 2019 - 2018
- [c78]Markus Brandt, Tianxiang Dai, Amit Klein, Haya Schulmann, Michael Waidner:
Domain Validation++ For MitM-Resilient PKI. CCS 2018: 2060-2076 - [c77]Tianxiang Dai, Haya Schulmann, Michael Waidner:
Off-Path Attacks Against PKI. CCS 2018: 2213-2215 - [c76]Kris Shrishak, Haya Schulmann, Michael Waidner:
Removing the Bottleneck for Practical 2PC. CCS 2018: 2300-2302 - [c75]Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner:
Practical Experience: Methodologies for Measuring Route Origin Validation. DSN 2018: 634-641 - [c74]Markus Brandt, Haya Schulmann, Michael Waidner:
Internet As a Source of Randomness. HotNets 2018: 64-70 - [c73]Matthias Gohring, Haya Schulmann, Michael Waidner:
Path MTU Discovery Considered Harmful. ICDCS 2018: 866-874 - 2017
- [c72]Amit Klein, Vladimir Kravtsov, Alon Perlmuter, Haya Schulmann, Michael Waidner:
POSTER: X-Ray Your DNS. CCS 2017: 2519-2521 - [c71]Amit Klein, Haya Schulmann, Michael Waidner:
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. DSN 2017: 367-378 - [c70]Amit Klein, Haya Schulmann, Michael Waidner:
Internet-wide study of DNS cache injections. INFOCOM 2017: 1-9 - [c69]Haya Schulmann, Michael Waidner:
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet. NSDI 2017: 131-144 - [c68]Nadav Rotenberg, Haya Schulmann, Michael Waidner, Benjamin Zeltser:
Authentication-Bypass Vulnerabilities in SOHO Routers. SIGCOMM Posters and Demos 2017: 68-70 - 2016
- [j36]Marco Ghiglieri, Michael Waidner:
HbbTV Security and Privacy: Issues and Challenges. IEEE Secur. Priv. 14(3): 61-67 (2016) - [c67]Tianxiang Dai, Haya Schulmann, Michael Waidner:
DNSSEC Misconfigurations in Popular Domains. CANS 2016: 651-660 - [c66]Amir Herzberg, Haya Schulmann, Michael Waidner:
Stratum Filtering: Cloud-based Detection of Attack Sources. CCSW 2016: 47-48 - [c65]Michael Waidner, Michael Kasper:
Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution. DATE 2016: 1303-1308 - [c64]Anja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid, Jean-Pierre Seifert, Haya Schulmann, Kashyap Thimmaraju, Michael Waidner, Jens Sieberg:
NetCo: Reliable Routing With Unreliable Routers. DSN Workshops 2016: 128-135 - [c63]Andreas Borgwart, Haya Schulmann, Michael Waidner:
Towards Automated Measurements of Internet's Naming Infrastructure. SwSTE 2016: 117-124 - [c62]Haya Schulmann, Michael Waidner:
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure. TMA 2016 - 2015
- [j35]Christoph Krauß, Michael Waidner:
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug. Datenschutz und Datensicherheit 39(6): 383-387 (2015) - [c61]Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner:
Security and privacy challenges in industrial internet of things. DAC 2015: 54:1-54:6 - [c60]Haya Schulmann, Michael Waidner:
Towards Security of Internet Naming Infrastructure. ESORICS (1) 2015: 3-22 - [c59]Andreas Borgwart, Spyros Boukoros, Haya Schulmann, Carel van Rooyen, Michael Waidner:
Detection and Forensics of Domains Hijacking. GLOBECOM 2015: 1-6 - 2014
- [j34]Haya Schulmann, Michael Waidner:
DNSSEC for cyber forensics. EURASIP J. Inf. Secur. 2014: 16 (2014) - [c58]Haya Schulmann, Michael Waidner:
Fragmentation Considered Leaking: Port Inference for DNS Poisoning. ACNS 2014: 531-548 - [c57]Marco Ghiglieri, Martin Stopczynski, Michael Waidner:
Personal DLP for Facebook. PerCom Workshops 2014: 629-634 - [c56]Haya Schulmann, Michael Waidner:
Towards Forensic Analysis of Attacks with DNSSEC. IEEE Symposium on Security and Privacy Workshops 2014: 69-76 - 2012
- [j33]Michael Kreutzer, Michael Waidner, Johannes Buchmann:
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung. Prax. Inf.verarb. Kommun. 35(4): 305-308 (2012) - [e5]Neeraj Suri, Michael Waidner:
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt. LNI P-195, GI 2012, ISBN 978-3-88579-289-5 [contents] - [i10]Rüdiger Kapitza, Matthias Schunter, Marc Shapiro, Paulo Veríssimo, Michael Waidner:
Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281). Dagstuhl Reports 2(7): 56-72 (2012) - 2011
- [j32]Simone Fischer-Hübner, Chris Jay Hoofnagle, Ioannis Krontiris, Kai Rannenberg, Michael Waidner:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Manifestos 1(1): 1-20 (2011) - [j31]Hannes Federrath, Marit Hansen, Michael Waidner:
Andreas Pfitzmann 1958 - 2010. it Inf. Technol. 53(1): 5-7 (2011) - [i9]Simone Fischer-Hübner, Chris Jay Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Reports 1(2): 1-15 (2011) - 2010
- [c55]Hannes Federrath, Marit Hansen, Michael Waidner:
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society. PrimeLife 2010: 349-352
2000 – 2009
- 2007
- [j30]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007) - [j29]Michael Backes, David A. Basin, Michael Waidner:
Preface. J. Comput. Secur. 15(6): 561 (2007) - [c54]Matthias Schunter, Michael Waidner:
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data. Privacy Enhancing Technologies 2007: 218-232 - 2006
- [c53]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 - [c52]Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 - [c51]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423 - [c50]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Formal Methods and Cryptography. FM 2006: 612-616 - [p2]Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Service-oriented Assurance - Comprehensive Security by Explicit Assurances. Quality of Protection 2006: 13-24 - [i8]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Reactively Simulatable Certified Mail. IACR Cryptol. ePrint Arch. 2006: 41 (2006) - [i7]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006) - [i6]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. IACR Cryptol. ePrint Arch. 2006: 68 (2006) - 2005
- [j28]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005) - [j27]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005) - [j26]Vern Paxson, Michael Waidner:
Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy. IEEE Trans. Dependable Secur. Comput. 2(2): 81 (2005) - 2004
- [j25]Günter Karjoth, Matthias Schunter, Michael Waidner:
Privacy-enabled Management of Customer Data. IEEE Data Eng. Bull. 27(1): 3-9 (2004) - [j24]Michael Waidner:
Preface. Int. J. Inf. Sec. 3(1): 1 (2004) - [j23]Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner:
Privacy-enhancing identity management. Inf. Secur. Tech. Rep. 9(1): 35-44 (2004) - [j22]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Polynomial liveness. J. Comput. Secur. 12(3-4): 589-617 (2004) - [c49]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41 - [c48]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51 - [c47]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354 - [e4]Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-971-3 [contents] - [i5]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. IACR Cryptol. ePrint Arch. 2004: 82 (2004) - 2003
- [j21]Birgit Pfitzmann, Michael Waidner:
Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Comput. 7(6): 38-44 (2003) - [c46]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Security in Business Process Engineering. Business Process Management 2003: 168-183 - [c45]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A composable cryptographic library with nested operations. CCS 2003: 220-230 - [c44]Günter Karjoth, Matthias Schunter, Els Van Herreweghen, Michael Waidner:
Amending P3P for Clearer Privacy Promises. DEXA Workshops 2003: 445-449 - [c43]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290 - [c42]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively Secure Signature Schemes. ISC 2003: 84-95 - [c41]Birgit Pfitzmann, Michael Waidner:
Federated Identity-Management Protocols. Security Protocols Workshop 2003: 153-174 - [i4]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A Universally Composable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 15 (2003) - [i3]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication Within a Simulatable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 145 (2003) - 2002
- [c40]Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
Polynomial Fairness and Liveness. CSFW 2002: 160-174 - [c39]Günter Karjoth, Matthias Schunter, Michael Waidner:
Privacy-Enabled Services for Enterprises. DEXA Workshops 2002: 483-487 - [c38]Günter Karjoth, Matthias Schunter, Michael Waidner:
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Privacy Enhancing Technologies 2002: 69-84 - [c37]Birgit Pfitzmann, Michael Waidner:
Privacy in browser-based attribute exchange. WPES 2002: 52-62 - [e3]Dieter Gollmann, Günter Karjoth, Michael Waidner:
Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings. Lecture Notes in Computer Science 2502, Springer 2002, ISBN 3-540-44345-2 [contents] - 2001
- [j20]Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner:
Secure password-based cipher suite for TLS. ACM Trans. Inf. Syst. Secur. 4(2): 134-157 (2001) - [c36]Andre Scedrov, Ran Canetti, Joshua D. Guttman, David A. Wagner, Michael Waidner:
Relating Cryptography and Cryptographic Protocols. CSFW 2001: 111-114 - [c35]Birgit Pfitzmann, Michael Waidner:
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. S&P 2001: 184-200 - [c34]Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, Arnd Weber:
Die PERSEUS Systemarchitektur. VIS 2001: 1-17 - 2000
- [j19]N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner:
State of the art in electronic payment systems. Adv. Comput. 53: 425-449 (2000) - [j18]Simon Field, Michael Waidner:
Electronic Commerce. Comput. Networks 32(6): 667-668 (2000) - [j17]N. Asokan, Victor Shoup, Michael Waidner:
Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4): 593-610 (2000) - [j16]Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner:
Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4): 611-627 (2000) - [j15]Michael Steiner, Gene Tsudik, Michael Waidner:
Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distributed Syst. 11(8): 769-780 (2000) - [c33]Birgit Pfitzmann, Michael Waidner:
Composition and integrity preservation of secure reactive systems. CCS 2000: 245-254 - [c32]Birgit Baum-Waidner, Michael Waidner:
Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing. ICALP 2000: 524-535 - [c31]Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner:
Secure Password-Based Cipher Suite for TLS. NDSS 2000 - [e2]Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science 1854, Springer 2000, ISBN 3-540-67825-5 - [e1]Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7 [contents] - [i2]Birgit Pfitzmann, Michael Waidner:
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. IACR Cryptol. ePrint Arch. 2000: 66 (2000)
1990 – 1999
- 1999
- [j14]N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner:
Authenticating public terminals. Comput. Networks 31(8): 861-870 (1999) - [j13]Matthias Schunter, Michael Waidner, Dale Whinnett:
The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinf. 41(3): 238-247 (1999) - [c30]Matthias Schunter, Michael Waidner, Dale Whinnett:
The SEMPER Framework for Secure Electronic Commerce. Wirtschaftsinformatik 1999: 11 - [c29]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Cryptographic Security of Reactive Systems. Workshop on Secure Architectures and Information Flow 1999: 59-77 - 1998
- [j12]Matthias Schunter, Michael Waidner, Dale Whinnett:
A Status Report on the SEMPER Framework for Secure Electronic Commerce. Comput. Networks 30(16-18): 1501-1510 (1998) - [j11]José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner:
Designing a Generic Payment Service. IBM Syst. J. 37(1): 72-88 (1998) - [j10]Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
Real-time mixes: a bandwidth-efficient anonymity protocol. IEEE J. Sel. Areas Commun. 16(4): 495-509 (1998) - [j9]Birgit Pfitzmann, Michael Waidner:
How to Break Fraud-Detectable Key Recovery. ACM SIGOPS Oper. Syst. Rev. 32(1): 23-28 (1998) - [c28]N. Asokan, Victor Shoup, Michael Waidner:
Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606 - [c27]Michael Steiner, Gene Tsudik, Michael Waidner:
CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387 - [c26]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122 - [c25]N. Asokan, Victor Shoup, Michael Waidner:
Asynchronous Protocols for Optimistic Fair Exchange. S&P 1998: 86-99 - 1997
- [j8]Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Trusting Mobile User Devices and Security Modules. Computer 30(2): 61-68 (1997) - [j7]N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner:
The State of the Art in Electronic Payment Systems. Computer 30(9): 28-35 (1997) - [j6]N. Asokan, Gene Tsudik, Michael Waidner:
Server-Supported Signatures. J. Comput. Secur. 5(1): 91-108 (1997) - [j5]Birgit Pfitzmann, Michael Waidner:
Strong Loss Tolerance of Electronic Coin Systems. ACM Trans. Comput. Syst. 15(2): 194-213 (1997) - [c24]N. Asokan, Matthias Schunter, Michael Waidner:
Optimistic Protocols for Fair Exchange. CCS 1997: 7-17 - [c23]Birgit Pfitzmann, Michael Waidner:
Asymmetric Fingerprinting for Larger Collusions. CCS 1997: 151-160 - [c22]Birgit Pfitzmann, Michael Waidner:
Anonymous Fingerprinting. EUROCRYPT 1997: 88-102 - [p1]Birgit Pfitzmann, Michael Waidner:
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten. Verläßliche IT-Systeme 1997: 17-32 - [i1]N. Asokan, Victor Shoup, Michael Waidner:
Optimistic fair Exchange of Digital Signatures. IACR Cryptol. ePrint Arch. 1997: 15 (1997) - 1996
- [c21]Michael Steiner, Gene Tsudik, Michael Waidner:
Diffie-Hellman Key Distribution Extended to Group Communication. CCS 1996: 31-37 - [c20]Michael Waidner:
Development of a Secure Electronic Marketplace for Europe. ESORICS 1996: 1-14 - [c19]N. Asokan, Gene Tsudik, Michael Waidner:
Server-Supported Signatures. ESORICS 1996: 131-143 - 1995
- [j4]Michael Steiner, Gene Tsudik, Michael Waidner:
Refinement and Extension of Encrypted Key Exchange. ACM SIGOPS Oper. Syst. Rev. 29(3): 22-30 (1995) - [c18]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132 - [c17]Mihir Bellare, Amir Herzberg, Michael Steiner, Gene Tsudik, Michael Waidner, Ralf C. Hauser, Juan A. Garay:
iKP - A Family of Secure Electronic Payment Protocols. USENIX Workshop on Electronic Commerce 1995 - [c16]Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329- - 1994
- [c15]Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230 - 1992
- [b1]Michael Waidner:
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler. Karlsruhe Institute of Technology, Germany, 1992, pp. 1-153 - [c14]Birgit Pfitzmann, Michael Waidner:
Attacks on Protocols for Server-Aided RSA Computation. EUROCRYPT 1992: 153-162 - [c13]Birgit Pfitzmann, Michael Waidner:
Unconditional Byzantine Agreement for any Number of Faulty Processors. STACS 1992: 339-350 - 1991
- [c12]Birgit Pfitzmann, Michael Waidner:
How To Break and Repair A "Provably Secure" Untraceable Payment System. CRYPTO 1991: 338-350 - [c11]Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Kommunikation in Verteilten Systemen 1991: 451-463 - [c10]Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner:
Unconditional Byzantine Agreement with Good Majority. STACS 1991: 285-295 - [c9]Birgit Pfitzmann, Michael Waidner:
Fail-stop-Signaturen und ihre Anwendung. VIS 1991: 289-301 - [c8]Birgit Pfitzmann, Michael Waidner:
Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. VIS 1991: 302-320 - 1990
- [c7]Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner:
A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445 - [c6]Michael Waidner, Birgit Pfitzmann:
Loss-tolerance for electronic wallets. FTCS 1990: 140-147
1980 – 1989
- 1989
- [c5]Michael Waidner:
Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. EUROCRYPT 1989: 302-319 - [c4]Michael Waidner, Birgit Pfitzmann:
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). EUROCRYPT 1989: 690 - 1988
- [j3]Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
Datenschutz garantierende offene Kommunikationsnetze. Inform. Spektrum 11(3): 118-142 (1988) - [j2]Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN. Prax. Inf.verarb. Kommun. 11(1): 5-8 (1988) - 1987
- [j1]Andreas Pfitzmann, Michael Waidner:
Networks without user observability. Comput. Secur. 6(2): 158-166 (1987) - [c3]Michael Waidner, Birgit Pfitzmann:
Verlusttolerante elektronische Brieftaschen. Fehlertolerierende Rechensysteme 1987: 36-50 - 1985
- [c2]Michael Waidner, Andreas Pfitzmann:
Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen. Datenschutz und Datensicherung 1985: 128-141 - [c1]Andreas Pfitzmann, Michael Waidner:
Networks Without User Observability: Design Options. EUROCRYPT 1985: 245-253
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint