<?xml version="1.0"?>
<dblpperson name="Michael Waidner" pid="90/308" n="205">
<person key="homepages/90/308" mdate="2025-01-10">
<author pid="90/308">Michael Waidner</author>
<url>https://www.sit.tu-darmstadt.de/de/mwaidner/</url>
<url>https://scholar.google.com/citations?user=AyRNYLoAAAAJ</url>
<url>https://dl.acm.org/profile/81100392774</url>
<url>https://zbmath.org/authors/?q=ai:waidner.michael</url>
<url>https://mathscinet.ams.org/mathscinet/MRAuthorID/308413</url>
<url>https://mathgenealogy.org/id.php?id=120682</url>
<url>https://en.wikipedia.org/wiki/Michael_Waidner</url>
<url>https://orcid.org/0000-0001-7919-9961</url>
<url>https://www.wikidata.org/entity/Q1929687</url>
<url>http://isni.org/isni/0000000114368189</url>
<url>https://id.loc.gov/authorities/names/n96012596</url>
<url>https://d-nb.info/gnd/1089321570</url>
<url>https://www.wikidata.org/entity/Q130910858</url>
<note type="affiliation">National Research Center for Applied Cybersecurity ATHENE, germany</note>
<note type="affiliation">Technische Universit&#228;t Darmstadt, Germany</note>
<note type="affiliation">Fraunhofer-Institut f&#252;r sichere Informationstechnologie SIT, Germany</note>
</person>
<r><inproceedings key="conf/ccs/MirditaSW25" mdate="2025-12-26">
<author orcid="0000-0001-6924-4802" pid="248/0549">Donika Mirdita</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: Exploring the Landscape of RPKI Relying Parties.</title>
<pages>4773-4775</pages>
<year>2025</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3719027.3760721</ee>
<crossref>conf/ccs/2025</crossref>
<url>db/conf/ccs/ccs2025.html#MirditaSW25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nsdi/FriessSW25" mdate="2025-04-30">
<author pid="362/4156">Jens Frie&#223;</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>ValidaTor: Domain Validation over Tor.</title>
<pages>1367-1380</pages>
<year>2025</year>
<booktitle>NSDI</booktitle>
<ee type="oa">https://www.usenix.org/conference/nsdi25/presentation/friess</ee>
<crossref>conf/nsdi/2025</crossref>
<url>db/conf/nsdi/nsdi2025.html#FriessSW25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/MirditaSW25" mdate="2025-10-31">
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>SoK: An Introspective Analysis of RPKI Security.</title>
<pages>3649-3665</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/mirdita</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#MirditaSW25</url>
</inproceedings>
</r>
<r><data key="data/12/FriessSW25" mdate="2026-01-19">
<author orcid="0000-0001-7809-3647" pid="362/4156">Jens Friess</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Pseudonymized Logs from Adnet-Based Domain Validation (ADDVent).</title>
<year>2025</year>
<month>August</month>
<ee>https://doi.org/10.21227/5g3c-sj66</ee>
<publisher>IEEE DataPort</publisher>
<stream>streams/repo/ieeedataport</stream>
</data>
</r>
<r><article key="journals/dud/SchulmannW24" mdate="2024-01-15">
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Wie Deutschland zur Cybernation wird.</title>
<pages>11-15</pages>
<year>2024</year>
<month>January</month>
<volume>48</volume>
<journal>Datenschutz und Datensicherheit (dud)</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11623-023-1872-z</ee>
<url>db/journals/dud/dud48.html#SchulmannW24</url>
</article>
</r>
<r><article key="journals/dud/KreutzerWW24" mdate="2024-10-30">
<author pid="33/6146-1">Michael Kreutzer 0001</author>
<author pid="389/0326">Leonie Wolf</author>
<author pid="90/308">Michael Waidner</author>
<title>Kryptoagilit&#228;t.</title>
<pages>667-672</pages>
<year>2024</year>
<month>October</month>
<volume>48</volume>
<journal>Datenschutz und Datensicherheit (dud)</journal>
<number>10</number>
<ee>https://doi.org/10.1007/s11623-024-1997-8</ee>
<url>db/journals/dud/dud48.html#KreutzerWW24</url>
<stream>streams/journals/dud</stream>
</article>
</r>
<r><inproceedings key="conf/anrw/HeftrigSVW24" mdate="2025-01-19">
<author orcid="0000-0002-6225-7835" pid="279/5630">Elias Heftrig</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0009-0004-1461-2419" pid="332/3113">Niklas Vogel</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Protocol Fixes for KeyTrap Vulnerabilities.</title>
<year>2024</year>
<booktitle>ANRW</booktitle>
<ee>https://doi.org/10.1145/3673422.3674902</ee>
<ee>https://www.wikidata.org/entity/Q130910859</ee>
<crossref>conf/anrw/2024</crossref>
<url>db/conf/anrw/anrw2024.html#HeftrigSVW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiaccs/GelernterSW24" mdate="2025-01-19">
<author orcid="0009-0005-8371-5021" pid="134/7573">Nethanel Gelernter</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>External Attack-Surface of Modern Organizations.</title>
<year>2024</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3634737.3656295</ee>
<ee>https://www.wikidata.org/entity/Q130923309</ee>
<crossref>conf/asiaccs/2024</crossref>
<url>db/conf/asiaccs/asiaccs2024.html#GelernterSW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/FriessMSW24" mdate="2024-12-22">
<author orcid="0000-0001-7809-3647" pid="362/4156">Jens Frie&#223;</author>
<author orcid="0000-0001-6924-4802" pid="248/0549">Donika Mirdita</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Byzantine-Secure Relying Party for Resilient RPKI.</title>
<pages>49-63</pages>
<year>2024</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3658644.3690368</ee>
<crossref>conf/ccs/2024</crossref>
<url>db/conf/ccs/ccs2024.html#FriessMSW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/HeftrigSVW24" mdate="2024-12-22">
<author orcid="0000-0002-6225-7835" pid="279/5630">Elias Heftrig</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0009-0004-1461-2419" pid="332/3113">Niklas Vogel</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.</title>
<pages>497-510</pages>
<year>2024</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3658644.3670389</ee>
<crossref>conf/ccs/2024</crossref>
<url>db/conf/ccs/ccs2024.html#HeftrigSVW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/CattepoelMSW24" mdate="2024-12-22">
<author orcid="0009-0005-3678-3363" pid="392/3164">Louis Cattepoel</author>
<author orcid="0000-0001-6924-4802" pid="248/0549">Donika Mirdita</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: Kill Krill or Proxy RPKI.</title>
<pages>4922-4924</pages>
<year>2024</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3658644.3691390</ee>
<crossref>conf/ccs/2024</crossref>
<url>db/conf/ccs/ccs2024.html#CattepoelMSW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/TchokodeuSSW24" mdate="2024-12-22">
<author orcid="0000-0002-2998-327X" pid="392/3195">Kevin Nsieyanji Tchokodeu</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0009-0004-0358-4344" pid="204/8314">Gil Sobol</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: Security of Login Interfaces in Modern Organizations.</title>
<pages>4925-4927</pages>
<year>2024</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3658644.3691413</ee>
<crossref>conf/ccs/2024</crossref>
<url>db/conf/ccs/ccs2024.html#TchokodeuSSW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/JacobsenSVW24" mdate="2024-12-22">
<author orcid="0009-0009-1276-663X" pid="372/6077">Oliver Jacobsen</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0009-0004-1461-2419" pid="332/3113">Niklas Vogel</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: From Fort to Foe: The Threat of RCE in RPKI.</title>
<pages>5015-5017</pages>
<year>2024</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3658644.3691387</ee>
<crossref>conf/ccs/2024</crossref>
<url>db/conf/ccs/ccs2024.html#JacobsenSVW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hotnets/FriessSW24" mdate="2024-11-30">
<author orcid="0000-0001-7809-3647" pid="362/4156">Jens Frie&#223;</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Crowdsourced Distributed Domain Validation.</title>
<pages>318-325</pages>
<year>2024</year>
<booktitle>HotNets</booktitle>
<ee>https://doi.org/10.1145/3696348.3696869</ee>
<crossref>conf/hotnets/2024</crossref>
<url>db/conf/hotnets/hotnets2024.html#FriessSW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/MirditaSVW24" mdate="2024-09-26">
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>The CURE to Vulnerabilities in RPKI Validation.</title>
<year>2024</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss-paper/the-cure-to-vulnerabilities-in-rpki-validation/</ee>
<crossref>conf/ndss/2024</crossref>
<url>db/conf/ndss/ndss2024.html#MirditaSVW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nsdi/FriessGGSW24" mdate="2024-04-19">
<author pid="362/4156">Jens Frie&#223;</author>
<author pid="04/11538">Tobias Gattermayer</author>
<author pid="134/7573">Nethanel Gelernter</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms.</title>
<year>2024</year>
<booktitle>NSDI</booktitle>
<ee type="oa">https://www.usenix.org/conference/nsdi24/presentation/friess</ee>
<crossref>conf/nsdi/2024</crossref>
<url>db/conf/nsdi/nsdi2024.html#FriessGGSW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/woot/GruzaHJSVW24" mdate="2024-09-05">
<author pid="372/5538">Olivia Gruza</author>
<author pid="279/5630">Elias Heftrig</author>
<author pid="372/6077">Oliver Jacobsen</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.</title>
<pages>45-57</pages>
<year>2024</year>
<booktitle>WOOT @ USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/woot24/presentation/gruza</ee>
<crossref>conf/woot/2024</crossref>
<url>db/conf/woot/woot2024.html#GruzaHJSVW24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2403-15233" mdate="2024-04-09">
<author pid="372/5538">Olivia Gruza</author>
<author pid="279/5630">Elias Heftrig</author>
<author pid="372/6077">Oliver Jacobsen</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.</title>
<year>2024</year>
<volume>abs/2403.15233</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2403.15233</ee>
<url>db/journals/corr/corr2403.html#abs-2403-15233</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2403-19368" mdate="2024-04-10">
<author pid="362/4156">Jens Frie&#223;</author>
<author pid="04/11538">Tobias Gattermayer</author>
<author pid="134/7573">Nethanel Gelernter</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms.</title>
<year>2024</year>
<volume>abs/2403.19368</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2403.19368</ee>
<url>db/journals/corr/corr2403.html#abs-2403-19368</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-00531" mdate="2024-06-09">
<author pid="362/4156">Jens Friess</author>
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Byzantine-Secure Relying Party for Resilient RPKI.</title>
<year>2024</year>
<volume>abs/2405.00531</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.00531</ee>
<url>db/journals/corr/corr2405.html#abs-2405-00531</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2406-03133" mdate="2024-07-05">
<author pid="279/5630">Elias Heftrig</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.</title>
<year>2024</year>
<volume>abs/2406.03133</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2406.03133</ee>
<url>db/journals/corr/corr2406.html#abs-2406-03133</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2408-12359" mdate="2024-09-28">
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>SoK: An Introspective Analysis of RPKI Security.</title>
<year>2024</year>
<volume>abs/2408.12359</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2408.12359</ee>
<url>db/journals/corr/corr2408.html#abs-2408-12359</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2409-14518" mdate="2024-10-15">
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>RPKI: Not Perfect But Good Enough.</title>
<year>2024</year>
<volume>abs/2409.14518</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2409.14518</ee>
<url>db/journals/corr/corr2409.html#abs-2409-14518</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2411-16518" mdate="2025-01-01">
<author pid="372/6077">Oliver Jacobsen</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>Poster: From Fort to Foe: The Threat of RCE in RPKI.</title>
<year>2024</year>
<volume>abs/2411.16518</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2411.16518</ee>
<url>db/journals/corr/corr2411.html#abs-2411-16518</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/dud/ShulmanW23" mdate="2023-10-17">
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Aktive Cyberabwehr.</title>
<pages>497-502</pages>
<year>2023</year>
<volume>47</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>8</number>
<ee>https://doi.org/10.1007/s11623-023-1806-9</ee>
<url>db/journals/dud/dud47.html#ShulmanW23</url>
</article>
</r>
<r><article key="journals/pacmnet/FriessSW23" mdate="2023-12-10">
<author orcid="0000-0001-7809-3647" pid="362/4156">Jens Friess</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates.</title>
<pages>26:1-26:20</pages>
<year>2023</year>
<volume>1</volume>
<journal>PACMNET</journal>
<number>CoNEXT3</number>
<ee>https://doi.org/10.1145/3629148</ee>
<url>db/journals/pacmnet/pacmnet1.html#FriessSW23</url>
</article>
</r>
<r><inproceedings key="conf/ccs/KaiserSW23" mdate="2023-12-10">
<author orcid="0009-0005-3025-8269" pid="30/431">Fabian Kaiser</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: Longitudinal Analysis of DoS Attacks.</title>
<pages>3573-3575</pages>
<year>2023</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3576915.3624382</ee>
<crossref>conf/ccs/2023</crossref>
<url>db/conf/ccs/ccs2023.html#KaiserSW23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigcomm/HlavacekJMSW23" mdate="2023-10-17">
<author orcid="0009-0006-9239-9232" pid="223/6748">Tomas Hlavacek</author>
<author orcid="0000-0002-5290-6328" pid="271/6045">Philipp Jeitner</author>
<author orcid="0000-0001-6924-4802" pid="248/0549">Donika Mirdita</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Beyond Limits: How to Disable Validators in Secure Networks.</title>
<pages>950-966</pages>
<year>2023</year>
<booktitle>SIGCOMM</booktitle>
<ee>https://doi.org/10.1145/3603269.3604861</ee>
<crossref>conf/sigcomm/2023</crossref>
<url>db/conf/sigcomm/sigcomm2023.html#HlavacekJMSW23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigcomm/HeftrigSW23" mdate="2023-10-17">
<author orcid="0000-0002-6225-7835" pid="279/5630">Elias Heftrig</author>
<author orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: Off-Path DNSSEC Downgrade Attacks.</title>
<pages>1120-1122</pages>
<year>2023</year>
<booktitle>SIGCOMM</booktitle>
<ee>https://doi.org/10.1145/3603269.3610840</ee>
<crossref>conf/sigcomm/2023</crossref>
<url>db/conf/sigcomm/sigcomm2023.html#HeftrigSW23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/HlavacekSVW23" mdate="2023-10-18">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.</title>
<year>2023</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity23/presentation/hlavacek</ee>
<crossref>conf/uss/2023</crossref>
<url>db/conf/uss/uss2023.html#HlavacekSVW23</url>
<pages>4841-4858</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/HeftrigSW23" mdate="2023-10-18">
<author pid="279/5630">Elias Heftrig</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones.</title>
<year>2023</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity23/presentation/heftrig</ee>
<crossref>conf/uss/2023</crossref>
<url>db/conf/uss/uss2023.html#HeftrigSW23</url>
<pages>7429-7444</pages>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2303-11772" mdate="2024-05-07">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.</title>
<year>2023</year>
<volume>abs/2303.11772</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2303.11772</ee>
<url>db/journals/corr/corr2303.html#abs-2303-11772</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2312-01872" mdate="2024-05-07">
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>The CURE To Vulnerabilities in RPKI Validation.</title>
<year>2023</year>
<volume>abs/2312.01872</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2312.01872</ee>
<url>db/journals/corr/corr2312.html#abs-2312-01872</url>
</article>
</r>
<r><article key="journals/jcs/BertinoSW22" mdate="2024-05-07">
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Special issue ESORICS 2021.</title>
<pages>753-755</pages>
<year>2022</year>
<volume>30</volume>
<journal>J. Comput. Secur.</journal>
<number>6</number>
<ee>https://doi.org/10.3233/JCS-220951</ee>
<ee>https://www.wikidata.org/entity/Q114943853</ee>
<url>db/journals/jcs/jcs30.html#BertinoSW22</url>
</article>
</r>
<r><inproceedings key="conf/ccs/HlavacekJMSW22" mdate="2023-10-17">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="271/6045">Philipp Jeitner</author>
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Behind the Scenes of RPKI.</title>
<pages>1413-1426</pages>
<year>2022</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3548606.3560645</ee>
<crossref>conf/ccs/2022</crossref>
<url>db/conf/ccs/ccs2022.html#HlavacekJMSW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/HeftrigSW22" mdate="2023-10-17">
<author pid="279/5630">Elias Heftrig</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Poster: The Unintended Consequences of Algorithm Agility in DNSSEC.</title>
<pages>3363-3365</pages>
<year>2022</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3548606.3563517</ee>
<crossref>conf/ccs/2022</crossref>
<url>db/conf/ccs/ccs2022.html#HeftrigSW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/MirditaSW22" mdate="2023-10-17">
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Poster: RPKI Kill Switch.</title>
<pages>3423-3425</pages>
<year>2022</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3548606.3563536</ee>
<crossref>conf/ccs/2022</crossref>
<url>db/conf/ccs/ccs2022.html#MirditaSW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/ShulmanVW22" mdate="2023-10-17">
<author pid="94/7397">Haya Schulmann</author>
<author pid="332/3113">Niklas Vogel</author>
<author pid="90/308">Michael Waidner</author>
<title>Poster: Insights into Global Deployment of RPKI Validation.</title>
<pages>3467-3469</pages>
<year>2022</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3548606.3563523</ee>
<crossref>conf/ccs/2022</crossref>
<url>db/conf/ccs/ccs2022.html#ShulmanVW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/ShulmanW22" mdate="2024-05-07">
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: DNS in Routers Considered Harmful.</title>
<pages>3471-3473</pages>
<year>2022</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3548606.3563509</ee>
<crossref>conf/ccs/2022</crossref>
<url>db/conf/ccs/ccs2022.html#ShulmanW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/HlavacekSW22" mdate="2024-05-07">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Smart RPKI Validation: Avoiding Errors and Preventing Hijacks.</title>
<pages>509-530</pages>
<year>2022</year>
<booktitle>ESORICS (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-17140-6_25</ee>
<crossref>conf/esorics/2022-1</crossref>
<url>db/conf/esorics/esorics2022-1.html#HlavacekSW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/HlavacekJMSW22" mdate="2023-10-17">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="271/6045">Philipp Jeitner</author>
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Stalloris: RPKI Downgrade Attack.</title>
<pages>4455-4471</pages>
<year>2022</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity22/presentation/hlavacek</ee>
<crossref>conf/uss/2022</crossref>
<url>db/conf/uss/uss2022.html#HlavacekJMSW22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/JeitnerSTW22" mdate="2023-10-17">
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="327/7606">Lucas Teichmann</author>
<author pid="90/308">Michael Waidner</author>
<title>XDRI Attacks - and - How to Enhance Resilience of Residential Routers.</title>
<pages>4473-4490</pages>
<year>2022</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner</ee>
<crossref>conf/uss/2022</crossref>
<url>db/conf/uss/uss2022.html#JeitnerSTW22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2205-05473" mdate="2024-05-07">
<author pid="188/4885">Tianxiang Dai</author>
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources.</title>
<year>2022</year>
<volume>abs/2205.05473</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2205.05473</ee>
<url>db/journals/corr/corr2205.html#abs-2205-05473</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2205-06064" mdate="2024-05-07">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="271/6045">Philipp Jeitner</author>
<author pid="248/0549">Donika Mirdita</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Stalloris: RPKI Downgrade Attack.</title>
<year>2022</year>
<volume>abs/2205.06064</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2205.06064</ee>
<url>db/journals/corr/corr2205.html#abs-2205-06064</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2205-06085" mdate="2024-05-07">
<author pid="188/4885">Tianxiang Dai</author>
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>From IP to transport and beyond: cross-layer attacks against applications.</title>
<year>2022</year>
<volume>abs/2205.06085</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2205.06085</ee>
<url>db/journals/corr/corr2205.html#abs-2205-06085</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2208-12003" mdate="2024-05-07">
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="327/7606">Lucas Teichmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>XDRI Attacks - and - How to Enhance Resilience of Residential Routers.</title>
<year>2022</year>
<volume>abs/2208.12003</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2208.12003</ee>
<url>db/journals/corr/corr2208.html#abs-2208-12003</url>
</article>
</r>
<r><inproceedings key="conf/anrw/DaiSW21" mdate="2025-07-04">
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>DNS-over-TCP considered vulnerable.</title>
<pages>76-81</pages>
<year>2021</year>
<booktitle>ANRW</booktitle>
<ee>https://doi.org/10.1145/3472305.3472884</ee>
<ee>https://www.wikidata.org/entity/Q130918696</ee>
<crossref>conf/anrw/2021</crossref>
<url>db/conf/anrw/anrw2021.html#DaiSW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/DaiSW21" mdate="2025-07-04">
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Let's Downgrade Let's Encrypt.</title>
<pages>1421-1440</pages>
<year>2021</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3460120.3484815</ee>
<ee>https://www.wikidata.org/entity/Q130869071</ee>
<crossref>conf/ccs/2021</crossref>
<url>db/conf/ccs/ccs2021.html#DaiSW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/HeftrigSSWW21" mdate="2023-10-17">
<author pid="279/5630">Elias Heftrig</author>
<author pid="98/117">Jean-Pierre Seifert</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<author pid="156/5531">Nils Wisiol</author>
<title>Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers.</title>
<pages>2423-2425</pages>
<year>2021</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3460120.3485349</ee>
<crossref>conf/ccs/2021</crossref>
<url>db/conf/ccs/ccs2021.html#HeftrigSSWW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/BrandtSW21" mdate="2024-05-07">
<author pid="207/6893">Markus Brandt</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Evaluating Resilience of Domains in PKI.</title>
<pages>2444-2446</pages>
<year>2021</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3460120.3485356</ee>
<crossref>conf/ccs/2021</crossref>
<url>db/conf/ccs/ccs2021.html#BrandtSW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/BaumannHSW21" mdate="2024-05-07">
<author pid="297/4749">Lukas Baumann</author>
<author pid="279/5630">Elias Heftrig</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>The Master and Parasite Attack.</title>
<pages>141-148</pages>
<year>2021</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN48987.2021.00029</ee>
<crossref>conf/dsn/2021</crossref>
<url>db/conf/dsn/dsn2021.html#BaumannHSW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/DaiSW21" mdate="2025-07-04">
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Poster: Off-path VoIP Interception Attacks.</title>
<pages>1-2</pages>
<year>2021</year>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS51616.2021.00117</ee>
<crossref>conf/icdcs/2021</crossref>
<url>db/conf/icdcs/icdcs2021.html#DaiSW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/DaiSW21a" mdate="2025-07-04">
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Poster: Fragmentation Attacks on DNS over TCP.</title>
<pages>1124-1125</pages>
<year>2021</year>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS51616.2021.00118</ee>
<crossref>conf/icdcs/2021</crossref>
<url>db/conf/icdcs/icdcs2021.html#DaiSW21a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/HlavacekSW21" mdate="2023-10-17">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments.</title>
<pages>1-2</pages>
<year>2021</year>
<booktitle>INFOCOM Workshops</booktitle>
<ee>https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484607</ee>
<crossref>conf/infocom/2021w</crossref>
<url>db/conf/infocom/infocom2021w.html#HlavacekSW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/ShulmanW21" mdate="2024-05-07">
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>SSLChecker.</title>
<pages>1-2</pages>
<year>2021</year>
<booktitle>INFOCOM Workshops</booktitle>
<ee>https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484535</ee>
<crossref>conf/infocom/2021w</crossref>
<url>db/conf/infocom/infocom2021w.html#ShulmanW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigcomm/DaiJSW21" mdate="2025-07-04">
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author orcid="0000-0002-5290-6328" pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>From IP to transport and beyond: cross-layer attacks against applications.</title>
<pages>836-849</pages>
<year>2021</year>
<booktitle>SIGCOMM</booktitle>
<ee>https://doi.org/10.1145/3452296.3472933</ee>
<crossref>conf/sigcomm/2021</crossref>
<url>db/conf/sigcomm/sigcomm2021.html#DaiJSW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/DaiJSW21" mdate="2023-10-17">
<author pid="188/4885">Tianxiang Dai</author>
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources.</title>
<pages>3147-3164</pages>
<year>2021</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity21/presentation/dai</ee>
<crossref>conf/uss/2021</crossref>
<url>db/conf/uss/uss2021.html#DaiJSW21</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2021-1" mdate="2023-10-17">
<editor orcid="0000-0002-4029-7051" pid="b/ElisaBertino">Elisa Bertino</editor>
<editor orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</editor>
<editor orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</editor>
<title>Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I</title>
<booktitle>ESORICS (1)</booktitle>
<publisher>Springer</publisher>
<year>2021</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12972</volume>
<isbn>978-3-030-88417-8</isbn>
<isbn>978-3-030-88418-5</isbn>
<ee>https://doi.org/10.1007/978-3-030-88418-5</ee>
<url>db/conf/esorics/esorics2021-1.html</url>
</proceedings>
</r>
<r><proceedings key="conf/esorics/2021-2" mdate="2023-10-17">
<editor orcid="0000-0002-4029-7051" pid="b/ElisaBertino">Elisa Bertino</editor>
<editor orcid="0000-0002-8130-0472" pid="94/7397">Haya Schulmann</editor>
<editor orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</editor>
<title>Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II</title>
<booktitle>ESORICS (2)</booktitle>
<publisher>Springer</publisher>
<year>2021</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>12973</volume>
<isbn>978-3-030-88427-7</isbn>
<isbn>978-3-030-88428-4</isbn>
<ee>https://doi.org/10.1007/978-3-030-88428-4</ee>
<url>db/conf/esorics/esorics2021-2.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2107-06415" mdate="2023-10-17">
<author pid="297/4749">Lukas Baumann</author>
<author pid="279/5630">Elias Heftrig</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>The Master and Parasite Attack.</title>
<year>2021</year>
<volume>abs/2107.06415</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2107.06415</ee>
<url>db/journals/corr/corr2107.html#abs-2107-06415</url>
</article>
</r>
<r><inproceedings key="conf/conext/SenfSW20" mdate="2026-02-19">
<author pid="185/2444">Daniel Senf</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Performance penalties of resilient SDN infrastructures.</title>
<pages>528-529</pages>
<year>2020</year>
<booktitle>CoNEXT</booktitle>
<ee type="oa">https://doi.org/10.1145/3386367.3432351</ee>
<crossref>conf/conext/2020</crossref>
<url>db/conf/conext/conext2020.html#SenfSW20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/conext/KleinHSW20" mdate="2026-02-19">
<author orcid="0000-0002-8024-8756" pid="98/3396">Amit Klein 0001</author>
<author pid="279/5630">Elias Heftrig</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Black-box caches fingerprinting.</title>
<pages>564-565</pages>
<year>2020</year>
<booktitle>CoNEXT</booktitle>
<ee type="oa">https://doi.org/10.1145/3386367.3432148</ee>
<crossref>conf/conext/2020</crossref>
<url>db/conf/conext/conext2020.html#KleinHSW20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/JeitnerSW20a" mdate="2024-05-07">
<author orcid="0000-0002-5290-6328" pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Secure Consensus Generation with Distributed DoH.</title>
<pages>41-42</pages>
<year>2020</year>
<booktitle>DSN (Supplements)</booktitle>
<ee>https://doi.org/10.1109/DSN-S50200.2020.00023</ee>
<crossref>conf/dsn/2020s</crossref>
<url>db/conf/dsn/dsn2020s.html#JeitnerSW20a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/JeitnerSW20b" mdate="2023-10-17">
<author orcid="0000-0002-5290-6328" pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP.</title>
<pages>49-50</pages>
<year>2020</year>
<booktitle>DSN (Supplements)</booktitle>
<ee>https://doi.org/10.1109/DSN-S50200.2020.00027</ee>
<crossref>conf/dsn/2020s</crossref>
<url>db/conf/dsn/dsn2020s.html#JeitnerSW20b</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/JeitnerSW20" mdate="2023-10-17">
<author orcid="0000-0002-5290-6328" pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>The Impact of DNS Insecurity on Time.</title>
<pages>266-277</pages>
<year>2020</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN48063.2020.00043</ee>
<crossref>conf/dsn/2020</crossref>
<url>db/conf/dsn/dsn2020.html#JeitnerSW20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/SchneiderSSSW20" mdate="2026-01-06">
<author pid="s/MarkusSchneider2">Markus Schneider 0002</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="271/6497">Adi Sidis</author>
<author pid="271/6111">Ravid Sidis</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Diving into Email Bomb Attack.</title>
<pages>286-293</pages>
<year>2020</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN48063.2020.00045</ee>
<crossref>conf/dsn/2020</crossref>
<url>db/conf/dsn/dsn2020.html#SchneiderSSSW20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/KleinSW20" mdate="2024-05-07">
<author orcid="0000-0002-8024-8756" pid="98/3396">Amit Klein 0001</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Cryptanalysis of FNV-Based Cookies.</title>
<pages>1-6</pages>
<year>2020</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOBECOM42002.2020.9347968</ee>
<crossref>conf/globecom/2020</crossref>
<url>db/conf/globecom/globecom2020.html#KleinSW20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/SchneiderSW20" mdate="2026-01-06">
<author pid="s/MarkusSchneider2">Markus Schneider 0002</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Blocking Email Bombs with EmailGlass.</title>
<pages>1-6</pages>
<year>2020</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOBECOM42002.2020.9322348</ee>
<crossref>conf/globecom/2020</crossref>
<url>db/conf/globecom/globecom2020.html#SchneiderSW20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2010-08460" mdate="2023-10-17">
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Pitfalls of Provably Secure Systems in Internet The Case of Chronos-NTP.</title>
<year>2020</year>
<volume>abs/2010.08460</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2010.08460</ee>
<url>db/journals/corr/corr2010.html#abs-2010-08460</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2010-09331" mdate="2023-10-17">
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Secure Consensus Generation with Distributed DoH.</title>
<year>2020</year>
<volume>abs/2010.09331</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2010.09331</ee>
<url>db/journals/corr/corr2010.html#abs-2010-09331</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2010-09338" mdate="2023-10-17">
<author pid="271/6045">Philipp Jeitner</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>The Impact of DNS Insecurity on Time.</title>
<year>2020</year>
<volume>abs/2010.09338</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2010.09338</ee>
<url>db/journals/corr/corr2010.html#abs-2010-09338</url>
</article>
</r>
<r><inproceedings key="conf/kryptotag/BrandtSW19" mdate="2024-05-07">
<author pid="207/6893">Markus Brandt</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Internet As a Source of Randomness.</title>
<year>2019</year>
<booktitle>Krypto-Tag</booktitle>
<ee>https://doi.org/10.18420/cdm-2019-30-24</ee>
<crossref>conf/kryptotag/2019-1</crossref>
<url>db/conf/kryptotag/kryptotag2019-1.html#BrandtSW19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kryptotag/BrandtSW19a" mdate="2024-05-07">
<author pid="207/6893">Markus Brandt</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Distributed Domain Validation (DDV).</title>
<year>2019</year>
<booktitle>Krypto-Tag</booktitle>
<ee>https://doi.org/10.18420/cdm-2019-31-21</ee>
<crossref>conf/kryptotag/2019-2</crossref>
<url>db/conf/kryptotag/kryptotag2019-2.html#BrandtSW19a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/BrandtDKSW18" mdate="2025-01-19">
<author pid="207/6893">Markus Brandt</author>
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author orcid="0000-0002-8024-8756" pid="98/3396">Amit Klein 0001</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Domain Validation++ For MitM-Resilient PKI.</title>
<pages>2060-2076</pages>
<year>2018</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3243734.3243790</ee>
<ee>https://www.wikidata.org/entity/Q130961335</ee>
<crossref>conf/ccs/2018</crossref>
<url>db/conf/ccs/ccs2018.html#BrandtDKSW18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/DaiSW18" mdate="2025-01-19">
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Off-Path Attacks Against PKI.</title>
<pages>2213-2215</pages>
<year>2018</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3243734.3278516</ee>
<ee>https://www.wikidata.org/entity/Q130959285</ee>
<crossref>conf/ccs/2018</crossref>
<url>db/conf/ccs/ccs2018.html#DaiSW18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/ShrishakSW18" mdate="2023-10-17">
<author pid="192/5940">Kris Shrishak</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Removing the Bottleneck for Practical 2PC.</title>
<pages>2300-2302</pages>
<year>2018</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3243734.3278521</ee>
<crossref>conf/ccs/2018</crossref>
<url>db/conf/ccs/ccs2018.html#ShrishakSW18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/HlavacekHSW18" mdate="2024-05-07">
<author pid="223/6748">Tomas Hlavacek</author>
<author pid="62/3150">Amir Herzberg</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Practical Experience: Methodologies for Measuring Route Origin Validation.</title>
<pages>634-641</pages>
<year>2018</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN.2018.00070</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSN.2018.00070</ee>
<crossref>conf/dsn/2018</crossref>
<url>db/conf/dsn/dsn2018.html#HlavacekHSW18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hotnets/BrandtSW18" mdate="2025-01-19">
<author pid="207/6893">Markus Brandt</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Internet As a Source of Randomness.</title>
<pages>64-70</pages>
<year>2018</year>
<booktitle>HotNets</booktitle>
<ee>https://doi.org/10.1145/3286062.3286072</ee>
<ee>https://www.wikidata.org/entity/Q130990104</ee>
<crossref>conf/hotnets/2018</crossref>
<url>db/conf/hotnets/hotnets2018.html#BrandtSW18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/GohringSW18" mdate="2024-05-07">
<author pid="223/6873">Matthias Gohring</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Path MTU Discovery Considered Harmful.</title>
<pages>866-874</pages>
<year>2018</year>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS.2018.00088</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCS.2018.00088</ee>
<crossref>conf/icdcs/2018</crossref>
<url>db/conf/icdcs/icdcs2018.html#GohringSW18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/KleinKPSW17" mdate="2024-05-07">
<author orcid="0000-0002-8024-8756" pid="98/3396">Amit Klein 0001</author>
<author pid="48/8052">Vladimir Kravtsov</author>
<author pid="207/6577">Alon Perlmuter</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>POSTER: X-Ray Your DNS.</title>
<pages>2519-2521</pages>
<year>2017</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3133956.3138821</ee>
<crossref>conf/ccs/2017</crossref>
<url>db/conf/ccs/ccs2017.html#KleinKPSW17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/KleinSW17" mdate="2024-05-07">
<author orcid="0000-0002-8024-8756" pid="98/3396">Amit Klein 0001</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet.</title>
<pages>367-378</pages>
<year>2017</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN.2017.63</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSN.2017.63</ee>
<crossref>conf/dsn/2017</crossref>
<url>db/conf/dsn/dsn2017.html#KleinSW17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/KleinSW17" mdate="2024-05-07">
<author orcid="0000-0002-8024-8756" pid="98/3396">Amit Klein 0001</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Internet-wide study of DNS cache injections.</title>
<pages>1-9</pages>
<year>2017</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM.2017.8057202</ee>
<crossref>conf/infocom/2017</crossref>
<url>db/conf/infocom/infocom2017.html#KleinSW17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nsdi/ShulmanW17" mdate="2023-10-17">
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.</title>
<pages>131-144</pages>
<year>2017</year>
<booktitle>NSDI</booktitle>
<ee type="oa">https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/shulman</ee>
<crossref>conf/nsdi/2017</crossref>
<url>db/conf/nsdi/nsdi2017.html#ShulmanW17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigcomm/RotenbergSWZ17" mdate="2025-01-19">
<author pid="204/9509">Nadav Rotenberg</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<author pid="204/9345">Benjamin Zeltser</author>
<title>Authentication-Bypass Vulnerabilities in SOHO Routers.</title>
<pages>68-70</pages>
<year>2017</year>
<booktitle>SIGCOMM Posters and Demos</booktitle>
<ee>https://doi.org/10.1145/3123878.3131989</ee>
<ee>https://www.wikidata.org/entity/Q130919569</ee>
<crossref>conf/sigcomm/2017p</crossref>
<url>db/conf/sigcomm/p2017.html#RotenbergSWZ17</url>
</inproceedings>
</r>
<r><article key="journals/ieeesp/GhiglieriW16" mdate="2024-05-07">
<author pid="66/8121">Marco Ghiglieri</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>HbbTV Security and Privacy: Issues and Challenges.</title>
<pages>61-67</pages>
<year>2016</year>
<volume>14</volume>
<journal>IEEE Secur. Priv.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/MSP.2016.54</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2016.54</ee>
<url>db/journals/ieeesp/ieeesp14.html#GhiglieriW16</url>
</article>
</r>
<r><inproceedings key="conf/cans/DaiSW16" mdate="2024-08-04">
<author orcid="0009-0002-7968-2499" pid="188/4885">Tianxiang Dai</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>DNSSEC Misconfigurations in Popular Domains.</title>
<pages>651-660</pages>
<year>2016</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-48965-0_43</ee>
<crossref>conf/cans/2016</crossref>
<url>db/conf/cans/cans2016.html#DaiSW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/HerzbergSW16" mdate="2023-10-17">
<author pid="62/3150">Amir Herzberg</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Stratum Filtering: Cloud-based Detection of Attack Sources.</title>
<pages>47-48</pages>
<year>2016</year>
<booktitle>CCSW</booktitle>
<ee>https://doi.org/10.1145/2996429.2996440</ee>
<crossref>conf/ccs/2016ccsw</crossref>
<url>db/conf/ccs/ccsw2016.html#HerzbergSW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/date/WaidnerK16" mdate="2021-08-09">
<author pid="90/308">Michael Waidner</author>
<author pid="06/9">Michael Kasper</author>
<title>Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution.</title>
<pages>1303-1308</pages>
<year>2016</year>
<booktitle>DATE</booktitle>
<ee>https://ieeexplore.ieee.org/document/7459511/</ee>
<crossref>conf/date/2016</crossref>
<url>db/conf/date/date2016.html#WaidnerK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/FeldmannHKSSSTW16" mdate="2024-10-29">
<author orcid="0000-0002-5530-6993" pid="f/AnjaFeldmann">Anja Feldmann</author>
<author pid="187/0847">Philipp Heyder</author>
<author pid="33/6146-1">Michael Kreutzer 0001</author>
<author orcid="0000-0002-7798-1711" pid="58/3289-1">Stefan Schmid 0001</author>
<author pid="98/117">Jean-Pierre Seifert</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="186/8118">Kashyap Thimmaraju</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<author pid="187/0838">Jens Sieberg</author>
<title>NetCo: Reliable Routing With Unreliable Routers.</title>
<pages>128-135</pages>
<year>2016</year>
<booktitle>DSN Workshops</booktitle>
<ee>https://doi.org/10.1109/DSN-W.2016.38</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSN-W.2016.38</ee>
<crossref>conf/dsn/2016w</crossref>
<url>db/conf/dsn/dsn2016w.html#FeldmannHKSSSTW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/swste/BorgwartSW16" mdate="2024-05-07">
<author pid="176/5819">Andreas Borgwart</author>
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Towards Automated Measurements of Internet's Naming Infrastructure.</title>
<pages>117-124</pages>
<year>2016</year>
<booktitle>SwSTE</booktitle>
<ee>https://doi.org/10.1109/SWSTE.2016.25</ee>
<crossref>conf/swste/2016</crossref>
<url>db/conf/swste/swste2016.html#BorgwartSW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tma/ShulmanW16" mdate="2023-10-17">
<author pid="94/7397">Haya Schulmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.</title>
<year>2016</year>
<booktitle>TMA</booktitle>
<ee type="oa">http://dl.ifip.org/db/conf/tma/tma2016/tma2016-final52.pdf</ee>
<crossref>conf/tma/2016</crossref>
<url>db/conf/tma/tma2016.html#ShulmanW16</url>
</inproceedings>
</r>
<r><article key="journals/dud/KraussW15" mdate="2017-05-27">
<author pid="34/4605">Christoph Krau&#223;</author>
<author pid="90/308">Michael Waidner</author>
<title>IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.</title>
<pages>383-387</pages>
<year>2015</year>
<volume>39</volume>
<journal>Datenschutz und Datensicherheit</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s11623-015-0434-4</ee>
<url>db/journals/dud/dud39.html#KraussW15</url>
</article>
</r>
<r><inproceedings key="conf/dac/SadeghiWW15" mdate="2024-05-07">
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<author pid="70/6890">Christian Wachsmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Security and privacy challenges in industrial internet of things.</title>
<pages>54:1-54:6</pages>
<year>2015</year>
<booktitle>DAC</booktitle>
<ee>https://doi.org/10.1145/2744769.2747942</ee>
<crossref>conf/dac/2015</crossref>
<url>db/conf/dac/dac2015.html#SadeghiWW15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/ShulmanW15" mdate="2024-05-07">
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Towards Security of Internet Naming Infrastructure.</title>
<pages>3-22</pages>
<year>2015</year>
<booktitle>ESORICS (1)</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-24174-6_1</ee>
<crossref>conf/esorics/2015-1</crossref>
<url>db/conf/esorics/esorics2015-1.html#ShulmanW15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/BorgwartBSRW15" mdate="2024-05-07">
<author pid="176/5819">Andreas Borgwart</author>
<author pid="176/5717">Spyros Boukoros</author>
<author pid="94/7397">Haya Schulmann</author>
<author pid="176/5791">Carel van Rooyen</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Detection and Forensics of Domains Hijacking.</title>
<pages>1-6</pages>
<year>2015</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2014.7417736</ee>
<crossref>conf/globecom/2015</crossref>
<url>db/conf/globecom/globecom2015.html#BorgwartBSRW15</url>
</inproceedings>
</r>
<r><article key="journals/ejisec/ShulmanW14" mdate="2024-05-07">
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>DNSSEC for cyber forensics.</title>
<pages>16</pages>
<year>2014</year>
<volume>2014</volume>
<journal>EURASIP J. Inf. Secur.</journal>
<ee type="oa">https://doi.org/10.1186/s13635-014-0016-2</ee>
<ee>https://www.wikidata.org/entity/Q59395005</ee>
<url>db/journals/ejisec/ejisec2014.html#ShulmanW14</url>
</article>
</r>
<r><inproceedings key="conf/acns/ShulmanW14" mdate="2024-05-07">
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Fragmentation Considered Leaking: Port Inference for DNS Poisoning.</title>
<pages>531-548</pages>
<year>2014</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-07536-5_31</ee>
<crossref>conf/acns/2014</crossref>
<url>db/conf/acns/acns2014.html#ShulmanW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/percom/GhiglieriSW14" mdate="2024-05-07">
<author pid="66/8121">Marco Ghiglieri</author>
<author pid="26/11205">Martin Stopczynski</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Personal DLP for Facebook.</title>
<pages>629-634</pages>
<year>2014</year>
<booktitle>PerCom Workshops</booktitle>
<ee>https://doi.org/10.1109/PerComW.2014.6815279</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PerComW.2014.6815279</ee>
<crossref>conf/percom/2014w</crossref>
<url>db/conf/percom/percomw2014.html#GhiglieriSW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/ShulmanW14" mdate="2024-05-07">
<author pid="94/7397">Haya Schulmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Towards Forensic Analysis of Attacks with DNSSEC.</title>
<pages>69-76</pages>
<year>2014</year>
<booktitle>IEEE Symposium on Security and Privacy Workshops</booktitle>
<ee>https://doi.org/10.1109/SPW.2014.20</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SPW.2014.20</ee>
<crossref>conf/sp/2014w</crossref>
<url>db/conf/sp/spw2014.html#ShulmanW14</url>
</inproceedings>
</r>
<r><article key="journals/pik/KreutzerWB12" mdate="2024-10-29">
<author pid="33/6146-1">Michael Kreutzer 0001</author>
<author pid="90/308">Michael Waidner</author>
<author pid="b/JohannesBuchmann">Johannes Buchmann 0001</author>
<title>IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.</title>
<pages>305-308</pages>
<year>2012</year>
<volume>35</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>4</number>
<ee>https://doi.org/10.1515/pik-2012-0040</ee>
<url>db/journals/pik/pik35.html#KreutzerWB12</url>
</article>
</r>
<r><proceedings key="conf/sicherheit/2012" mdate="2021-01-13">
<editor pid="s/NeerajSuri">Neeraj Suri</editor>
<editor pid="90/308">Michael Waidner</editor>
<title>Sicherheit 2012: Sicherheit, Schutz und Zuverl&#228;ssigkeit, Beitr&#228;ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f&#252;r Informatik e.V. (GI), 7.-9. M&#228;rz 2012 in Darmstadt</title>
<isbn>978-3-88579-289-5</isbn>
<booktitle>Sicherheit</booktitle>
<series href="db/series/lni/index.html">LNI</series>
<volume>P-195</volume>
<publisher>GI</publisher>
<year>2012</year>
<ee type="oa">https://dl.gi.de/handle/20.500.12116/19975</ee>
<ee>http://subs.emis.de/LNI/Proceedings/Proceedings195.html</ee>
<url>db/conf/sicherheit/sicherheit2012.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/KapitzaSSVW12" mdate="2017-11-03">
<author pid="27/2697">R&#252;diger Kapitza</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="s/MarcShapiro">Marc Shapiro 0001</author>
<author pid="v/PauloVerissimo">Paulo Ver&#237;ssimo</author>
<author pid="90/308">Michael Waidner</author>
<title>Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281).</title>
<pages>56-72</pages>
<year>2012</year>
<volume>2</volume>
<journal>Dagstuhl Reports</journal>
<number>7</number>
<ee type="oa">https://doi.org/10.4230/DagRep.2.7.56</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports2.html#KapitzaSSVW12</url>
</article>
</r>
<r><article key="journals/dagstuhl-manifestos/Fischer-HubnerHKRW11" mdate="2017-05-28">
<author pid="f/SimoneFischerHubner">Simone Fischer-H&#252;bner</author>
<author pid="63/8069">Chris Jay Hoofnagle</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="r/KRannenberg">Kai Rannenberg</author>
<author pid="90/308">Michael Waidner</author>
<title>Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).</title>
<pages>1-20</pages>
<year>2011</year>
<volume>1</volume>
<journal>Dagstuhl Manifestos</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.4230/DagMan.1.1.1</ee>
<url>db/journals/dagstuhl-manifestos/dagstuhl-manifestos1.html#Fischer-HubnerHKRW11</url>
</article>
</r>
<r><article key="journals/it/FederrathHW11" mdate="2024-05-07">
<author pid="f/HannesFederrath">Hannes Federrath</author>
<author pid="85/1807">Marit Hansen</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Andreas Pfitzmann 1958 - 2010.</title>
<pages>5-7</pages>
<year>2011</year>
<volume>53</volume>
<journal>it Inf. Technol.</journal>
<number>1</number>
<ee>https://doi.org/10.1524/itit.2011.0617</ee>
<url>db/journals/it/it53.html#FederrathHW11</url>
</article>
</r>
<r><article publtype="informal" key="journals/dagstuhl-reports/Fischer-HubnerHRWKM11" mdate="2017-06-07">
<author pid="f/SimoneFischerHubner">Simone Fischer-H&#252;bner</author>
<author pid="63/8069">Chris Jay Hoofnagle</author>
<author pid="r/KRannenberg">Kai Rannenberg</author>
<author pid="90/308">Michael Waidner</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="33/3748">Michael Marh&#246;fer</author>
<title>Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).</title>
<pages>1-15</pages>
<year>2011</year>
<volume>1</volume>
<journal>Dagstuhl Reports</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.4230/DagRep.1.2.1</ee>
<url>db/journals/dagstuhl-reports/dagstuhl-reports1.html#Fischer-HubnerHRWKM11</url>
</article>
</r>
<r><inproceedings key="conf/primelife/FederrathHW10" mdate="2018-06-26">
<author pid="f/HannesFederrath">Hannes Federrath</author>
<author pid="85/1807">Marit Hansen</author>
<author pid="90/308">Michael Waidner</author>
<title>Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society.</title>
<pages>349-352</pages>
<year>2010</year>
<booktitle>PrimeLife</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-20769-3_28</ee>
<crossref>conf/primelife/2010</crossref>
<url>db/conf/primelife/primelife2010.html#FederrathHW10</url>
</inproceedings>
</r>
<r><article key="journals/iandc/BackesPW07" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>The reactive simulatability (RSIM) framework for asynchronous systems.</title>
<pages>1685-1720</pages>
<year>2007</year>
<volume>205</volume>
<journal>Inf. Comput.</journal>
<number>12</number>
<ee type="oa">https://doi.org/10.1016/j.ic.2007.05.002</ee>
<url>db/journals/iandc/iandc205.html#BackesPW07</url>
</article>
</r>
<r><article key="journals/jcs/BackesBW07" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="b/DavidABasin">David A. Basin</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Preface.</title>
<pages>561</pages>
<year>2007</year>
<volume>15</volume>
<journal>J. Comput. Secur.</journal>
<number>6</number>
<ee>https://doi.org/10.3233/jcs-2007-15601</ee>
<url>db/journals/jcs/jcs15.html#BackesBW07</url>
</article>
</r>
<r><inproceedings key="conf/pet/SchunterW07" mdate="2017-05-23">
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<title>Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.</title>
<pages>218-232</pages>
<year>2007</year>
<crossref>conf/pet/2007</crossref>
<booktitle>Privacy Enhancing Technologies</booktitle>
<ee>https://doi.org/10.1007/978-3-540-75551-7_14</ee>
<url>db/conf/pet/pet2007.html#SchunterW07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/SprengerBBPW06" mdate="2024-08-04">
<author orcid="0000-0003-2941-5165" pid="s/ChristophSprenger">Christoph Sprenger 0001</author>
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="b/DavidABasin">David A. Basin</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Cryptographically Sound Theorem Proving.</title>
<pages>153-166</pages>
<year>2006</year>
<crossref>conf/csfw/2006</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2006.10</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2006.10</ee>
<url>db/conf/csfw/csfw2006.html#SprengerBBPW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esas/BenensonFPRW06" mdate="2024-05-07">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="18/1549">Christian Rohner</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.</title>
<pages>165-178</pages>
<year>2006</year>
<crossref>conf/esas/2006</crossref>
<booktitle>ESAS</booktitle>
<ee>https://doi.org/10.1007/11964254_15</ee>
<url>db/conf/esas/esas2006.html#BenensonFPRW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BackesPW06" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.</title>
<pages>404-423</pages>
<year>2006</year>
<crossref>conf/esorics/2006</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11863908_25</ee>
<url>db/conf/esorics/esorics2006.html#BackesPW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fm/BackesPW06" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Formal Methods and Cryptography.</title>
<pages>612-616</pages>
<year>2006</year>
<crossref>conf/fm/2006</crossref>
<booktitle>FM</booktitle>
<ee>https://doi.org/10.1007/11813040_44</ee>
<url>db/conf/fm/fm2006.html#BackesPW06</url>
</inproceedings>
</r>
<r><incollection key="series/ais/KarjothPSW06" mdate="2024-05-07">
<author pid="k/GunterKarjoth">G&#252;nter Karjoth</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Service-oriented Assurance - Comprehensive Security by Explicit Assurances.</title>
<pages>13-24</pages>
<year>2006</year>
<booktitle>Quality of Protection</booktitle>
<ee>https://doi.org/10.1007/978-0-387-36584-8_2</ee>
<crossref>series/ais/23</crossref>
<url>db/series/ais/ais23.html#KarjothPSW06</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/PfitzmannSW06" mdate="2020-05-11">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<title>Reactively Simulatable Certified Mail.</title>
<pages>41</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/041</ee>
<url>db/journals/iacr/iacr2006.html#PfitzmannSW06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/SprengerBBPW06" mdate="2020-05-11">
<author pid="s/ChristophSprenger">Christoph Sprenger 0001</author>
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="b/DavidABasin">David A. Basin</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Cryptographically Sound Theorem Proving.</title>
<pages>47</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/047</ee>
<url>db/journals/iacr/iacr2006.html#SprengerBBPW06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW06" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.</title>
<pages>68</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/068</ee>
<url>db/journals/iacr/iacr2006.html#BackesPW06</url>
</article>
</r>
<r><article key="journals/ijisec/BackesPW05" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library.</title>
<pages>135-154</pages>
<year>2005</year>
<volume>4</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-004-0056-6</ee>
<url>db/journals/ijisec/ijisec4.html#BackesPW05</url>
</article>
</r>
<r><article key="journals/ijisec/BackesPW05a" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Reactively secure signature schemes.</title>
<pages>242-252</pages>
<year>2005</year>
<volume>4</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10207-004-0062-8</ee>
<url>db/journals/ijisec/ijisec4.html#BackesPW05a</url>
</article>
</r>
<r><article key="journals/tdsc/PaxsonW05" mdate="2024-05-07">
<author pid="p/VernPaxson">Vern Paxson</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy.</title>
<pages>81</pages>
<year>2005</year>
<volume>2</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TDSC.2005.23</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2005.23</ee>
<url>db/journals/tdsc/tdsc2.html#PaxsonW05</url>
</article>
</r>
<r><article key="journals/debu/KarjothSW04" mdate="2020-08-19">
<author pid="k/GunterKarjoth">G&#252;nter Karjoth</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<title>Privacy-enabled Management of Customer Data.</title>
<pages>3-9</pages>
<year>2004</year>
<volume>27</volume>
<journal>IEEE Data Eng. Bull.</journal>
<number>1</number>
<ee type="oa">http://sites.computer.org/debull/A04mar/schunter.ps</ee>
<url>db/journals/debu/debu27.html#KarjothSW04</url>
</article>
</r>
<r><article key="journals/ijisec/Waidner04" mdate="2018-06-26">
<author pid="90/308">Michael Waidner</author>
<title>Preface.</title>
<pages>1</pages>
<year>2004</year>
<volume>3</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1007/s10207-004-0051-y</ee>
<url>db/journals/ijisec/ijisec3.html#Waidner04</url>
</article>
</r>
<r><article key="journals/istr/HansenBCCPW04" mdate="2024-10-10">
<author pid="85/1807">Marit Hansen</author>
<author pid="128/2336">Peter Berlich</author>
<author pid="c/JanCamenisch">Jan Camenisch</author>
<author pid="61/1101-1">Sebastian Clau&#223; 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Privacy-enhancing identity management.</title>
<pages>35-44</pages>
<year>2004</year>
<volume>9</volume>
<journal>Inf. Secur. Tech. Rep.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/S1363-4127(04)00014-7</ee>
<url>db/journals/istr/istr9.html#HansenBCCPW04</url>
</article>
</r>
<r><article key="journals/jcs/BackesPW04" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Polynomial liveness.</title>
<pages>589-617</pages>
<year>2004</year>
<volume>12</volume>
<journal>J. Comput. Secur.</journal>
<number>3-4</number>
<url>db/journals/jcs/jcs12.html#BackesPW04</url>
<ee>https://doi.org/10.3233/jcs-2004-123-409</ee>
<ee>https://www.wikidata.org/entity/Q114944127</ee>
</article>
</r>
<r><inproceedings key="conf/fosad/BackesPW04" mdate="2017-05-21">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Justifying a Dolev-Yao Model Under Active Attacks.</title>
<pages>1-41</pages>
<year>2004</year>
<crossref>conf/fosad/2005</crossref>
<booktitle>FOSAD</booktitle>
<ee>https://doi.org/10.1007/11554578_1</ee>
<url>db/conf/fosad/fosad2005.html#BackesPW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/BackesPW04" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Low-Level Ideal Signatures and General Integrity Idealization.</title>
<pages>39-51</pages>
<ee>https://doi.org/10.1007/978-3-540-30144-8_4</ee>
<year>2004</year>
<crossref>conf/isw/2004</crossref>
<booktitle>ISC</booktitle>
<url>db/conf/isw/isc2004.html#BackesPW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tcc/BackesPW04" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>A General Composition Theorem for Secure Reactive Systems.</title>
<pages>336-354</pages>
<ee>https://doi.org/10.1007/978-3-540-24638-1_19</ee>
<year>2004</year>
<crossref>conf/tcc/2004</crossref>
<booktitle>TCC</booktitle>
<url>db/conf/tcc/tcc2004.html#BackesPW04</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2004" mdate="2020-11-10">
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor pid="b/MichaelBackes1">Michael Backes 0001</editor>
<editor pid="b/DavidABasin">David A. Basin</editor>
<editor pid="90/308">Michael Waidner</editor>
<title>Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004</title>
<booktitle>FMSE</booktitle>
<publisher>ACM</publisher>
<year>2004</year>
<isbn>1-58113-971-3</isbn>
<url>db/conf/ccs/ccs2004.html</url>
<ee>http://dl.acm.org/citation.cfm?id=1030083</ee>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW04" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.</title>
<pages>82</pages>
<year>2004</year>
<volume>2004</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2004/082</ee>
<url>db/journals/iacr/iacr2004.html#BackesPW04</url>
</article>
</r>
<r><article key="journals/internet/PfitzmannW03" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Analysis of Liberty Single-Sign-on with Enabled Clients.</title>
<pages>38-44</pages>
<year>2003</year>
<volume>7</volume>
<journal>IEEE Internet Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/MIC.2003.1250582</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MIC.2003.1250582</ee>
<url>db/journals/internet/internet7.html#PfitzmannW03</url>
</article>
</r>
<r><inproceedings key="conf/bpm/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Security in Business Process Engineering.</title>
<pages>168-183</pages>
<year>2003</year>
<crossref>conf/bpm/2003</crossref>
<booktitle>Business Process Management</booktitle>
<ee>https://doi.org/10.1007/3-540-44895-0_12</ee>
<url>db/conf/bpm/bpm2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>A composable cryptographic library with nested operations.</title>
<pages>220-230</pages>
<year>2003</year>
<crossref>conf/ccs/2003</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/948109.948140</ee>
<url>db/conf/ccs/ccs2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dexaw/KarjothSHW03" mdate="2024-05-07">
<author pid="k/GunterKarjoth">G&#252;nter Karjoth</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="92/6243">Els Van Herreweghen</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Amending P3P for Clearer Privacy Promises.</title>
<pages>445-449</pages>
<year>2003</year>
<crossref>conf/dexaw/2003</crossref>
<booktitle>DEXA Workshops</booktitle>
<ee>https://doi.org/10.1109/DEXA.2003.1232062</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DEXA.2003.1232062</ee>
<url>db/conf/dexaw/dexaw2003.html#KarjothSHW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Symmetric Authentication within a Simulatable Cryptographic Library.</title>
<pages>271-290</pages>
<ee>https://doi.org/10.1007/978-3-540-39650-5_16</ee>
<year>2003</year>
<crossref>conf/esorics/2003</crossref>
<booktitle>ESORICS</booktitle>
<url>db/conf/esorics/esorics2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Reactively Secure Signature Schemes.</title>
<pages>84-95</pages>
<ee>https://doi.org/10.1007/10958513_7</ee>
<year>2003</year>
<crossref>conf/isw/2003</crossref>
<booktitle>ISC</booktitle>
<url>db/conf/isw/isc2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/PfitzmannW03" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Federated Identity-Management Protocols.</title>
<pages>153-174</pages>
<year>2003</year>
<crossref>conf/spw/2003</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/11542322_20</ee>
<url>db/conf/spw/spw2003.html#PfitzmannW03</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW03" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>A Universally Composable Cryptographic Library.</title>
<pages>15</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/015</ee>
<url>db/journals/iacr/iacr2003.html#BackesPW03</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW03a" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Symmetric Authentication Within a Simulatable Cryptographic Library.</title>
<pages>145</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/145</ee>
<url>db/journals/iacr/iacr2003.html#BackesPW03a</url>
</article>
</r>
<r><inproceedings key="conf/csfw/BackesPSW02" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Polynomial Fairness and Liveness.</title>
<pages>160-174</pages>
<year>2002</year>
<crossref>conf/csfw/2002</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2002.1021814</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2002.1021814</ee>
<url>db/conf/csfw/csfw2002.html#BackesPSW02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dexaw/KarjothSW02" mdate="2024-05-07">
<author pid="k/GunterKarjoth">G&#252;nter Karjoth</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Privacy-Enabled Services for Enterprises.</title>
<pages>483-487</pages>
<year>2002</year>
<crossref>conf/dexaw/2002</crossref>
<booktitle>DEXA Workshops</booktitle>
<ee>https://doi.org/10.1109/DEXA.2002.1045944</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DEXA.2002.1045944</ee>
<url>db/conf/dexaw/dexaw2002.html#KarjothSW02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pet/KarjothSW02" mdate="2024-05-07">
<author pid="k/GunterKarjoth">G&#252;nter Karjoth</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.</title>
<pages>69-84</pages>
<ee>https://doi.org/10.1007/3-540-36467-6_6</ee>
<year>2002</year>
<crossref>conf/pet/2002</crossref>
<booktitle>Privacy Enhancing Technologies</booktitle>
<url>db/conf/pet/pet2002.html#KarjothSW02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wpes/PfitzmannW02" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Privacy in browser-based attribute exchange.</title>
<pages>52-62</pages>
<year>2002</year>
<crossref>conf/wpes/2002</crossref>
<booktitle>WPES</booktitle>
<ee>https://doi.org/10.1145/644527.644533</ee>
<url>db/conf/wpes/wpes2002.html#PfitzmannW02</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2002" mdate="2019-05-14">
<editor pid="39/5760">Dieter Gollmann</editor>
<editor pid="k/GunterKarjoth">G&#252;nter Karjoth</editor>
<editor pid="90/308">Michael Waidner</editor>
<title>Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings</title>
<booktitle>ESORICS</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>2502</volume>
<publisher>Springer</publisher>
<year>2002</year>
<isbn>3-540-44345-2</isbn>
<ee>https://doi.org/10.1007/3-540-45853-0</ee>
<url>db/conf/esorics/esorics2002.html</url>
</proceedings>
</r>
<r><article key="journals/tissec/SteinerBEW01" mdate="2024-05-07">
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="98/6777">Peter Buhler</author>
<author pid="49/2071">Thomas Eirich</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Secure password-based cipher suite for TLS.</title>
<pages>134-157</pages>
<year>2001</year>
<volume>4</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/501963.501965</ee>
<ee>https://www.wikidata.org/entity/Q114613784</ee>
<url>db/journals/tissec/tissec4.html#SteinerBEW01</url>
</article>
</r>
<r><inproceedings key="conf/csfw/ScedrovCGWW01" mdate="2023-03-24">
<author pid="39/3354">Andre Scedrov</author>
<author pid="c/RanCanetti">Ran Canetti</author>
<author pid="91/7024">Joshua D. Guttman</author>
<author pid="42/5626">David A. Wagner 0001</author>
<author pid="90/308">Michael Waidner</author>
<title>Relating Cryptography and Cryptographic Protocols.</title>
<pages>111-114</pages>
<year>2001</year>
<crossref>conf/csfw/2001</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2001.930140</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2001.930140</ee>
<url>db/conf/csfw/csfw2001.html#ScedrovCGWW01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/PfitzmannW01" mdate="2023-09-21">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.</title>
<pages>184-200</pages>
<year>2001</year>
<crossref>conf/sp/2001</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.2001.924298</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.2001.924298</ee>
<url>db/conf/sp/sp2001.html#PfitzmannW01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannRSWW01" mdate="2022-11-17">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="16/3647">James Riordan</author>
<author pid="76/3305">Christian St&#252;ble</author>
<author pid="90/308">Michael Waidner</author>
<author pid="15/1879">Arnd Weber</author>
<title>Die PERSEUS Systemarchitektur.</title>
<pages>1-17</pages>
<year>2001</year>
<booktitle>VIS</booktitle>
<ee>https://doi.org/10.1007/978-3-663-05918-9_1</ee>
<crossref>conf/vis/2001</crossref>
<url>db/conf/vis/vis2001.html#PfitzmannRSWW01</url>
</inproceedings>
</r>
<r><article key="journals/ac/AsokanJSW00" mdate="2024-05-07">
<author orcid="0000-0002-5093-9871" pid="39/2508">N. Asokan</author>
<author pid="j/PhilippeAJanson">Philippe A. Janson</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>State of the art in electronic payment systems.</title>
<pages>425-449</pages>
<year>2000</year>
<volume>53</volume>
<journal>Adv. Comput.</journal>
<url>db/journals/ac/ac53.html#AsokanJSW00</url>
<ee>https://doi.org/10.1016/S0065-2458(00)80009-1</ee>
</article>
</r>
<r><article key="journals/cn/FieldW00" mdate="2020-02-19">
<author pid="38/2424">Simon Field</author>
<author pid="90/308">Michael Waidner</author>
<title>Electronic Commerce.</title>
<pages>667-668</pages>
<year>2000</year>
<volume>32</volume>
<journal>Comput. Networks</journal>
<number>6</number>
<url>db/journals/cn/cn32.html#FieldW00</url>
<ee>https://doi.org/10.1016/S1389-1286(00)00088-8</ee>
</article>
</r>
<r><article key="journals/jsac/AsokanSW00" mdate="2024-05-07">
<author orcid="0000-0002-5093-9871" pid="39/2508">N. Asokan</author>
<author pid="s/VShoup">Victor Shoup</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Optimistic fair exchange of digital signatures.</title>
<pages>593-610</pages>
<year>2000</year>
<volume>18</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/49.839935</ee>
<url>db/journals/jsac/jsac18.html#AsokanSW00</url>
</article>
</r>
<r><article key="journals/jsac/BellareGHHKSTHW00" mdate="2026-02-02">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="10/4788">Juan A. Garay 0001</author>
<author pid="17/2186">Ralf C. Hauser</author>
<author pid="62/3150">Amir Herzberg</author>
<author pid="46/6715">Hugo Krawczyk</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="08/1183">Gene Tsudik</author>
<author pid="92/6243">Els Van Herreweghen</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Design, implementation, and deployment of the iKP secure electronic payment system.</title>
<pages>611-627</pages>
<year>2000</year>
<volume>18</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/49.839936</ee>
<url>db/journals/jsac/jsac18.html#BellareGHHKSTHW00</url>
</article>
</r>
<r><article key="journals/tpds/SteinerTW00" mdate="2024-05-07">
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="08/1183">Gene Tsudik</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Key Agreement in Dynamic Peer Groups.</title>
<pages>769-780</pages>
<year>2000</year>
<volume>11</volume>
<journal>IEEE Trans. Parallel Distributed Syst.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/71.877936</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/71.877936</ee>
<url>db/journals/tpds/tpds11.html#SteinerTW00</url>
</article>
</r>
<r><inproceedings key="conf/ccs/PfitzmannW00" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Composition and integrity preservation of secure reactive systems.</title>
<pages>245-254</pages>
<year>2000</year>
<crossref>conf/ccs/2000</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/352600.352639</ee>
<url>db/conf/ccs/ccs2000.html#PfitzmannW00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icalp/Baum-WaidnerW00" mdate="2024-05-07">
<author pid="03/4815">Birgit Baum-Waidner</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing.</title>
<pages>524-535</pages>
<ee>https://doi.org/10.1007/3-540-45022-X_44</ee>
<year>2000</year>
<crossref>conf/icalp/2000</crossref>
<booktitle>ICALP</booktitle>
<url>db/conf/icalp/icalp2000.html#Baum-WaidnerW00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/BuhlerEWS00" mdate="2021-02-01">
<author pid="98/6777">Peter Buhler</author>
<author pid="49/2071">Thomas Eirich</author>
<author pid="90/308">Michael Waidner</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<title>Secure Password-Based Cipher Suite for TLS.</title>
<year>2000</year>
<crossref>conf/ndss/2000</crossref>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss2000/secure-password-based-cipher-suite-tls-paper/</ee>
<url>db/conf/ndss/ndss2000.html#BuhlerEWS00</url>
</inproceedings>
</r>
<r><book key="books/sp/LacostePSW00" mdate="2020-05-23">
<editor pid="59/205">G&#233;rard Lacoste</editor>
<editor pid="p/BPfitzmann">Birgit Pfitzmann</editor>
<editor pid="64/5301-1">Michael Steiner 0001</editor>
<editor pid="90/308">Michael Waidner</editor>
<title>SEMPER - Secure Electronic Marketplace for Europe</title>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>1854</volume>
<publisher>Springer</publisher>
<year>2000</year>
<isbn>3-540-67825-5</isbn>
<ee>https://doi.org/10.1007/b75215</ee>
</book>
</r>
<r><proceedings key="conf/esorics/2000" mdate="2019-05-14">
<editor pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</editor>
<editor pid="62/1952">Yves Deswarte</editor>
<editor pid="39/5760">Dieter Gollmann</editor>
<editor pid="90/308">Michael Waidner</editor>
<title>Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings</title>
<booktitle>ESORICS</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>1895</volume>
<publisher>Springer</publisher>
<year>2000</year>
<isbn>3-540-41031-7</isbn>
<ee>https://doi.org/10.1007/10722599</ee>
<url>db/conf/esorics/esorics2000.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/PfitzmannW00" mdate="2020-05-11">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.</title>
<pages>66</pages>
<year>2000</year>
<volume>2000</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2000/066</ee>
<url>db/journals/iacr/iacr2000.html#PfitzmannW00</url>
</article>
</r>
<r><article key="journals/cn/AsokanDSW99" mdate="2025-01-19">
<author orcid="0000-0002-5093-9871" pid="39/2508">N. Asokan</author>
<author orcid="0000-0002-1344-4167" pid="86/4961">Herv&#233; Debar</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Authenticating public terminals.</title>
<pages>861-870</pages>
<year>1999</year>
<volume>31</volume>
<journal>Comput. Networks</journal>
<number>8</number>
<url>db/journals/cn/cn31.html#AsokanDSW99</url>
<ee>https://doi.org/10.1016/S1389-1286(98)00020-6</ee>
<ee>https://www.wikidata.org/entity/Q128028733</ee>
</article>
</r>
<r><article key="journals/wi/SchunterWW99" mdate="2024-05-07">
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<author pid="90/6995">Dale Whinnett</author>
<title>The SEMPER Framework for Secure Electronic Commerce.</title>
<pages>238-247</pages>
<year>1999</year>
<volume>41</volume>
<journal>Wirtschaftsinf.</journal>
<number>3</number>
<url>db/journals/wi/wi41.html#SchunterWW99</url>
<ee>https://doi.org/10.1007/BF03254936</ee>
</article>
</r>
<r><inproceedings key="conf/wirtschaftsinformatik/SchunterWW99" mdate="2012-02-27">
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<author pid="90/6995">Dale Whinnett</author>
<title>The SEMPER Framework for Secure Electronic Commerce.</title>
<pages>11</pages>
<year>1999</year>
<booktitle>Wirtschaftsinformatik</booktitle>
<ee>http://aisel.aisnet.org/wi1999/11</ee>
<crossref>conf/wirtschaftsinformatik/1999</crossref>
<url>db/conf/wirtschaftsinformatik/wi1999.html#SchunterWW99</url>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/PfitzmannSW00" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Cryptographic Security of Reactive Systems.</title>
<year>1999</year>
<crossref>conf/wsaif/1999</crossref>
<booktitle>Workshop on Secure Architectures and Information Flow</booktitle>
<ee type="oa">https://doi.org/10.1016/S1571-0661(04)00095-7</ee>
<ee>https://www.wikidata.org/entity/Q115012803</ee>
<url>db/journals/entcs/entcs32.html#PfitzmannSW00</url>
<pages>59-77</pages>
</inproceedings>
</r>
<r><article key="journals/cn/SchunterWW98" mdate="2020-02-19">
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<author pid="90/6995">Dale Whinnett</author>
<title>A Status Report on the SEMPER Framework for Secure Electronic Commerce.</title>
<pages>1501-1510</pages>
<year>1998</year>
<volume>30</volume>
<journal>Comput. Networks</journal>
<number>16-18</number>
<url>db/journals/cn/cn30.html#SchunterWW98</url>
<ee>https://doi.org/10.1016/S0169-7552(98)00186-X</ee>
</article>
</r>
<r><article key="journals/ibmsj/PeiroASW98" mdate="2024-05-07">
<author pid="56/4720">Jos&#233; L. Abad Peiro</author>
<author orcid="0000-0002-5093-9871" pid="39/2508">N. Asokan</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Designing a Generic Payment Service.</title>
<pages>72-88</pages>
<year>1998</year>
<volume>37</volume>
<journal>IBM Syst. J.</journal>
<number>1</number>
<url>db/journals/ibmsj/ibmsj37.html#PeiroASW98</url>
<ee>https://doi.org/10.1147/sj.371.0072</ee>
</article>
</r>
<r><article key="journals/jsac/JerichowMPPW98" mdate="2024-05-07">
<author pid="23/645">Anja Jerichow</author>
<author pid="48/2018">Jan M&#252;ller 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Real-time mixes: a bandwidth-efficient anonymity protocol.</title>
<pages>495-509</pages>
<year>1998</year>
<volume>16</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/49.668973</ee>
<url>db/journals/jsac/jsac16.html#JerichowMPPW98</url>
</article>
</r>
<r><article key="journals/sigops/PfitzmannW98" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>How to Break Fraud-Detectable Key Recovery.</title>
<pages>23-28</pages>
<year>1998</year>
<volume>32</volume>
<journal>ACM SIGOPS Oper. Syst. Rev.</journal>
<number>1</number>
<url>db/journals/sigops/sigops32.html#PfitzmannW98</url>
<ee>https://doi.org/10.1145/280559.280563</ee>
</article>
</r>
<r><inproceedings key="conf/eurocrypt/AsokanSW98" mdate="2024-05-07">
<author orcid="0000-0002-5093-9871" pid="39/2508">N. Asokan</author>
<author pid="s/VShoup">Victor Shoup</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Optimistic Fair Exchange of Digital Signatures (Extended Abstract).</title>
<pages>591-606</pages>
<ee>https://doi.org/10.1007/BFb0054156</ee>
<year>1998</year>
<crossref>conf/eurocrypt/98</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt98.html#AsokanSW98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/SteinerTW98" mdate="2023-03-24">
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="08/1183">Gene Tsudik</author>
<author pid="90/308">Michael Waidner</author>
<title>CLIQUES: A New Approach to Group Key Agreement.</title>
<pages>380-387</pages>
<year>1998</year>
<crossref>conf/icdcs/1998</crossref>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS.1998.679745</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCS.1998.679745</ee>
<url>db/conf/icdcs/icdcs98.html#SteinerTW98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/podc/PfitzmannSW98" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Optimal Efficiency of Optimistic Contract Signing.</title>
<pages>113-122</pages>
<year>1998</year>
<crossref>conf/podc/1998</crossref>
<booktitle>PODC</booktitle>
<ee>https://doi.org/10.1145/277697.277717</ee>
<url>db/conf/podc/podc98.html#PfitzmannSW98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/AsokanSW98" mdate="2023-09-21">
<author pid="39/2508">N. Asokan</author>
<author pid="s/VShoup">Victor Shoup</author>
<author pid="90/308">Michael Waidner</author>
<title>Asynchronous Protocols for Optimistic Fair Exchange.</title>
<pages>86-99</pages>
<year>1998</year>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.1998.674826</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.1998.674826</ee>
<crossref>conf/sp/1998</crossref>
<url>db/conf/sp/sp1998.html#AsokanSW98</url>
</inproceedings>
</r>
<r><article key="journals/computer/PfitzmannPSW97" mdate="2024-05-07">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Trusting Mobile User Devices and Security Modules.</title>
<pages>61-68</pages>
<year>1997</year>
<volume>30</volume>
<journal>Computer</journal>
<number>2</number>
<url>db/journals/computer/computer30.html#PfitzmannPSW97</url>
<ee>https://doi.org/10.1109/2.566159</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/2.566159</ee>
<ee>https://www.wikidata.org/entity/Q114991982</ee>
</article>
</r>
<r><article key="journals/computer/AsokanJSW97" mdate="2024-05-07">
<author orcid="0000-0002-5093-9871" pid="39/2508">N. Asokan</author>
<author pid="j/PhilippeAJanson">Philippe A. Janson</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>The State of the Art in Electronic Payment Systems.</title>
<pages>28-35</pages>
<year>1997</year>
<volume>30</volume>
<journal>Computer</journal>
<number>9</number>
<url>db/journals/computer/computer30.html#AsokanJSW97</url>
<ee>https://doi.org/10.1109/2.612244</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/2.612244</ee>
</article>
</r>
<r><article key="journals/jcs/AsokanTW97" mdate="2024-05-07">
<author orcid="0000-0002-5093-9871" pid="39/2508">N. Asokan</author>
<author pid="08/1183">Gene Tsudik</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Server-Supported Signatures.</title>
<pages>91-108</pages>
<year>1997</year>
<volume>5</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<url>db/journals/jcs/jcs5.html#AsokanTW97</url>
<ee>https://doi.org/10.3233/JCS-1997-5105</ee>
<ee>https://www.wikidata.org/entity/Q114944472</ee>
</article>
</r>
<r><article key="journals/tocs/PfitzmannW97" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Strong Loss Tolerance of Electronic Coin Systems.</title>
<pages>194-213</pages>
<year>1997</year>
<volume>15</volume>
<journal>ACM Trans. Comput. Syst.</journal>
<number>2</number>
<url>db/journals/tocs/tocs15.html#PfitzmannW97</url>
<ee>https://doi.org/10.1145/253145.253282</ee>
</article>
</r>
<r><inproceedings key="conf/ccs/AsokanSW97" mdate="2024-05-07">
<author pid="39/2508">N. Asokan</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Optimistic Protocols for Fair Exchange.</title>
<pages>7-17</pages>
<year>1997</year>
<crossref>conf/ccs/1997</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/266420.266426</ee>
<url>db/conf/ccs/ccs1997.html#AsokanSW97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/PfitzmannW97" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Asymmetric Fingerprinting for Larger Collusions.</title>
<pages>151-160</pages>
<year>1997</year>
<crossref>conf/ccs/1997</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/266420.266453</ee>
<url>db/conf/ccs/ccs1997.html#PfitzmannW97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannW97" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Anonymous Fingerprinting.</title>
<pages>88-102</pages>
<ee>https://doi.org/10.1007/3-540-69053-0_8</ee>
<year>1997</year>
<crossref>conf/eurocrypt/97</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt97.html#PfitzmannW97</url>
</inproceedings>
</r>
<r><incollection key="books/vi/97/PfitzmannW97" mdate="2020-05-15">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Kopierschutz durch asymmetrische Schl&#252;sselkennzeichnung mit Signeten.</title>
<pages>17-32</pages>
<year>1997</year>
<booktitle>Verl&#228;&#223;liche IT-Systeme</booktitle>
<ee>https://doi.org/10.1007/978-3-322-86842-8_2</ee>
<crossref>books/vi/97/MRRS1997</crossref>
<url>db/books/collections/MRRS1997.html#PfitzmannW97</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/AsokanSW97" mdate="2020-05-11">
<author pid="39/2508">N. Asokan</author>
<author pid="s/VShoup">Victor Shoup</author>
<author pid="90/308">Michael Waidner</author>
<title>Optimistic fair Exchange of Digital Signatures.</title>
<pages>15</pages>
<year>1997</year>
<volume>1997</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/1997/015</ee>
<url>db/journals/iacr/iacr1997.html#AsokanSW97</url>
</article>
</r>
<r><inproceedings key="conf/ccs/SteinerTW96" mdate="2024-05-07">
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="08/1183">Gene Tsudik</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Diffie-Hellman Key Distribution Extended to Group Communication.</title>
<pages>31-37</pages>
<year>1996</year>
<crossref>conf/ccs/1996</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/238168.238182</ee>
<ee>https://www.wikidata.org/entity/Q29541612</ee>
<url>db/conf/ccs/ccs1996.html#SteinerTW96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/Waidner96" mdate="2024-05-07">
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Development of a Secure Electronic Marketplace for Europe.</title>
<pages>1-14</pages>
<year>1996</year>
<crossref>conf/esorics/1996</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-61770-1_24</ee>
<url>db/conf/esorics/esorics1996.html#Waidner96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/AsokanTW96" mdate="2017-05-22">
<author pid="39/2508">N. Asokan</author>
<author pid="08/1183">Gene Tsudik</author>
<author pid="90/308">Michael Waidner</author>
<title>Server-Supported Signatures.</title>
<pages>131-143</pages>
<year>1996</year>
<crossref>conf/esorics/1996</crossref>
<booktitle>ESORICS</booktitle>
<url>db/conf/esorics/esorics1996.html#AsokanTW96</url>
<ee>https://doi.org/10.1007/3-540-61770-1_32</ee>
</inproceedings>
</r>
<r><article key="journals/sigops/SteinerTW95" mdate="2023-08-28">
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="08/1183">Gene Tsudik</author>
<author pid="90/308">Michael Waidner</author>
<title>Refinement and Extension of Encrypted Key Exchange.</title>
<pages>22-30</pages>
<year>1995</year>
<volume>29</volume>
<journal>ACM SIGOPS Oper. Syst. Rev.</journal>
<number>3</number>
<url>db/journals/sigops/sigops29.html#SteinerTW95</url>
<ee>https://doi.org/10.1145/206826.206834</ee>
<ee>https://www.wikidata.org/entity/Q121434031</ee>
</article>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannSW95" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>How to Break Another Provably Secure Payment System.</title>
<pages>121-132</pages>
<ee>https://doi.org/10.1007/3-540-49264-X_10</ee>
<year>1995</year>
<crossref>conf/eurocrypt/95</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt95.html#PfitzmannSW95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uwec/BellareHSTWHG95" mdate="2026-02-02">
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="62/3150">Amir Herzberg</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="08/1183">Gene Tsudik</author>
<author pid="90/308">Michael Waidner</author>
<author pid="17/2186">Ralf C. Hauser</author>
<author pid="10/4788">Juan A. Garay 0001</author>
<title>iKP - A Family of Secure Electronic Payment Protocols.</title>
<year>1995</year>
<booktitle>USENIX Workshop on Electronic Commerce</booktitle>
<ee>https://www.usenix.org/conference/first-usenix-workshop-electronic-commerce/ikp-family-secure-electronic-payment-protocols</ee>
<crossref>conf/uwec/1995</crossref>
<url>db/conf/uwec/uwec1995.html#BellareHSTWHG95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannPSW95" mdate="2016-11-15">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<title>Vertrauensw&#252;rdiger Entwurf portabler Benutzerendger&#228;te und Sicherheitsmodule.</title>
<pages>329-</pages>
<year>1995</year>
<crossref>conf/vis/1995</crossref>
<booktitle>VIS</booktitle>
<url>db/conf/vis/vis95.html#PfitzmannPSW95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BolyBCMMMPPRSSVW94" mdate="2019-10-19">
<author pid="45/802">Jean-Paul Boly</author>
<author pid="b/ABosselaers">Antoon Bosselaers</author>
<author pid="c/RonaldCramer">Ronald Cramer</author>
<author pid="55/6369">Rolf Michelsen</author>
<author orcid="0000-0002-9940-6080" pid="67/4994">Stig Fr. Mj&#248;lsnes</author>
<author pid="77/7022">Frank Muller</author>
<author pid="02/2984">Torben P. Pedersen</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="93/5889">Peter de Rooij</author>
<author pid="10/4165">Berry Schoenmakers</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="80/2461">Luc Vall&#233;e</author>
<author pid="90/308">Michael Waidner</author>
<title>The ESPRIT Project CAFE - High Security Digital Payment Systems.</title>
<pages>217-230</pages>
<year>1994</year>
<crossref>conf/esorics/1994</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-58618-0_66</ee>
<url>db/conf/esorics/esorics1994.html#BolyBCMMMPPRSSVW94</url>
</inproceedings>
</r>
<r><phdthesis key="phd/dnb/Waidner92" mdate="2021-07-17">
<author pid="90/308">Michael Waidner</author>
<title>Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.</title>
<year>1992</year>
<pages>1-153</pages>
<school>Karlsruhe Institute of Technology, Germany</school>
<ee>https://d-nb.info/930097238</ee>
</phdthesis>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannW92" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Attacks on Protocols for Server-Aided RSA Computation.</title>
<pages>153-162</pages>
<ee>https://doi.org/10.1007/3-540-47555-9_13</ee>
<year>1992</year>
<crossref>conf/eurocrypt/92</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt92.html#PfitzmannW92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/stacs/PfitzmannW92" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Unconditional Byzantine Agreement for any Number of Faulty Processors.</title>
<pages>339-350</pages>
<year>1992</year>
<crossref>conf/stacs/1992</crossref>
<booktitle>STACS</booktitle>
<url>db/conf/stacs/stacs92.html#PfitzmannW92</url>
<ee>https://doi.org/10.1007/3-540-55210-3_195</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/PfitzmannW91" mdate="2017-05-20">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>How To Break and Repair A &#34;Provably Secure&#34; Untraceable Payment System.</title>
<pages>338-350</pages>
<ee>https://doi.org/10.1007/3-540-46766-1_28</ee>
<year>1991</year>
<crossref>conf/crypto/1991</crossref>
<booktitle>CRYPTO</booktitle>
<url>db/conf/crypto/crypto91.html#PfitzmannW91</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kivs/PfitzmannPW91" mdate="2017-05-23">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead.</title>
<pages>451-463</pages>
<year>1991</year>
<crossref>conf/kivs/1991</crossref>
<booktitle>Kommunikation in Verteilten Systemen</booktitle>
<url>db/conf/kivs/kivs91.html#PfitzmannPW91</url>
<ee>https://doi.org/10.1007/978-3-642-76462-2_32</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/stacs/Baum-WaidnerPW91" mdate="2024-05-07">
<author pid="03/4815">Birgit Baum-Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Unconditional Byzantine Agreement with Good Majority.</title>
<pages>285-295</pages>
<year>1991</year>
<crossref>conf/stacs/1991</crossref>
<booktitle>STACS</booktitle>
<url>db/conf/stacs/stacs91.html#Baum-WaidnerPW91</url>
<ee>https://doi.org/10.1007/BFb0020806</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannW91" mdate="2017-05-21">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Fail-stop-Signaturen und ihre Anwendung.</title>
<pages>289-301</pages>
<year>1991</year>
<crossref>conf/vis/1991</crossref>
<booktitle>VIS</booktitle>
<url>db/conf/vis/vis91.html#PfitzmannW91</url>
<ee>https://doi.org/10.1007/978-3-642-76562-9_18</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannW91a" mdate="2017-05-21">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit.</title>
<pages>302-320</pages>
<year>1991</year>
<crossref>conf/vis/1991</crossref>
<booktitle>VIS</booktitle>
<url>db/conf/vis/vis91.html#PfitzmannW91a</url>
<ee>https://doi.org/10.1007/978-3-642-76562-9_19</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/BleumerPW90" mdate="2024-05-07">
<author pid="81/3632">Gerrit Bleumer</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>A Remark on a Signature Scheme Where Forgery Can Be Proved.</title>
<pages>441-445</pages>
<ee>https://doi.org/10.1007/3-540-46877-3_39</ee>
<year>1990</year>
<crossref>conf/eurocrypt/90</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt90.html#BleumerPW90</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ftcs/WaidnerP90" mdate="2017-05-23">
<author pid="90/308">Michael Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Loss-tolerance for electronic wallets.</title>
<pages>140-147</pages>
<year>1990</year>
<booktitle>FTCS</booktitle>
<ee>https://doi.org/10.1109/FTCS.1990.89349</ee>
<crossref>conf/ftcs/1990</crossref>
<url>db/conf/ftcs/ftcs1990.html#WaidnerP90</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/Waidner89" mdate="2017-05-19">
<author pid="90/308">Michael Waidner</author>
<title>Unconditional Sender and Recipient Untraceability in Spite of Active Attacks.</title>
<pages>302-319</pages>
<ee>https://doi.org/10.1007/3-540-46885-4_32</ee>
<year>1989</year>
<crossref>conf/eurocrypt/89</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt89.html#Waidner89</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/WaidnerP89" mdate="2024-05-07">
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).</title>
<pages>690</pages>
<ee>https://doi.org/10.1007/3-540-46885-4_69</ee>
<year>1989</year>
<crossref>conf/eurocrypt/89</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt89.html#WaidnerP89</url>
</inproceedings>
</r>
<r><article key="journals/insk/PfitzmannPW88" mdate="2020-08-13">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Datenschutz garantierende offene Kommunikationsnetze.</title>
<pages>118-142</pages>
<year>1988</year>
<volume>11</volume>
<journal>Inform. Spektrum</journal>
<number>3</number>
<url>db/journals/insk/insk11.html#PfitzmannPW88</url>
</article>
</r>
<r><article key="journals/pik/PfitzmannPW88" mdate="2021-04-29">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.</title>
<pages>5-8</pages>
<year>1988</year>
<volume>11</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>1</number>
<ee>https://doi.org/10.1515/piko.1988.11.1.5</ee>
<url>db/journals/pik/pik11.html#PfitzmannPW88</url>
</article>
</r>
<r><article key="journals/compsec/PfitzmannW87" mdate="2024-05-07">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Networks without user observability.</title>
<pages>158-166</pages>
<year>1987</year>
<volume>6</volume>
<journal>Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/0167-4048(87)90087-3</ee>
<ee>https://www.wikidata.org/entity/Q115125689</ee>
<url>db/journals/compsec/compsec6.html#PfitzmannW87</url>
</article>
</r>
<r><inproceedings key="conf/icftcs/WaidnerP87" mdate="2017-05-17">
<author pid="90/308">Michael Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Verlusttolerante elektronische Brieftaschen.</title>
<pages>36-50</pages>
<year>1987</year>
<crossref>conf/icftcs/1987</crossref>
<booktitle>Fehlertolerierende Rechensysteme</booktitle>
<url>db/conf/icftcs/icftcs1987.html#WaidnerP87</url>
<ee>https://doi.org/10.1007/978-3-642-45628-2_4</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/datenschutz/WaidnerP85" mdate="2017-05-25">
<author pid="90/308">Michael Waidner</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>Betrugssicherheit trotz Anonymit&#228;t, Abrechnung und Geldtransfer in Netzen.</title>
<pages>128-141</pages>
<year>1985</year>
<crossref>conf/datenschutz/1985</crossref>
<booktitle>Datenschutz und Datensicherung</booktitle>
<url>db/conf/datenschutz/datenschutz1985.html#WaidnerP85</url>
<ee>https://doi.org/10.1007/978-3-642-70865-7_10</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannW85" mdate="2024-05-07">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Networks Without User Observability: Design Options.</title>
<pages>245-253</pages>
<ee>https://doi.org/10.1007/3-540-39805-8_29</ee>
<year>1985</year>
<crossref>conf/eurocrypt/85</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt85.html#PfitzmannW85</url>
</inproceedings>
</r>
<coauthors n="118" nc="2">
<co c="0"><na f="a/Asokan:N=" pid="39/2508">N. Asokan</na></co>
<co c="0"><na f="a/Atluri:Vijayalakshmi" pid="a/VAtluri">Vijayalakshmi Atluri</na></co>
<co c="0"><na f="b/Backes_0001:Michael" pid="b/MichaelBackes1">Michael Backes 0001</na></co>
<co c="0"><na f="b/Basin:David_A=" pid="b/DavidABasin">David A. Basin</na></co>
<co c="0"><na f="b/Baum=Waidner:Birgit" pid="03/4815">Birgit Baum-Waidner</na></co>
<co c="0"><na f="b/Baumann:Lukas" pid="297/4749">Lukas Baumann</na></co>
<co c="0"><na f="b/Bellare:Mihir" pid="b/MBellare">Mihir Bellare</na></co>
<co c="0"><na f="b/Benenson:Zinaida" pid="b/ZBenenson">Zinaida Benenson</na></co>
<co c="0"><na f="b/Berlich:Peter" pid="128/2336">Peter Berlich</na></co>
<co c="0"><na f="b/Bertino:Elisa" pid="b/ElisaBertino">Elisa Bertino</na></co>
<co c="0"><na f="b/Bleumer:Gerrit" pid="81/3632">Gerrit Bleumer</na></co>
<co c="0"><na f="b/Boly:Jean=Paul" pid="45/802">Jean-Paul Boly</na></co>
<co c="0"><na f="b/Borgwart:Andreas" pid="176/5819">Andreas Borgwart</na></co>
<co c="0"><na f="b/Bosselaers:Antoon" pid="b/ABosselaers">Antoon Bosselaers</na></co>
<co c="0"><na f="b/Boukoros:Spyros" pid="176/5717">Spyros Boukoros</na></co>
<co c="0"><na f="b/Brandt:Markus" pid="207/6893">Markus Brandt</na></co>
<co c="0"><na f="b/Buchmann_0001:Johannes" pid="b/JohannesBuchmann">Johannes Buchmann 0001</na></co>
<co c="0"><na f="b/Buhler:Peter" pid="98/6777">Peter Buhler</na></co>
<co c="0"><na f="c/Camenisch:Jan" pid="c/JanCamenisch">Jan Camenisch</na></co>
<co c="0"><na f="c/Canetti:Ran" pid="c/RanCanetti">Ran Canetti</na></co>
<co c="0"><na f="c/Cattepoel:Louis" pid="392/3164">Louis Cattepoel</na></co>
<co c="0"><na f="c/Clau=szlig=_0001:Sebastian" pid="61/1101-1">Sebastian Clau&#223; 0001</na></co>
<co c="0"><na f="c/Cramer:Ronald" pid="c/RonaldCramer">Ronald Cramer</na></co>
<co c="0"><na f="c/Cuppens:Fr=eacute=d=eacute=ric" pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</na></co>
<co c="0"><na f="d/Dai:Tianxiang" pid="188/4885">Tianxiang Dai</na></co>
<co c="0"><na f="d/Debar:Herv=eacute=" pid="86/4961">Herv&#233; Debar</na></co>
<co c="0"><na f="d/Deswarte:Yves" pid="62/1952">Yves Deswarte</na></co>
<co c="0"><na f="e/Eirich:Thomas" pid="49/2071">Thomas Eirich</na></co>
<co c="0"><na f="f/Federrath:Hannes" pid="f/HannesFederrath">Hannes Federrath</na></co>
<co c="0"><na f="f/Feldmann:Anja" pid="f/AnjaFeldmann">Anja Feldmann</na></co>
<co c="-1"><na f="f/Field:Simon" pid="38/2424">Simon Field</na></co>
<co c="0"><na f="f/Fischer=H=uuml=bner:Simone" pid="f/SimoneFischerHubner">Simone Fischer-H&#252;bner</na></co>
<co c="0"><na f="f/Freiling:Felix_C=" pid="f/FCFreiling">Felix C. Freiling</na></co>
<co c="0" n="2"><na f="f/Frie=szlig=:Jens" pid="362/4156">Jens Frie&#223;</na><na>Jens Friess</na></co>
<co c="0"><na f="g/Garay_0001:Juan_A=" pid="10/4788">Juan A. Garay 0001</na></co>
<co c="0"><na f="g/Gattermayer:Tobias" pid="04/11538">Tobias Gattermayer</na></co>
<co c="0"><na f="g/Gelernter:Nethanel" pid="134/7573">Nethanel Gelernter</na></co>
<co c="1"><na f="g/Ghiglieri:Marco" pid="66/8121">Marco Ghiglieri</na></co>
<co c="0"><na f="g/Gohring:Matthias" pid="223/6873">Matthias Gohring</na></co>
<co c="0"><na f="g/Gollmann:Dieter" pid="39/5760">Dieter Gollmann</na></co>
<co c="0"><na f="g/Gruza:Olivia" pid="372/5538">Olivia Gruza</na></co>
<co c="0"><na f="g/Guttman:Joshua_D=" pid="91/7024">Joshua D. Guttman</na></co>
<co c="0"><na f="h/Hansen:Marit" pid="85/1807">Marit Hansen</na></co>
<co c="0"><na f="h/Hauser:Ralf_C=" pid="17/2186">Ralf C. Hauser</na></co>
<co c="0"><na f="h/Heftrig:Elias" pid="279/5630">Elias Heftrig</na></co>
<co c="0"><na f="h/Herreweghen:Els_Van" pid="92/6243">Els Van Herreweghen</na></co>
<co c="0"><na f="h/Herzberg:Amir" pid="62/3150">Amir Herzberg</na></co>
<co c="0"><na f="h/Heyder:Philipp" pid="187/0847">Philipp Heyder</na></co>
<co c="0"><na f="h/Hlavacek:Tomas" pid="223/6748">Tomas Hlavacek</na></co>
<co c="0"><na f="h/Hoofnagle:Chris_Jay" pid="63/8069">Chris Jay Hoofnagle</na></co>
<co c="0"><na f="j/Jacobsen:Oliver" pid="372/6077">Oliver Jacobsen</na></co>
<co c="0"><na f="j/Janson:Philippe_A=" pid="j/PhilippeAJanson">Philippe A. Janson</na></co>
<co c="0"><na f="j/Jeitner:Philipp" pid="271/6045">Philipp Jeitner</na></co>
<co c="0"><na f="j/Jerichow:Anja" pid="23/645">Anja Jerichow</na></co>
<co c="0"><na f="k/Kaiser:Fabian" pid="30/431">Fabian Kaiser</na></co>
<co c="0"><na f="k/Kapitza:R=uuml=diger" pid="27/2697">R&#252;diger Kapitza</na></co>
<co c="0"><na f="k/Karjoth:G=uuml=nter" pid="k/GunterKarjoth">G&#252;nter Karjoth</na></co>
<co c="0"><na f="k/Kasper:Michael" pid="06/9">Michael Kasper</na></co>
<co c="0"><na f="k/Klein_0001:Amit" pid="98/3396">Amit Klein 0001</na></co>
<co c="0"><na f="k/Krau=szlig=:Christoph" pid="34/4605">Christoph Krau&#223;</na></co>
<co c="0"><na f="k/Kravtsov:Vladimir" pid="48/8052">Vladimir Kravtsov</na></co>
<co c="0"><na f="k/Krawczyk:Hugo" pid="46/6715">Hugo Krawczyk</na></co>
<co c="0"><na f="k/Kreutzer_0001:Michael" pid="33/6146-1">Michael Kreutzer 0001</na></co>
<co c="0"><na f="k/Krontiris:Ioannis" pid="32/1264">Ioannis Krontiris</na></co>
<co c="0"><na f="l/Lacoste:G=eacute=rard" pid="59/205">G&#233;rard Lacoste</na></co>
<co c="0"><na f="m/Marh=ouml=fer:Michael" pid="33/3748">Michael Marh&#246;fer</na></co>
<co c="0"><na f="m/Michelsen:Rolf" pid="55/6369">Rolf Michelsen</na></co>
<co c="0"><na f="m/Mirdita:Donika" pid="248/0549">Donika Mirdita</na></co>
<co c="0"><na f="m/Mj=oslash=lsnes:Stig_Fr=" pid="67/4994">Stig Fr. Mj&#248;lsnes</na></co>
<co c="0"><na f="m/Muller:Frank" pid="77/7022">Frank Muller</na></co>
<co c="0"><na f="m/M=uuml=ller_0001:Jan" pid="48/2018">Jan M&#252;ller 0001</na></co>
<co c="0"><na f="p/Paxson:Vern" pid="p/VernPaxson">Vern Paxson</na></co>
<co c="0"><na f="p/Pedersen:Torben_P=" pid="02/2984">Torben P. Pedersen</na></co>
<co c="0"><na f="p/Peiro:Jos=eacute=_L=_Abad" pid="56/4720">Jos&#233; L. Abad Peiro</na></co>
<co c="0"><na f="p/Perlmuter:Alon" pid="207/6577">Alon Perlmuter</na></co>
<co c="0"><na f="p/Pfitzmann:Andreas" pid="p/AndreasPfitzmann">Andreas Pfitzmann</na></co>
<co c="0"><na f="p/Pfitzmann:Birgit" pid="p/BPfitzmann">Birgit Pfitzmann</na></co>
<co c="0"><na f="r/Rannenberg:Kai" pid="r/KRannenberg">Kai Rannenberg</na></co>
<co c="0"><na f="r/Riordan:James" pid="16/3647">James Riordan</na></co>
<co c="0"><na f="r/Rohner:Christian" pid="18/1549">Christian Rohner</na></co>
<co c="0"><na f="r/Rooij:Peter_de" pid="93/5889">Peter de Rooij</na></co>
<co c="0"><na f="r/Rooyen:Carel_van" pid="176/5791">Carel van Rooyen</na></co>
<co c="0"><na f="r/Rotenberg:Nadav" pid="204/9509">Nadav Rotenberg</na></co>
<co c="0"><na f="s/Sadeghi:Ahmad=Reza" pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</na></co>
<co c="0"><na f="s/Scedrov:Andre" pid="39/3354">Andre Scedrov</na></co>
<co c="0"><na f="s/Schmid_0001:Stefan" pid="58/3289-1">Stefan Schmid 0001</na></co>
<co c="0"><na f="s/Schneider_0002:Markus" pid="s/MarkusSchneider2">Markus Schneider 0002</na></co>
<co c="0"><na f="s/Schoenmakers:Berry" pid="10/4165">Berry Schoenmakers</na></co>
<co c="0"><na f="s/Schulmann:Haya" pid="94/7397">Haya Schulmann</na></co>
<co c="0"><na f="s/Schunter:Matthias" pid="86/1764">Matthias Schunter</na></co>
<co c="0"><na f="s/Seifert:Jean=Pierre" pid="98/117">Jean-Pierre Seifert</na></co>
<co c="0"><na f="s/Senf:Daniel" pid="185/2444">Daniel Senf</na></co>
<co c="0"><na f="s/Shapiro_0001:Marc" pid="s/MarcShapiro">Marc Shapiro 0001</na></co>
<co c="0"><na f="s/Shoup:Victor" pid="s/VShoup">Victor Shoup</na></co>
<co c="0"><na f="s/Shrishak:Kris" pid="192/5940">Kris Shrishak</na></co>
<co c="0"><na f="s/Sidis:Adi" pid="271/6497">Adi Sidis</na></co>
<co c="0"><na f="s/Sidis:Ravid" pid="271/6111">Ravid Sidis</na></co>
<co c="0"><na f="s/Sieberg:Jens" pid="187/0838">Jens Sieberg</na></co>
<co c="0"><na f="s/Sobol:Gil" pid="204/8314">Gil Sobol</na></co>
<co c="0"><na f="s/Sprenger_0001:Christoph" pid="s/ChristophSprenger">Christoph Sprenger 0001</na></co>
<co c="0"><na f="s/Steiner_0001:Michael" pid="64/5301-1">Michael Steiner 0001</na></co>
<co c="1"><na f="s/Stopczynski:Martin" pid="26/11205">Martin Stopczynski</na></co>
<co c="0"><na f="s/St=uuml=ble:Christian" pid="76/3305">Christian St&#252;ble</na></co>
<co c="0"><na f="s/Suri:Neeraj" pid="s/NeerajSuri">Neeraj Suri</na></co>
<co c="0"><na f="t/Tchokodeu:Kevin_Nsieyanji" pid="392/3195">Kevin Nsieyanji Tchokodeu</na></co>
<co c="0"><na f="t/Teichmann:Lucas" pid="327/7606">Lucas Teichmann</na></co>
<co c="0"><na f="t/Thimmaraju:Kashyap" pid="186/8118">Kashyap Thimmaraju</na></co>
<co c="0"><na f="t/Tsudik:Gene" pid="08/1183">Gene Tsudik</na></co>
<co c="0"><na f="v/Vall=eacute=e:Luc" pid="80/2461">Luc Vall&#233;e</na></co>
<co c="0"><na f="v/Ver=iacute=ssimo:Paulo" pid="v/PauloVerissimo">Paulo Ver&#237;ssimo</na></co>
<co c="0"><na f="v/Vogel:Niklas" pid="332/3113">Niklas Vogel</na></co>
<co c="0"><na f="w/Wachsmann:Christian" pid="70/6890">Christian Wachsmann</na></co>
<co c="0"><na f="w/Wagner_0001:David_A=" pid="42/5626">David A. Wagner 0001</na></co>
<co c="0"><na f="w/Weber:Arnd" pid="15/1879">Arnd Weber</na></co>
<co c="0"><na f="w/Whinnett:Dale" pid="90/6995">Dale Whinnett</na></co>
<co c="0"><na f="w/Wisiol:Nils" pid="156/5531">Nils Wisiol</na></co>
<co c="0"><na f="w/Wolf:Leonie" pid="389/0326">Leonie Wolf</na></co>
<co c="0"><na f="z/Zeltser:Benjamin" pid="204/9345">Benjamin Zeltser</na></co>
</coauthors>
</dblpperson>

