default search action
Birgit Pfitzmann
Person information
- affiliation: IBM Research Zurich, Switzerland
- affiliation (former): Saarland University, Department of Computer Science, Saarbrücken, Germany
- affiliation (PhD 1995): University of Hildesheim, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c82]Bishwaranjan Bhattacharjee, Aashka Trivedi, Masayasu Muraoka, Muthukumaran Ramasubramanian, Takuma Udagawa, Iksha Gurung, Nishan Pantha, Rong Zhang, Bharath Dandala, Rahul Ramachandran, Manil Maskey, Kaylin M. Bugbee, Michael Little, Elizabeth Fancher, Irina Gerasimov, Armin Mehrabian, Lauren M. Sanders, Sylvain Costes, Sergi Blanco-Cuaresma, Kelly E. Lockhart, Thomas Allen, Félix Grèzes, Megan Ansdell, Alberto Accomazzi, Yousef El-Kurdi, Davis Wertheimer, Birgit Pfitzmann, Cesar Berrospi Ramis, Michele Dolfi, Rafael Teixeira de Lima, Panagiotis Vagenas, S. Karthik Mukkavilli, Peter W. J. Staar, Sanaz Vahidinia, Ryan McGranaghan, Tsengdar J. Lee:
INDUS: Effective and Efficient Language Models for Scientific Applications. EMNLP (Industry Track) 2024: 98-112 - [i19]Bishwaranjan Bhattacharjee, Aashka Trivedi, Masayasu Muraoka, Muthukumaran Ramasubramanian, Takuma Udagawa, Iksha Gurung, Rong Zhang, Bharath Dandala, Rahul Ramachandran, Manil Maskey, Kaylin M. Bugbee, Mike Little, Elizabeth Fancher, Lauren M. Sanders, Sylvain V. Costes, Sergi Blanco-Cuaresma, Kelly E. Lockhart, Thomas Allen, Félix Grèzes, Megan Ansdell, Alberto Accomazzi, Yousef El-Kurdi, Davis Wertheimer, Birgit Pfitzmann, Cesar Berrospi Ramis, Michele Dolfi, Rafael Teixeira de Lima, Panagiotis Vagenas, S. Karthik Mukkavilli, Peter W. J. Staar, Sanaz Vahidinia, Ryan McGranaghan, Armin Mehrabian, Tsengdar J. Lee:
INDUS: Effective and Efficient Language Models for Scientific Applications. CoRR abs/2405.10725 (2024) - 2022
- [c81]Birgit Pfitzmann, Christoph Auer, Michele Dolfi, Ahmed S. Nassar, Peter W. J. Staar:
DocLayNet: A Large Human-Annotated Dataset for Document-Layout Segmentation. KDD 2022: 3743-3751 - [i18]Birgit Pfitzmann, Christoph Auer, Michele Dolfi, Ahmed S. Nassar, Peter W. J. Staar:
DocLayNet: A Large Human-Annotated Dataset for Document-Layout Analysis. CoRR abs/2206.01062 (2022)
2010 – 2019
- 2018
- [j22]Kristof Kloeckner, Constantin Adam, Nikos Anerousis, Naga Ayachitula, Muhammed Fatih Bulut, Gargi Dasgupta, Yu Deng, Yixin Diao, Nicholas C. Fuller, Sandeep Gopisetty, Milton Hernandez, Jinho Hwang, Pietro Iannucci, Anup K. Kalia, Giovanni Lanfranchi, David Lanyi, Heiko Ludwig, A. Mahamuni, Ruchi Mahindru, Fan Jing Meng, Hamid R. Motahari Nezhad, Karin Murthy, Taiga Nakamura, Amit M. Paradkar, Dennis A. Perpetua, Birgit Pfitzmann, Daniela Rosu, Larisa Shwartz, Zhong Su, Maheswaran Surendra, Shu Tao, Hagen Völzer, Maja Vukovic, Dorothea Wiesmann, S. Wozniak, Gary Wright, Jin Xiao, Sai Zeng:
Building a cognitive platform for the managed IT services lifecycle. IBM J. Res. Dev. 62(1): 8:1-8:11 (2018) - 2011
- [c80]Birgit Pfitzmann, Nikolai Joukov:
Migration to Multi-image Cloud Templates. IEEE SCC 2011: 80-87 - [c79]Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:
Composable Security Analysis of OS Services. ACNS 2011: 431-448 - [c78]Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin P. McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope:
Managing business health in the presence of malicious attacks. DSN Workshops 2011: 9-14 - [c77]Nikolai Joukov, Vasily Tarasov, Joel Ossher, Birgit Pfitzmann, Sergej Chicherin, Marco Pistoia, Takaaki Tateishi:
Static discovery and remediation of code-embedded resource dependencies. Integrated Network Management 2011: 233-240 - [c76]HariGovind V. Ramasamy, Cheng-Lin Tsao, Birgit Pfitzmann, Nikolai Joukov, James W. Murray:
Towards Automated Identification of Security Zone Classification in Enterprise Networks. Hot-ICE 2011 - 2010
- [c75]Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Murthy V. Devarakonda:
Application-storage discovery. SYSTOR 2010 - [i17]Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:
Composable Security Analysis of OS Services. IACR Cryptol. ePrint Arch. 2010: 213 (2010)
2000 – 2009
- 2009
- [c74]Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Norbert G. Vogl, Murthy V. Devarakonda, Tryg Ager:
ITBVM: IT Business Value Modeler. IEEE SCC 2009: 128-135 - 2008
- [j21]Michael Backes, Birgit Pfitzmann:
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Int. J. Inf. Sec. 7(1): 33-54 (2008) - [j20]Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. J. Comput. Secur. 16(5): 497-530 (2008) - [c73]David A. Basin, Felix Klaedtke, Samuel Müller, Birgit Pfitzmann:
Runtime Monitoring of Metric First-order Temporal Properties. FSTTCS 2008: 49-60 - 2007
- [j19]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007) - [j18]Carl E. Abrams, Juerg von Känel, Samuel Müller, Birgit Pfitzmann, Susanne Ruschka-Taylor:
Optimized enterprise risk management. IBM Syst. J. 46(2): 219-234 (2007) - [c72]Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. CSF 2007: 112-124 - [c71]Birgit Pfitzmann:
Multi-layer Audit of Access Rights. Secure Data Management 2007: 18-32 - [p3]Jan Camenisch, Birgit Pfitzmann:
Federated Identity Management. Security, Privacy, and Trust in Modern Data Management 2007: 213-238 - 2006
- [c70]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 - [c69]Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. ESAS 2006: 165-178 - [c68]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423 - [c67]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Formal Methods and Cryptography. FM 2006: 612-616 - [c66]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445 - [c65]Michael Backes, Birgit Pfitzmann:
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. SEC 2006: 233-245 - [p2]Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Service-oriented Assurance - Comprehensive Security by Explicit Assurances. Quality of Protection 2006: 13-24 - [i16]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Reactively Simulatable Certified Mail. IACR Cryptol. ePrint Arch. 2006: 41 (2006) - [i15]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006) - [i14]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. IACR Cryptol. ePrint Arch. 2006: 58 (2006) - [i13]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. IACR Cryptol. ePrint Arch. 2006: 68 (2006) - 2005
- [j17]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005) - [j16]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005) - [j15]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. IEEE Trans. Dependable Secur. Comput. 2(2): 109-123 (2005) - [c64]Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. ESORICS 2005: 178-196 - [c63]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. ESORICS 2005: 489-508 - [c62]Christopher Giblin, Alice Y. Liu, Samuel Müller, Birgit Pfitzmann, Xin Zhou:
Regulations Expressed As Logical Models (REALM). JURIX 2005: 37-48 - [c61]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. S&P 2005: 171-182 - [c60]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Proving a WS-federation passive requestor profile with a browser model. SWS 2005: 54-64 - [i12]Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. IACR Cryptol. ePrint Arch. 2005: 127 (2005) - [i11]Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-style XOR. IACR Cryptol. ePrint Arch. 2005: 220 (2005) - [i10]Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. IACR Cryptol. ePrint Arch. 2005: 421 (2005) - 2004
- [j14]Michael Backes, Birgit Pfitzmann:
Computational probabilistic noninterference. Int. J. Inf. Sec. 3(1): 42-60 (2004) - [j13]Birgit Pfitzmann:
Privacy in enterprise identity federation - policies for Liberty 2 single sign on. Inf. Secur. Tech. Rep. 9(1): 45-58 (2004) - [j12]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Polynomial liveness. J. Comput. Secur. 12(3-4): 589-617 (2004) - [j11]Michael Backes, Birgit Pfitzmann:
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. IEEE J. Sel. Areas Commun. 22(10): 2075-2086 (2004) - [c59]Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. CSFW 2004: 204-218 - [c58]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41 - [c57]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51 - [c56]Thomas Groß, Birgit Pfitzmann:
Proving a WS-Federation passive requestor profile. SWS 2004: 77-86 - [c55]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354 - [e3]Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick D. McDaniel:
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004. ACM 2004, ISBN 1-58113-961-6 [contents] - [i9]Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. IACR Cryptol. ePrint Arch. 2004: 59 (2004) - [i8]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. IACR Cryptol. ePrint Arch. 2004: 82 (2004) - [i7]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. IACR Cryptol. ePrint Arch. 2004: 300 (2004) - 2003
- [j10]Birgit Pfitzmann, Michael Waidner:
Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Comput. 7(6): 38-44 (2003) - [c54]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Security in Business Process Engineering. Business Process Management 2003: 168-183 - [c53]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A composable cryptographic library with nested operations. CCS 2003: 220-230 - [c52]Michael Backes, Birgit Pfitzmann, Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180 - [c51]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290 - [c50]Michael Backes, Birgit Pfitzmann:
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. FSTTCS 2003: 1-12 - [c49]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively Secure Signature Schemes. ISC 2003: 84-95 - [c48]Birgit Pfitzmann:
Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon. Privacy Enhancing Technologies 2003: 189-204 - [c47]Michael Backes, Birgit Pfitzmann:
Intransitive Non-Interference for Cryptographic Purpose. S&P 2003: 140- - [c46]Birgit Pfitzmann, Michael Waidner:
Federated Identity-Management Protocols. Security Protocols Workshop 2003: 153-174 - [c45]Birgit Pfitzmann:
Federated Identity-Management Protocols (Discussion). Security Protocols Workshop 2003: 175-177 - [i6]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A Universally Composable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 15 (2003) - [i5]Michael Backes, Birgit Pfitzmann:
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. IACR Cryptol. ePrint Arch. 2003: 121 (2003) - [i4]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication Within a Simulatable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 145 (2003) - 2002
- [c44]Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
Polynomial Fairness and Liveness. CSFW 2002: 160-174 - [c43]Michael Backes, Birgit Pfitzmann:
Computational Probabilistic Non-interference. ESORICS 2002: 1-23 - [c42]Michael Backes, Christian Jacobi, Birgit Pfitzmann:
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. FME 2002: 310-329 - [c41]Birgit Pfitzmann, Michael Waidner:
Privacy in browser-based attribute exchange. WPES 2002: 52-62 - 2001
- [c40]Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Optimized Self-Synchronizing Mode of Operation. FSE 2001: 78-91 - [c39]Birgit Pfitzmann, Michael Waidner:
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. S&P 2001: 184-200 - [c38]Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, Arnd Weber:
Die PERSEUS Systemarchitektur. VIS 2001: 1-17 - [e2]Birgit Pfitzmann:
Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding. Lecture Notes in Computer Science 2045, Springer 2001, ISBN 3-540-42070-3 [contents] - 2000
- [c37]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Anonymous Fingerprinting with Direct Non-repudiation. ASIACRYPT 2000: 401-414 - [c36]Birgit Pfitzmann, Michael Waidner:
Composition and integrity preservation of secure reactive systems. CCS 2000: 245-254 - [c35]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Self-Escrowed Cash against User Blackmailing. Financial Cryptography 2000: 42-52 - [e1]Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science 1854, Springer 2000, ISBN 3-540-67825-5 - [i3]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Anonymous Fingerprinting with Direct Non-Repudiation. IACR Cryptol. ePrint Arch. 2000: 32 (2000) - [i2]Birgit Pfitzmann, Michael Waidner:
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. IACR Cryptol. ePrint Arch. 2000: 66 (2000)
1990 – 1999
- 1999
- [c34]Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Coin-Based Anonymous Fingerprinting. EUROCRYPT 1999: 150-164 - [c33]André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Proving Ownership of Digital Content. Information Hiding 1999: 117-133 - [c32]Hans-Jürgen Guth, Birgit Pfitzmann:
Error- and Collusion-Secure Fingerprinting for Digital Data. Information Hiding 1999: 134-145 - [c31]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Cryptographic Security of Reactive Systems. Workshop on Secure Architectures and Information Flow 1999: 59-77 - 1998
- [j9]Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
Real-time mixes: a bandwidth-efficient anonymity protocol. IEEE J. Sel. Areas Commun. 16(4): 495-509 (1998) - [j8]Birgit Pfitzmann, Michael Waidner:
How to Break Fraud-Detectable Key Recovery. ACM SIGOPS Oper. Syst. Rev. 32(1): 23-28 (1998) - [j7]Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann:
Statistical Secrecy and Multibit Commitments. IEEE Trans. Inf. Theory 44(3): 1143-1151 (1998) - [c30]Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest:
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. CRYPTO 1998: 153-168 - [c29]Ivan Damgård, Birgit Pfitzmann:
Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP. ICALP 1998: 772-783 - [c28]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Optimal Efficiency of Optimistic Contract Signing. PODC 1998: 113-122 - 1997
- [j6]Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Trusting Mobile User Devices and Security Modules. Computer 30(2): 61-68 (1997) - [j5]Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann:
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. J. Cryptol. 10(3): 163-194 (1997) - [j4]Torben P. Pedersen, Birgit Pfitzmann:
Fail-Stop Signatures. SIAM J. Comput. 26(2): 291-330 (1997) - [j3]Birgit Pfitzmann, Michael Waidner:
Strong Loss Tolerance of Electronic Coin Systems. ACM Trans. Comput. Syst. 15(2): 194-213 (1997) - [c27]Birgit Pfitzmann, Michael Waidner:
Asymmetric Fingerprinting for Larger Collusions. CCS 1997: 151-160 - [c26]Birgit Pfitzmann, Michael Waidner:
Anonymous Fingerprinting. EUROCRYPT 1997: 88-102 - [c25]Niko Baric, Birgit Pfitzmann:
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees. EUROCRYPT 1997: 480-494 - [p1]Birgit Pfitzmann, Michael Waidner:
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten. Verläßliche IT-Systeme 1997: 17-32 - [i1]Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest:
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. IACR Cryptol. ePrint Arch. 1997: 12 (1997) - 1996
- [b2]Birgit Pfitzmann:
Digital Signature Schemes, General Framework and Fail-Stop Signatures. Lecture Notes in Computer Science 1100, Springer 1996, ISBN 3-540-61517-2 - [c24]Birgit Pfitzmann, Matthias Schunter:
Asymmetric Fingerprinting (Extended Abstract). EUROCRYPT 1996: 84-95 - [c23]Birgit Pfitzmann:
Trials of Traced Traitors. Information Hiding 1996: 49-64 - [c22]Birgit Pfitzmann:
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals. Information Hiding 1996: 347-350 - 1995
- [b1]Birgit Pfitzmann:
Fail-stop signature schemes. University of Hildesheim, Germany, 1995, pp. 1-353 - [c21]Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
How to Break Another Provably Secure Payment System. EUROCRYPT 1995: 121-132 - [c20]Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule. VIS 1995: 329- - 1994
- [c19]Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230 - [c18]Birgit Pfitzmann:
Breaking Efficient Anonymous Channel. EUROCRYPT 1994: 332-340 - 1993
- [c17]Birgit Pfitzmann:
Sorting Out Signature Schemes. CCS 1993: 74-85 - [c16]Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann:
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. CRYPTO 1993: 250-265 - 1992
- [c15]Eugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann:
New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). CRYPTO 1992: 15-30 - [c14]Birgit Pfitzmann, Michael Waidner:
Attacks on Protocols for Server-Aided RSA Computation. EUROCRYPT 1992: 153-162 - [c13]Birgit Pfitzmann, Michael Waidner:
Unconditional Byzantine Agreement for any Number of Faulty Processors. STACS 1992: 339-350 - 1991
- [c12]Birgit Pfitzmann, Michael Waidner:
How To Break and Repair A "Provably Secure" Untraceable Payment System. CRYPTO 1991: 338-350 - [c11]David Chaum, Eugène van Heijst, Birgit Pfitzmann:
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. CRYPTO 1991: 470-484 - [c10]Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. Kommunikation in Verteilten Systemen 1991: 451-463 - [c9]Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner:
Unconditional Byzantine Agreement with Good Majority. STACS 1991: 285-295 - [c8]Birgit Pfitzmann, Michael Waidner:
Fail-stop-Signaturen und ihre Anwendung. VIS 1991: 289-301 - [c7]Birgit Pfitzmann, Michael Waidner:
Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit. VIS 1991: 302-320 - [c6]Dirk Fox, Birgit Pfitzmann:
Effiziente Software-Implementierung des GMR-Signatursystems. VIS 1991: 329-345 - 1990
- [c5]Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner:
A Remark on a Signature Scheme Where Forgery Can Be Proved. EUROCRYPT 1990: 441-445 - [c4]Michael Waidner, Birgit Pfitzmann:
Loss-tolerance for electronic wallets. FTCS 1990: 140-147
1980 – 1989
- 1989
- [c3]Birgit Pfitzmann, Andreas Pfitzmann:
How to Break the Direct RSA-Implementation of Mixes. EUROCRYPT 1989: 373-381 - [c2]Michael Waidner, Birgit Pfitzmann:
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). EUROCRYPT 1989: 690 - 1988
- [j2]Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
Datenschutz garantierende offene Kommunikationsnetze. Inform. Spektrum 11(3): 118-142 (1988) - [j1]Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner:
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN. Prax. Inf.verarb. Kommun. 11(1): 5-8 (1988) - 1987
- [c1]Michael Waidner, Birgit Pfitzmann:
Verlusttolerante elektronische Brieftaschen. Fehlertolerierende Rechensysteme 1987: 36-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint