<?xml version="1.0"?>
<dblpperson name="Birgit Pfitzmann" pid="p/BPfitzmann" n="131">
<person key="homepages/p/BPfitzmann" mdate="2025-05-13">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<note type="affiliation">IBM Research Zurich, Switzerland</note>
<note label="former" type="affiliation">Saarland University, Department of Computer Science, Saarbr&#252;cken, Germany</note>
<note label="PhD 1995" type="affiliation">University of Hildesheim, Germany</note>
<url>https://researcher.watson.ibm.com/researcher/view.php?person=zurich-BPF</url>
<url>https://dl.acm.org/profile/81100247836</url>
<url>https://mathgenealogy.org/id.php?id=107567</url>
</person>
<r><inproceedings key="conf/emnlp/BhattacharjeeTM24" mdate="2025-11-02">
<author pid="19/2910">Bishwaranjan Bhattacharjee</author>
<author pid="276/7796">Aashka Trivedi</author>
<author pid="174/7321">Masayasu Muraoka</author>
<author pid="253/6077">Muthukumaran Ramasubramanian</author>
<author pid="244/9945">Takuma Udagawa</author>
<author pid="229/5263">Iksha Gurung</author>
<author pid="357/6442">Nishan Pantha</author>
<author pid="13/5366">Rong Zhang</author>
<author pid="140/3483">Bharath Dandala</author>
<author pid="91/5457">Rahul Ramachandran</author>
<author pid="08/3449">Manil Maskey</author>
<author pid="171/0035">Kaylin M. Bugbee</author>
<author pid="390/3632">Michael Little</author>
<author pid="377/7097">Elizabeth Fancher</author>
<author pid="92/5863">Irina Gerasimov</author>
<author pid="192/1494">Armin Mehrabian</author>
<author pid="269/0365">Lauren M. Sanders</author>
<author pid="40/11035">Sylvain Costes</author>
<author pid="195/6255">Sergi Blanco-Cuaresma</author>
<author pid="234/8946">Kelly E. Lockhart</author>
<author pid="97/1020">Thomas Allen</author>
<author pid="118/8262">F&#233;lix Gr&#232;zes</author>
<author pid="279/4427">Megan Ansdell</author>
<author pid="66/31">Alberto Accomazzi</author>
<author pid="65/235">Yousef El-Kurdi</author>
<author pid="239/5621">Davis Wertheimer</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="21/5775">Cesar Berrospi Ramis</author>
<author pid="140/7566">Michele Dolfi</author>
<author pid="285/6689">Rafael Teixeira de Lima</author>
<author pid="43/11411">Panagiotis Vagenas</author>
<author pid="241/5086">S. Karthik Mukkavilli</author>
<author pid="136/7966">Peter W. J. Staar</author>
<author pid="377/6350">Sanaz Vahidinia</author>
<author pid="336/3676">Ryan McGranaghan</author>
<author pid="139/2378">Tsengdar J. Lee</author>
<title>INDUS: Effective and Efficient Language Models for Scientific Applications.</title>
<pages>98-112</pages>
<year>2024</year>
<booktitle>EMNLP (Industry Track)</booktitle>
<ee type="oa">https://doi.org/10.18653/v1/2024.emnlp-industry.9</ee>
<ee type="oa">https://aclanthology.org/2024.emnlp-industry.9</ee>
<ee>https://www.wikidata.org/entity/Q136652995</ee>
<crossref>conf/emnlp/2024i</crossref>
<url>db/conf/emnlp/emnlp2024i.html#BhattacharjeeTM24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-10725" mdate="2025-03-03">
<author pid="19/2910">Bishwaranjan Bhattacharjee</author>
<author pid="276/7796">Aashka Trivedi</author>
<author pid="174/7321">Masayasu Muraoka</author>
<author pid="253/6077">Muthukumaran Ramasubramanian</author>
<author pid="244/9945">Takuma Udagawa</author>
<author pid="229/5263">Iksha Gurung</author>
<author pid="13/5366">Rong Zhang</author>
<author pid="140/3483">Bharath Dandala</author>
<author pid="91/5457">Rahul Ramachandran</author>
<author pid="08/3449">Manil Maskey</author>
<author pid="171/0035">Kaylin M. Bugbee</author>
<author pid="208/8708">Mike Little</author>
<author pid="377/7097">Elizabeth Fancher</author>
<author pid="269/0365">Lauren M. Sanders</author>
<author pid="40/11035">Sylvain V. Costes</author>
<author orcid="0000-0002-1584-0171" pid="195/6255">Sergi Blanco-Cuaresma</author>
<author orcid="0000-0002-8130-1440" pid="234/8946">Kelly E. Lockhart</author>
<author pid="97/1020">Thomas Allen</author>
<author pid="118/8262">F&#233;lix Gr&#232;zes</author>
<author pid="279/4427">Megan Ansdell</author>
<author pid="66/31">Alberto Accomazzi</author>
<author pid="65/235">Yousef El-Kurdi</author>
<author pid="239/5621">Davis Wertheimer</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="21/5775">Cesar Berrospi Ramis</author>
<author pid="140/7566">Michele Dolfi</author>
<author pid="285/6689">Rafael Teixeira de Lima</author>
<author pid="43/11411">Panagiotis Vagenas</author>
<author pid="241/5086">S. Karthik Mukkavilli</author>
<author pid="136/7966">Peter W. J. Staar</author>
<author pid="377/6350">Sanaz Vahidinia</author>
<author orcid="0000-0002-9605-0007" pid="336/3676">Ryan McGranaghan</author>
<author pid="192/1494">Armin Mehrabian</author>
<author pid="139/2378">Tsengdar J. Lee</author>
<title>INDUS: Effective and Efficient Language Models for Scientific Applications.</title>
<year>2024</year>
<volume>abs/2405.10725</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.10725</ee>
<url>db/journals/corr/corr2405.html#abs-2405-10725</url>
</article>
</r>
<r><inproceedings key="conf/kdd/PfitzmannADNS22" mdate="2022-08-15">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="62/1211">Christoph Auer</author>
<author pid="140/7566">Michele Dolfi</author>
<author pid="321/9993">Ahmed S. Nassar</author>
<author pid="136/7966">Peter W. J. Staar</author>
<title>DocLayNet: A Large Human-Annotated Dataset for Document-Layout Segmentation.</title>
<pages>3743-3751</pages>
<year>2022</year>
<booktitle>KDD</booktitle>
<ee>https://doi.org/10.1145/3534678.3539043</ee>
<crossref>conf/kdd/2022</crossref>
<url>db/conf/kdd/kdd2022.html#PfitzmannADNS22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2206-01062" mdate="2022-06-13">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="62/1211">Christoph Auer</author>
<author pid="140/7566">Michele Dolfi</author>
<author pid="321/9993">Ahmed S. Nassar</author>
<author pid="136/7966">Peter W. J. Staar</author>
<title>DocLayNet: A Large Human-Annotated Dataset for Document-Layout Analysis.</title>
<year>2022</year>
<volume>abs/2206.01062</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2206.01062</ee>
<url>db/journals/corr/corr2206.html#abs-2206-01062</url>
</article>
</r>
<r><article key="journals/ibmrd/KloecknerAAABDD18" mdate="2025-11-15">
<author pid="36/5150">Kristof Kloeckner</author>
<author pid="29/3366">Constantin Adam</author>
<author pid="a/NikosAnerousis">Nikos Anerousis</author>
<author pid="39/6032">Naga Ayachitula</author>
<author pid="31/7655">Muhammed Fatih Bulut</author>
<author pid="40/6666">Gargi Dasgupta</author>
<author pid="96/5406-4">Yu Deng 0004</author>
<author pid="48/6719">Yixin Diao</author>
<author pid="138/8039">Nicholas C. Fuller</author>
<author pid="72/5871">Sandeep Gopisetty</author>
<author pid="51/11528">Milton Hernandez</author>
<author pid="68/425">Jinho Hwang</author>
<author pid="220/2816">Pietro Iannucci</author>
<author pid="118/4007">Anup K. Kalia</author>
<author pid="84/41">Giovanni Lanfranchi</author>
<author pid="140/8257">David Lanyi</author>
<author pid="l/HeikoLudwig">Heiko Ludwig</author>
<author pid="220/2654">A. Mahamuni</author>
<author pid="95/6783">Ruchi Mahindru</author>
<author pid="28/1444">Fan Jing Meng</author>
<author pid="36/4677">Hamid R. Motahari Nezhad</author>
<author pid="k/KarinKailing">Karin Murthy</author>
<author pid="84/6715">Taiga Nakamura</author>
<author pid="23/502">Amit M. Paradkar</author>
<author pid="205/8814">Dennis A. Perpetua</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="40/578">Daniela Rosu 0001</author>
<author pid="32/6257">Larisa Shwartz</author>
<author pid="87/1363">Zhong Su</author>
<author pid="49/889">Maheswaran Surendra</author>
<author pid="64/4055">Shu Tao</author>
<author orcid="0000-0003-3547-3847" pid="10/3990">Hagen V&#246;lzer</author>
<author pid="78/3069">Maja Vukovic</author>
<author pid="72/3640">Dorothea Wiesmann</author>
<author pid="124/6478">S. Wozniak</author>
<author pid="68/8331">Gary Wright</author>
<author pid="62/4290-5">Jin Xiao 0005</author>
<author pid="25/4091">Sai Zeng</author>
<title>Building a cognitive platform for the managed IT services lifecycle.</title>
<pages>8:1-8:11</pages>
<year>2018</year>
<volume>62</volume>
<journal>IBM J. Res. Dev.</journal>
<number>1</number>
<ee>https://doi.org/10.1147/JRD.2017.2770642</ee>
<url>db/journals/ibmrd/ibmrd62.html#KloecknerAAABDD18</url>
</article>
</r>
<r><inproceedings key="conf/IEEEscc/PfitzmannJ11" mdate="2023-03-24">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="71/6060">Nikolai Joukov</author>
<title>Migration to Multi-image Cloud Templates.</title>
<pages>80-87</pages>
<year>2011</year>
<booktitle>IEEE SCC</booktitle>
<ee>https://doi.org/10.1109/SCC.2011.89</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SCC.2011.89</ee>
<crossref>conf/IEEEscc/2011</crossref>
<url>db/conf/IEEEscc/scc2011.html#PfitzmannJ11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/CanettiCHPRSV11" mdate="2020-05-23">
<author pid="c/RanCanetti">Ran Canetti</author>
<author pid="11/17">Suresh Chari</author>
<author pid="65/4781">Shai Halevi</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="88/4138-1">Arnab Roy 0001</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="170/8132">Wietse Z. Venema</author>
<title>Composable Security Analysis of OS Services.</title>
<pages>431-448</pages>
<year>2011</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-21554-4_25</ee>
<crossref>conf/acns/2011</crossref>
<url>db/conf/acns/acns2011.html#CanettiCHPRSV11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/ZonouzSRKPMISC11" mdate="2023-03-24">
<author pid="89/4316">Saman A. Zonouz</author>
<author pid="70/5324">Aashish Sharma</author>
<author pid="98/5762">HariGovind V. Ramasamy</author>
<author pid="18/5985">Zbigniew T. Kalbarczyk</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="98/6006">Kevin P. McAuliffe</author>
<author pid="i/RavishankarKIyer">Ravishankar K. Iyer</author>
<author pid="s/WilliamHSanders">William H. Sanders</author>
<author pid="83/9356">Eric Cope</author>
<title>Managing business health in the presence of malicious attacks.</title>
<pages>9-14</pages>
<year>2011</year>
<booktitle>DSN Workshops</booktitle>
<ee>https://doi.org/10.1109/DSNW.2011.5958856</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSNW.2011.5958856</ee>
<crossref>conf/dsn/2011w</crossref>
<url>db/conf/dsn/dsnw2011.html#ZonouzSRKPMISC11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/im/JoukovTOPCPT11" mdate="2017-05-17">
<author pid="71/6060">Nikolai Joukov</author>
<author pid="73/5769">Vasily Tarasov</author>
<author pid="95/4745">Joel Ossher</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="95/9979">Sergej Chicherin</author>
<author pid="p/MarcoPistoia">Marco Pistoia</author>
<author pid="29/636">Takaaki Tateishi</author>
<title>Static discovery and remediation of code-embedded resource dependencies.</title>
<pages>233-240</pages>
<year>2011</year>
<booktitle>Integrated Network Management</booktitle>
<ee>https://doi.org/10.1109/INM.2011.5990696</ee>
<crossref>conf/im/2011</crossref>
<url>db/conf/im/im2011.html#JoukovTOPCPT11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nsdi/RamasamyTPJM11" mdate="2021-02-02">
<author pid="98/5762">HariGovind V. Ramasamy</author>
<author pid="01/5088">Cheng-Lin Tsao</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="71/6060">Nikolai Joukov</author>
<author pid="85/6728">James W. Murray</author>
<title>Towards Automated Identification of Security Zone Classification in Enterprise Networks.</title>
<year>2011</year>
<booktitle>Hot-ICE</booktitle>
<ee type="oa">https://www.usenix.org/conference/hot-ice11/towards-automated-identification-security-zone-classification-enterprise</ee>
<crossref>conf/nsdi/2011hotice</crossref>
<url>db/conf/nsdi/hotice2011.html#RamasamyTPJM11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/systor/JoukovPRD10" mdate="2018-11-06">
<author pid="71/6060">Nikolai Joukov</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="98/5762">HariGovind V. Ramasamy</author>
<author pid="41/3022">Murthy V. Devarakonda</author>
<title>Application-storage discovery.</title>
<year>2010</year>
<booktitle>SYSTOR</booktitle>
<ee>https://doi.org/10.1145/1815695.1815720</ee>
<crossref>conf/systor/2010</crossref>
<url>db/conf/systor/systor2010.html#JoukovPRD10</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/CanettiCHPRSV10" mdate="2020-05-23">
<author pid="c/RanCanetti">Ran Canetti</author>
<author pid="11/17">Suresh Chari</author>
<author pid="65/4781">Shai Halevi</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="88/4138-1">Arnab Roy 0001</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author pid="170/8132">Wietse Z. Venema</author>
<title>Composable Security Analysis of OS Services.</title>
<pages>213</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/213</ee>
<url>db/journals/iacr/iacr2010.html#CanettiCHPRSV10</url>
</article>
</r>
<r><inproceedings key="conf/IEEEscc/JoukovPRVDA09" mdate="2023-03-24">
<author pid="71/6060">Nikolai Joukov</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="98/5762">HariGovind V. Ramasamy</author>
<author pid="81/763">Norbert G. Vogl</author>
<author pid="41/3022">Murthy V. Devarakonda</author>
<author pid="00/4406">Tryg Ager</author>
<title>ITBVM: IT Business Value Modeler.</title>
<pages>128-135</pages>
<year>2009</year>
<booktitle>IEEE SCC</booktitle>
<ee>https://doi.org/10.1109/SCC.2009.50</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SCC.2009.50</ee>
<crossref>conf/IEEEscc/2009</crossref>
<url>db/conf/IEEEscc/scc2009.html#JoukovPRVDA09</url>
</inproceedings>
</r>
<r><article key="journals/ijisec/BackesP08" mdate="2017-05-27">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.</title>
<pages>33-54</pages>
<year>2008</year>
<volume>7</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10207-007-0040-z</ee>
<url>db/journals/ijisec/ijisec7.html#BackesP08</url>
</article>
</r>
<r><article key="journals/jcs/BackesPS08" mdate="2023-10-22">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0002-4536-0419" pid="39/3354">Andre Scedrov</author>
<title>Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.</title>
<pages>497-530</pages>
<year>2008</year>
<volume>16</volume>
<journal>J. Comput. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.3233/JCS-2008-0332</ee>
<ee>https://www.wikidata.org/entity/Q122053119</ee>
<url>db/journals/jcs/jcs16.html#BackesPS08</url>
</article>
</r>
<r><inproceedings key="conf/fsttcs/BasinKMP08" mdate="2019-08-29">
<author pid="b/DavidABasin">David A. Basin</author>
<author pid="27/6182">Felix Klaedtke</author>
<author pid="19/697-2">Samuel M&#252;ller 0002</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Runtime Monitoring of Metric First-order Temporal Properties.</title>
<year>2008</year>
<booktitle>FSTTCS</booktitle>
<ee type="oa">https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1740</ee>
<crossref>conf/fsttcs/2008</crossref>
<url>db/conf/fsttcs/fsttcs2008.html#BasinKMP08</url>
<pages>49-60</pages>
</inproceedings>
</r>
<r><article key="journals/iandc/BackesPW07" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>The reactive simulatability (RSIM) framework for asynchronous systems.</title>
<pages>1685-1720</pages>
<year>2007</year>
<volume>205</volume>
<journal>Inf. Comput.</journal>
<number>12</number>
<ee type="oa">https://doi.org/10.1016/j.ic.2007.05.002</ee>
<url>db/journals/iandc/iandc205.html#BackesPW07</url>
</article>
</r>
<r><article key="journals/ibmsj/AbramsKMPR07" mdate="2020-03-13">
<author pid="10/4091">Carl E. Abrams</author>
<author pid="59/6734">Juerg von K&#228;nel</author>
<author pid="19/697-2">Samuel M&#252;ller 0002</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="75/5443">Susanne Ruschka-Taylor</author>
<title>Optimized enterprise risk management.</title>
<pages>219-234</pages>
<year>2007</year>
<volume>46</volume>
<journal>IBM Syst. J.</journal>
<number>2</number>
<ee>https://doi.org/10.1147/sj.462.0219</ee>
<url>db/journals/ibmsj/ibmsj46.html#AbramsKMPR07</url>
</article>
</r>
<r><inproceedings key="conf/csfw/BackesPS07" mdate="2023-03-24">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0002-4536-0419" pid="39/3354">Andre Scedrov</author>
<title>Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.</title>
<pages>112-124</pages>
<year>2007</year>
<booktitle>CSF</booktitle>
<ee>https://doi.org/10.1109/CSF.2007.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSF.2007.23</ee>
<crossref>conf/csfw/2007</crossref>
<url>db/conf/csfw/csf2007.html#BackesPS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sdmw/Pfitzmann07" mdate="2017-05-23">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Multi-layer Audit of Access Rights.</title>
<pages>18-32</pages>
<year>2007</year>
<crossref>conf/sdmw/2007</crossref>
<booktitle>Secure Data Management</booktitle>
<ee>https://doi.org/10.1007/978-3-540-75248-6_2</ee>
<url>db/conf/sdmw/sdmw2007.html#Pfitzmann07</url>
</inproceedings>
</r>
<r><incollection key="books/sp/07/CamenischP07" mdate="2017-05-16">
<author pid="c/JanCamenisch">Jan Camenisch</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Federated Identity Management.</title>
<pages>213-238</pages>
<year>2007</year>
<booktitle>Security, Privacy, and Trust in Modern Data Management</booktitle>
<ee>https://doi.org/10.1007/978-3-540-69861-6_15</ee>
<crossref>books/sp/PJ2007</crossref>
<url>db/books/collections/PJ2007.html#CamenischP07</url>
</incollection>
</r>
<r><inproceedings key="conf/csfw/SprengerBBPW06" mdate="2024-08-04">
<author orcid="0000-0003-2941-5165" pid="s/ChristophSprenger">Christoph Sprenger 0001</author>
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="b/DavidABasin">David A. Basin</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Cryptographically Sound Theorem Proving.</title>
<pages>153-166</pages>
<year>2006</year>
<crossref>conf/csfw/2006</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2006.10</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2006.10</ee>
<url>db/conf/csfw/csfw2006.html#SprengerBBPW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esas/BenensonFPRW06" mdate="2024-05-07">
<author pid="b/ZBenenson">Zinaida Benenson</author>
<author pid="f/FCFreiling">Felix C. Freiling</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="18/1549">Christian Rohner</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.</title>
<pages>165-178</pages>
<year>2006</year>
<crossref>conf/esas/2006</crossref>
<booktitle>ESAS</booktitle>
<ee>https://doi.org/10.1007/11964254_15</ee>
<url>db/conf/esas/esas2006.html#BenensonFPRW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BackesPW06" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.</title>
<pages>404-423</pages>
<year>2006</year>
<crossref>conf/esorics/2006</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11863908_25</ee>
<url>db/conf/esorics/esorics2006.html#BackesPW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fm/BackesPW06" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Formal Methods and Cryptography.</title>
<pages>612-616</pages>
<year>2006</year>
<crossref>conf/fm/2006</crossref>
<booktitle>FM</booktitle>
<ee>https://doi.org/10.1007/11813040_44</ee>
<url>db/conf/fm/fm2006.html#BackesPW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fossacs/BackesMPV06" mdate="2025-12-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author orcid="0000-0002-6901-8319" pid="39/5285">Sebastian M&#246;dersheim</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-9916-271X" pid="93/2273">Luca Vigan&#242; 0001</author>
<title>Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.</title>
<pages>428-445</pages>
<year>2006</year>
<crossref>conf/fossacs/2006</crossref>
<booktitle>FoSSaCS</booktitle>
<ee type="oa">https://doi.org/10.1007/11690634_29</ee>
<url>db/conf/fossacs/fossacs2006.html#BackesMPV06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/BackesP06" mdate="2018-06-26">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.</title>
<pages>233-245</pages>
<year>2006</year>
<crossref>conf/sec/2006</crossref>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/0-387-33406-8_20</ee>
<url>db/conf/sec/sec2006.html#BackesP06</url>
</inproceedings>
</r>
<r><incollection key="series/ais/KarjothPSW06" mdate="2024-05-07">
<author pid="k/GunterKarjoth">G&#252;nter Karjoth</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Service-oriented Assurance - Comprehensive Security by Explicit Assurances.</title>
<pages>13-24</pages>
<year>2006</year>
<booktitle>Quality of Protection</booktitle>
<ee>https://doi.org/10.1007/978-0-387-36584-8_2</ee>
<crossref>series/ais/23</crossref>
<url>db/series/ais/ais23.html#KarjothPSW06</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/PfitzmannSW06" mdate="2020-05-11">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<title>Reactively Simulatable Certified Mail.</title>
<pages>41</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/041</ee>
<url>db/journals/iacr/iacr2006.html#PfitzmannSW06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/SprengerBBPW06" mdate="2020-05-11">
<author pid="s/ChristophSprenger">Christoph Sprenger 0001</author>
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="b/DavidABasin">David A. Basin</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Cryptographically Sound Theorem Proving.</title>
<pages>47</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/047</ee>
<url>db/journals/iacr/iacr2006.html#SprengerBBPW06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesMPV06" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="39/5285">Sebastian M&#246;dersheim</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="93/2273">Luca Vigan&#242; 0001</author>
<title>Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.</title>
<pages>58</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/058</ee>
<url>db/journals/iacr/iacr2006.html#BackesMPV06</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW06" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.</title>
<pages>68</pages>
<year>2006</year>
<volume>2006</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2006/068</ee>
<url>db/journals/iacr/iacr2006.html#BackesPW06</url>
</article>
</r>
<r><article key="journals/ijisec/BackesPW05" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library.</title>
<pages>135-154</pages>
<year>2005</year>
<volume>4</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-004-0056-6</ee>
<url>db/journals/ijisec/ijisec4.html#BackesPW05</url>
</article>
</r>
<r><article key="journals/ijisec/BackesPW05a" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Reactively secure signature schemes.</title>
<pages>242-252</pages>
<year>2005</year>
<volume>4</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10207-004-0062-8</ee>
<url>db/journals/ijisec/ijisec4.html#BackesPW05a</url>
</article>
</r>
<r><article key="journals/tdsc/BackesP05" mdate="2020-04-09">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Relating Symbolic and Cryptographic Secrecy.</title>
<pages>109-123</pages>
<year>2005</year>
<volume>2</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TDSC.2005.25</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2005.25</ee>
<url>db/journals/tdsc/tdsc2.html#BackesP05</url>
</article>
</r>
<r><inproceedings key="conf/esorics/BackesP05" mdate="2019-08-20">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Limits of the Cryptographic Realization of Dolev-Yao-Style XOR.</title>
<pages>178-196</pages>
<year>2005</year>
<crossref>conf/esorics/2005</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11555827_11</ee>
<url>db/conf/esorics/esorics2005.html#BackesP05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/GrossPS05" mdate="2019-08-20">
<author pid="g/ThomasGross">Thomas Gro&#223; 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Browser Model for Security Analysis of Browser-Based Protocols.</title>
<pages>489-508</pages>
<year>2005</year>
<crossref>conf/esorics/2005</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11555827_28</ee>
<url>db/conf/esorics/esorics2005.html#GrossPS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/jurix/GiblinLMPZ05" mdate="2019-08-29">
<author pid="99/3573">Christopher Giblin</author>
<author pid="91/112-45">Alice Y. Liu</author>
<author pid="19/697-2">Samuel M&#252;ller 0002</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="05/3403">Xin Zhou</author>
<title>Regulations Expressed As Logical Models (REALM).</title>
<pages>37-48</pages>
<year>2005</year>
<booktitle>JURIX</booktitle>
<crossref>conf/jurix/2005</crossref>
<url>db/conf/jurix/jurix2005.html#GiblinLMPZ05</url>
<ee>http://www.booksonline.iospress.nl/Content/View.aspx?piid=838</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/BackesP05" mdate="2023-09-21">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Relating Symbolic and Cryptographic Secrecy.</title>
<pages>171-182</pages>
<year>2005</year>
<crossref>conf/sp/2005</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SP.2005.17</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2005.17</ee>
<url>db/conf/sp/sp2005.html#BackesP05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sws/GrobetaPS05" mdate="2019-02-12">
<author pid="g/ThomasGross">Thomas Gro&#223; 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Proving a WS-federation passive requestor profile with a browser model.</title>
<pages>54-64</pages>
<year>2005</year>
<booktitle>SWS</booktitle>
<ee>https://doi.org/10.1145/1103022.1103034</ee>
<crossref>conf/sws/2005</crossref>
<url>db/conf/sws/sws2005.html#GrobetaPS05</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/GrossPS05" mdate="2020-05-11">
<author pid="g/ThomasGross">Thomas Gro&#223; 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Browser Model for Security Analysis of Browser-Based Protocols.</title>
<pages>127</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/127</ee>
<url>db/journals/iacr/iacr2005.html#GrossPS05</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesP05" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Limits of the Cryptographic Realization of Dolev-Yao-style XOR.</title>
<pages>220</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/220</ee>
<url>db/journals/iacr/iacr2005.html#BackesP05</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPS05" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="39/3354">Andre Scedrov</author>
<title>Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.</title>
<pages>421</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/421</ee>
<url>db/journals/iacr/iacr2005.html#BackesPS05</url>
</article>
</r>
<r><article key="journals/ijisec/BackesP04" mdate="2017-05-27">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Computational probabilistic noninterference.</title>
<pages>42-60</pages>
<year>2004</year>
<volume>3</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10207-004-0039-7</ee>
<url>db/journals/ijisec/ijisec3.html#BackesP04</url>
</article>
</r>
<r><article key="journals/istr/Pfitzmann04" mdate="2020-05-18">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Privacy in enterprise identity federation - policies for Liberty 2 single sign on.</title>
<pages>45-58</pages>
<year>2004</year>
<volume>9</volume>
<journal>Inf. Secur. Tech. Rep.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/S1363-4127(04)00015-9</ee>
<url>db/journals/istr/istr9.html#Pfitzmann04</url>
</article>
</r>
<r><article key="journals/jcs/BackesPW04" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Polynomial liveness.</title>
<pages>589-617</pages>
<year>2004</year>
<volume>12</volume>
<journal>J. Comput. Secur.</journal>
<number>3-4</number>
<url>db/journals/jcs/jcs12.html#BackesPW04</url>
<ee>https://doi.org/10.3233/jcs-2004-123-409</ee>
<ee>https://www.wikidata.org/entity/Q114944127</ee>
</article>
</r>
<r><article key="journals/jsac/BackesP04" mdate="2020-04-02">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol.</title>
<pages>2075-2086</pages>
<year>2004</year>
<volume>22</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/JSAC.2004.836016</ee>
<url>db/journals/jsac/jsac22.html#BackesP04</url>
</article>
</r>
<r><inproceedings key="conf/csfw/BackesP04" mdate="2023-03-24">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.</title>
<pages>204-218</pages>
<year>2004</year>
<crossref>conf/csfw/2004</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.20</ee>
<url>db/conf/csfw/csfw2004.html#BackesP04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fosad/BackesPW04" mdate="2017-05-21">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Justifying a Dolev-Yao Model Under Active Attacks.</title>
<pages>1-41</pages>
<year>2004</year>
<crossref>conf/fosad/2005</crossref>
<booktitle>FOSAD</booktitle>
<ee>https://doi.org/10.1007/11554578_1</ee>
<url>db/conf/fosad/fosad2005.html#BackesPW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/BackesPW04" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Low-Level Ideal Signatures and General Integrity Idealization.</title>
<pages>39-51</pages>
<ee>https://doi.org/10.1007/978-3-540-30144-8_4</ee>
<year>2004</year>
<crossref>conf/isw/2004</crossref>
<booktitle>ISC</booktitle>
<url>db/conf/isw/isc2004.html#BackesPW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sws/GrossP04" mdate="2019-02-12">
<author pid="g/ThomasGross">Thomas Gro&#223; 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Proving a WS-Federation passive requestor profile.</title>
<pages>77-86</pages>
<year>2004</year>
<booktitle>SWS</booktitle>
<ee>https://doi.org/10.1145/1111348.1111357</ee>
<crossref>conf/sws/2004</crossref>
<url>db/conf/sws/sws2004.html#GrossP04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tcc/BackesPW04" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>A General Composition Theorem for Secure Reactive Systems.</title>
<pages>336-354</pages>
<ee>https://doi.org/10.1007/978-3-540-24638-1_19</ee>
<year>2004</year>
<crossref>conf/tcc/2004</crossref>
<booktitle>TCC</booktitle>
<url>db/conf/tcc/tcc2004.html#BackesPW04</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2004ccs" mdate="2020-11-13">
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor pid="p/BPfitzmann">Birgit Pfitzmann</editor>
<editor pid="m/PatrickDrewMcDaniel">Patrick D. McDaniel</editor>
<title>Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004</title>
<booktitle>CCS</booktitle>
<publisher>ACM</publisher>
<year>2004</year>
<isbn>1-58113-961-6</isbn>
<url>db/conf/ccs/ccs2004p.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BackesP04" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.</title>
<pages>59</pages>
<year>2004</year>
<volume>2004</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2004/059</ee>
<url>db/journals/iacr/iacr2004.html#BackesP04</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW04" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.</title>
<pages>82</pages>
<year>2004</year>
<volume>2004</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2004/082</ee>
<url>db/journals/iacr/iacr2004.html#BackesPW04</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesP04a" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Relating Symbolic and Cryptographic Secrecy.</title>
<pages>300</pages>
<year>2004</year>
<volume>2004</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2004/300</ee>
<url>db/journals/iacr/iacr2004.html#BackesP04a</url>
</article>
</r>
<r><article key="journals/internet/PfitzmannW03" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Analysis of Liberty Single-Sign-on with Enabled Clients.</title>
<pages>38-44</pages>
<year>2003</year>
<volume>7</volume>
<journal>IEEE Internet Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/MIC.2003.1250582</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MIC.2003.1250582</ee>
<url>db/journals/internet/internet7.html#PfitzmannW03</url>
</article>
</r>
<r><inproceedings key="conf/bpm/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Security in Business Process Engineering.</title>
<pages>168-183</pages>
<year>2003</year>
<crossref>conf/bpm/2003</crossref>
<booktitle>Business Process Management</booktitle>
<ee>https://doi.org/10.1007/3-540-44895-0_12</ee>
<url>db/conf/bpm/bpm2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>A composable cryptographic library with nested operations.</title>
<pages>220-230</pages>
<year>2003</year>
<crossref>conf/ccs/2003</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/948109.948140</ee>
<url>db/conf/ccs/ccs2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BackesPS03" mdate="2017-05-23">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<title>A Toolkit for Managing Enterprise Privacy Policies.</title>
<pages>162-180</pages>
<ee>https://doi.org/10.1007/978-3-540-39650-5_10</ee>
<year>2003</year>
<crossref>conf/esorics/2003</crossref>
<booktitle>ESORICS</booktitle>
<url>db/conf/esorics/esorics2003.html#BackesPS03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Symmetric Authentication within a Simulatable Cryptographic Library.</title>
<pages>271-290</pages>
<ee>https://doi.org/10.1007/978-3-540-39650-5_16</ee>
<year>2003</year>
<crossref>conf/esorics/2003</crossref>
<booktitle>ESORICS</booktitle>
<url>db/conf/esorics/esorics2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fsttcs/BackesP03" mdate="2017-05-24">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.</title>
<pages>1-12</pages>
<ee>https://doi.org/10.1007/978-3-540-24597-1_1</ee>
<year>2003</year>
<crossref>conf/fsttcs/2003</crossref>
<booktitle>FSTTCS</booktitle>
<url>db/conf/fsttcs/fsttcs2003.html#BackesP03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/BackesPW03" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Reactively Secure Signature Schemes.</title>
<pages>84-95</pages>
<ee>https://doi.org/10.1007/10958513_7</ee>
<year>2003</year>
<crossref>conf/isw/2003</crossref>
<booktitle>ISC</booktitle>
<url>db/conf/isw/isc2003.html#BackesPW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pet/Pfitzmann03" mdate="2017-05-23">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon.</title>
<pages>189-204</pages>
<ee>https://doi.org/10.1007/978-3-540-40956-4_13</ee>
<year>2003</year>
<crossref>conf/pet/2003</crossref>
<booktitle>Privacy Enhancing Technologies</booktitle>
<url>db/conf/pet/pet2003.html#Pfitzmann03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/BackesP03" mdate="2023-09-21">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Intransitive Non-Interference for Cryptographic Purpose.</title>
<pages>140-</pages>
<year>2003</year>
<crossref>conf/sp/2003</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.2003.1199333</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.2003.1199333</ee>
<url>db/conf/sp/sp2003.html#BackesP03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/PfitzmannW03" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Federated Identity-Management Protocols.</title>
<pages>153-174</pages>
<year>2003</year>
<crossref>conf/spw/2003</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/11542322_20</ee>
<url>db/conf/spw/spw2003.html#PfitzmannW03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Pfitzmann03" mdate="2017-05-25">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Federated Identity-Management Protocols (Discussion).</title>
<pages>175-177</pages>
<year>2003</year>
<crossref>conf/spw/2003</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/11542322_21</ee>
<url>db/conf/spw/spw2003.html#Pfitzmann03</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW03" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>A Universally Composable Cryptographic Library.</title>
<pages>15</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/015</ee>
<url>db/journals/iacr/iacr2003.html#BackesPW03</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesP03" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.</title>
<pages>121</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/121</ee>
<url>db/journals/iacr/iacr2003.html#BackesP03</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BackesPW03a" mdate="2020-05-11">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Symmetric Authentication Within a Simulatable Cryptographic Library.</title>
<pages>145</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/145</ee>
<url>db/journals/iacr/iacr2003.html#BackesPW03a</url>
</article>
</r>
<r><inproceedings key="conf/csfw/BackesPSW02" mdate="2024-05-07">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="64/5301-1">Michael Steiner 0001</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Polynomial Fairness and Liveness.</title>
<pages>160-174</pages>
<year>2002</year>
<crossref>conf/csfw/2002</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.2002.1021814</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.2002.1021814</ee>
<url>db/conf/csfw/csfw2002.html#BackesPSW02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BackesP02" mdate="2017-05-23">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Computational Probabilistic Non-interference.</title>
<pages>1-23</pages>
<year>2002</year>
<crossref>conf/esorics/2002</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-45853-0_1</ee>
<url>db/conf/esorics/esorics2002.html#BackesP02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fm/BackesJP02" mdate="2017-05-22">
<author pid="b/MichaelBackes1">Michael Backes 0001</author>
<author pid="j/CJacobi2">Christian Jacobi 0002</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.</title>
<pages>310-329</pages>
<year>2002</year>
<crossref>conf/fm/2002</crossref>
<booktitle>FME</booktitle>
<ee>https://doi.org/10.1007/3-540-45614-7_18</ee>
<url>db/conf/fm/fme2002.html#BackesJP02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wpes/PfitzmannW02" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Privacy in browser-based attribute exchange.</title>
<pages>52-62</pages>
<year>2002</year>
<crossref>conf/wpes/2002</crossref>
<booktitle>WPES</booktitle>
<ee>https://doi.org/10.1145/644527.644533</ee>
<url>db/conf/wpes/wpes2002.html#PfitzmannW02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fse/AlkassarGPS01" mdate="2017-05-23">
<author pid="a/AmmarAlkassar">Ammar Alkassar</author>
<author pid="51/6817">Alexander Geraldy</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Optimized Self-Synchronizing Mode of Operation.</title>
<pages>78-91</pages>
<year>2001</year>
<crossref>conf/fse/2001</crossref>
<booktitle>FSE</booktitle>
<ee>https://doi.org/10.1007/3-540-45473-X_7</ee>
<url>db/conf/fse/fse2001.html#AlkassarGPS01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/PfitzmannW01" mdate="2023-09-21">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.</title>
<pages>184-200</pages>
<year>2001</year>
<crossref>conf/sp/2001</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.2001.924298</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.2001.924298</ee>
<url>db/conf/sp/sp2001.html#PfitzmannW01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannRSWW01" mdate="2022-11-17">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="16/3647">James Riordan</author>
<author pid="76/3305">Christian St&#252;ble</author>
<author pid="90/308">Michael Waidner</author>
<author pid="15/1879">Arnd Weber</author>
<title>Die PERSEUS Systemarchitektur.</title>
<pages>1-17</pages>
<year>2001</year>
<booktitle>VIS</booktitle>
<ee>https://doi.org/10.1007/978-3-663-05918-9_1</ee>
<crossref>conf/vis/2001</crossref>
<url>db/conf/vis/vis2001.html#PfitzmannRSWW01</url>
</inproceedings>
</r>
<r><proceedings key="conf/eurocrypt/2001" mdate="2019-05-14">
<editor pid="p/BPfitzmann">Birgit Pfitzmann</editor>
<title>Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding</title>
<booktitle>EUROCRYPT</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>2045</volume>
<publisher>Springer</publisher>
<year>2001</year>
<isbn>3-540-42070-3</isbn>
<ee>https://doi.org/10.1007/3-540-44987-6</ee>
<url>db/conf/eurocrypt/eurocrypt2001.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/asiacrypt/PfitzmannS00" mdate="2017-05-19">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Anonymous Fingerprinting with Direct Non-repudiation.</title>
<pages>401-414</pages>
<year>2000</year>
<crossref>conf/asiacrypt/2000</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-44448-3_31</ee>
<url>db/conf/asiacrypt/asiacrypt2000.html#PfitzmannS00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/PfitzmannW00" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Composition and integrity preservation of secure reactive systems.</title>
<pages>245-254</pages>
<year>2000</year>
<crossref>conf/ccs/2000</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/352600.352639</ee>
<url>db/conf/ccs/ccs2000.html#PfitzmannW00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/PfitzmannS00" mdate="2017-05-24">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Self-Escrowed Cash against User Blackmailing.</title>
<pages>42-52</pages>
<year>2000</year>
<crossref>conf/fc/2000</crossref>
<booktitle>Financial Cryptography</booktitle>
<ee>https://doi.org/10.1007/3-540-45472-1_4</ee>
<url>db/conf/fc/fc2000.html#PfitzmannS00</url>
</inproceedings>
</r>
<r><book key="books/sp/LacostePSW00" mdate="2020-05-23">
<editor pid="59/205">G&#233;rard Lacoste</editor>
<editor pid="p/BPfitzmann">Birgit Pfitzmann</editor>
<editor pid="64/5301-1">Michael Steiner 0001</editor>
<editor pid="90/308">Michael Waidner</editor>
<title>SEMPER - Secure Electronic Marketplace for Europe</title>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>1854</volume>
<publisher>Springer</publisher>
<year>2000</year>
<isbn>3-540-67825-5</isbn>
<ee>https://doi.org/10.1007/b75215</ee>
</book>
</r>
<r><article publtype="informal" key="journals/iacr/PfitzmannS00" mdate="2020-05-11">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Anonymous Fingerprinting with Direct Non-Repudiation.</title>
<pages>32</pages>
<year>2000</year>
<volume>2000</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2000/032</ee>
<url>db/journals/iacr/iacr2000.html#PfitzmannS00</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/PfitzmannW00" mdate="2020-05-11">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.</title>
<pages>66</pages>
<year>2000</year>
<volume>2000</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2000/066</ee>
<url>db/journals/iacr/iacr2000.html#PfitzmannW00</url>
</article>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannS99" mdate="2017-05-23">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Coin-Based Anonymous Fingerprinting.</title>
<pages>150-164</pages>
<year>1999</year>
<crossref>conf/eurocrypt/99</crossref>
<booktitle>EUROCRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-48910-X_11</ee>
<url>db/conf/eurocrypt/eurocrypt99.html#PfitzmannS99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ih/AdelsbachPS99" mdate="2017-05-21">
<author pid="54/6683">Andr&#233; Adelsbach</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author>
<title>Proving Ownership of Digital Content.</title>
<pages>117-133</pages>
<year>1999</year>
<crossref>conf/ih/1999</crossref>
<booktitle>Information Hiding</booktitle>
<url>db/conf/ih/ih99.html#AdelsbachPS99</url>
<ee>https://doi.org/10.1007/10719724_9</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ih/GuthP99" mdate="2017-05-21">
<author pid="64/1671">Hans-J&#252;rgen Guth</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Error- and Collusion-Secure Fingerprinting for Digital Data.</title>
<pages>134-145</pages>
<year>1999</year>
<crossref>conf/ih/1999</crossref>
<booktitle>Information Hiding</booktitle>
<url>db/conf/ih/ih99.html#GuthP99</url>
<ee>https://doi.org/10.1007/10719724_10</ee>
</inproceedings>
</r>
<r><inproceedings key="journals/entcs/PfitzmannSW00" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Cryptographic Security of Reactive Systems.</title>
<year>1999</year>
<crossref>conf/wsaif/1999</crossref>
<booktitle>Workshop on Secure Architectures and Information Flow</booktitle>
<ee type="oa">https://doi.org/10.1016/S1571-0661(04)00095-7</ee>
<ee>https://www.wikidata.org/entity/Q115012803</ee>
<url>db/journals/entcs/entcs32.html#PfitzmannSW00</url>
<pages>59-77</pages>
</inproceedings>
</r>
<r><article key="journals/jsac/JerichowMPPW98" mdate="2024-05-07">
<author pid="23/645">Anja Jerichow</author>
<author pid="48/2018">Jan M&#252;ller 0001</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Real-time mixes: a bandwidth-efficient anonymity protocol.</title>
<pages>495-509</pages>
<year>1998</year>
<volume>16</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/49.668973</ee>
<url>db/journals/jsac/jsac16.html#JerichowMPPW98</url>
</article>
</r>
<r><article key="journals/sigops/PfitzmannW98" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>How to Break Fraud-Detectable Key Recovery.</title>
<pages>23-28</pages>
<year>1998</year>
<volume>32</volume>
<journal>ACM SIGOPS Oper. Syst. Rev.</journal>
<number>1</number>
<url>db/journals/sigops/sigops32.html#PfitzmannW98</url>
<ee>https://doi.org/10.1145/280559.280563</ee>
</article>
</r>
<r><article key="journals/tit/DamgardPP98" mdate="2020-03-10">
<author pid="d/IvanDamgaard">Ivan Damg&#229;rd</author>
<author pid="02/2984">Torben P. Pedersen</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Statistical Secrecy and Multibit Commitments.</title>
<pages>1143-1151</pages>
<year>1998</year>
<volume>44</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>3</number>
<url>db/journals/tit/tit44.html#DamgardPP98</url>
<ee>https://doi.org/10.1109/18.669255</ee>
</article>
</r>
<r><inproceedings key="conf/crypto/GoldreichPR98" mdate="2018-11-30">
<author orcid="0000-0002-4329-135X" pid="g/OdedGoldreich">Oded Goldreich 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="r/RonaldLRivest">Ronald L. Rivest</author>
<title>Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.</title>
<pages>153-168</pages>
<ee>https://doi.org/10.1007/BFb0055726</ee>
<year>1998</year>
<crossref>conf/crypto/1998</crossref>
<booktitle>CRYPTO</booktitle>
<url>db/conf/crypto/crypto98.html#GoldreichPR98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icalp/DamgardP98" mdate="2017-05-23">
<author pid="d/IvanDamgaard">Ivan Damg&#229;rd</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP.</title>
<pages>772-783</pages>
<ee>https://doi.org/10.1007/BFb0055101</ee>
<year>1998</year>
<crossref>conf/icalp/1998</crossref>
<booktitle>ICALP</booktitle>
<url>db/conf/icalp/icalp98.html#DamgardP98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/podc/PfitzmannSW98" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Optimal Efficiency of Optimistic Contract Signing.</title>
<pages>113-122</pages>
<year>1998</year>
<crossref>conf/podc/1998</crossref>
<booktitle>PODC</booktitle>
<ee>https://doi.org/10.1145/277697.277717</ee>
<url>db/conf/podc/podc98.html#PfitzmannSW98</url>
</inproceedings>
</r>
<r><article key="journals/computer/PfitzmannPSW97" mdate="2024-05-07">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Trusting Mobile User Devices and Security Modules.</title>
<pages>61-68</pages>
<year>1997</year>
<volume>30</volume>
<journal>Computer</journal>
<number>2</number>
<url>db/journals/computer/computer30.html#PfitzmannPSW97</url>
<ee>https://doi.org/10.1109/2.566159</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/2.566159</ee>
<ee>https://www.wikidata.org/entity/Q114991982</ee>
</article>
</r>
<r><article key="journals/joc/DamgardPP97" mdate="2020-09-18">
<author pid="d/IvanDamgaard">Ivan Damg&#229;rd</author>
<author pid="02/2984">Torben P. Pedersen</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.</title>
<pages>163-194</pages>
<year>1997</year>
<volume>10</volume>
<journal>J. Cryptol.</journal>
<number>3</number>
<url>db/journals/joc/joc10.html#DamgardPP97</url>
<ee>https://doi.org/10.1007/s001459900026</ee>
</article>
</r>
<r><article key="journals/siamcomp/PedersenP97" mdate="2025-10-28">
<author pid="02/2984">Torben Pryds Pedersen</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Fail-Stop Signatures.</title>
<pages>291-330</pages>
<year>1997</year>
<volume>26</volume>
<journal>SIAM J. Comput.</journal>
<number>2</number>
<url>db/journals/siamcomp/siamcomp26.html#PedersenP97</url>
<ee>https://doi.org/10.1137/S009753979324557X</ee>
</article>
</r>
<r><article key="journals/tocs/PfitzmannW97" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Strong Loss Tolerance of Electronic Coin Systems.</title>
<pages>194-213</pages>
<year>1997</year>
<volume>15</volume>
<journal>ACM Trans. Comput. Syst.</journal>
<number>2</number>
<url>db/journals/tocs/tocs15.html#PfitzmannW97</url>
<ee>https://doi.org/10.1145/253145.253282</ee>
</article>
</r>
<r><inproceedings key="conf/ccs/PfitzmannW97" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Asymmetric Fingerprinting for Larger Collusions.</title>
<pages>151-160</pages>
<year>1997</year>
<crossref>conf/ccs/1997</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/266420.266453</ee>
<url>db/conf/ccs/ccs1997.html#PfitzmannW97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannW97" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Anonymous Fingerprinting.</title>
<pages>88-102</pages>
<ee>https://doi.org/10.1007/3-540-69053-0_8</ee>
<year>1997</year>
<crossref>conf/eurocrypt/97</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt97.html#PfitzmannW97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/BariP97" mdate="2018-11-13">
<author pid="76/3635">Niko Baric</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees.</title>
<pages>480-494</pages>
<ee>https://doi.org/10.1007/3-540-69053-0_33</ee>
<year>1997</year>
<crossref>conf/eurocrypt/97</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt97.html#BariP97</url>
</inproceedings>
</r>
<r><incollection key="books/vi/97/PfitzmannW97" mdate="2020-05-15">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Kopierschutz durch asymmetrische Schl&#252;sselkennzeichnung mit Signeten.</title>
<pages>17-32</pages>
<year>1997</year>
<booktitle>Verl&#228;&#223;liche IT-Systeme</booktitle>
<ee>https://doi.org/10.1007/978-3-322-86842-8_2</ee>
<crossref>books/vi/97/MRRS1997</crossref>
<url>db/books/collections/MRRS1997.html#PfitzmannW97</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/GoldreichPR97" mdate="2020-05-11">
<author pid="g/OdedGoldreich">Oded Goldreich 0001</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="r/RonaldLRivest">Ronald L. Rivest</author>
<title>Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.</title>
<pages>12</pages>
<year>1997</year>
<volume>1997</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/1997/012</ee>
<url>db/journals/iacr/iacr1997.html#GoldreichPR97</url>
</article>
</r>
<r><book key="books/sp/Pfitzmann96" mdate="2019-05-14">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Digital Signature Schemes, General Framework and Fail-Stop Signatures</title>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>1100</volume>
<publisher>Springer</publisher>
<year>1996</year>
<isbn>3-540-61517-2</isbn>
<ee>https://doi.org/10.1007/BFb0024619</ee>
</book>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannS96" mdate="2017-05-22">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<title>Asymmetric Fingerprinting (Extended Abstract).</title>
<pages>84-95</pages>
<ee>https://doi.org/10.1007/3-540-68339-9_8</ee>
<year>1996</year>
<crossref>conf/eurocrypt/96</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt96.html#PfitzmannS96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ih/Pfitzmann96" mdate="2017-05-21">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Trials of Traced Traitors.</title>
<pages>49-64</pages>
<year>1996</year>
<crossref>conf/ih/1996</crossref>
<booktitle>Information Hiding</booktitle>
<url>db/conf/ih/ih96.html#Pfitzmann96</url>
<ee>https://doi.org/10.1007/3-540-61996-8_31</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ih/Pfitzmann96a" mdate="2017-05-22">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals.</title>
<pages>347-350</pages>
<year>1996</year>
<crossref>conf/ih/1996</crossref>
<booktitle>Information Hiding</booktitle>
<url>db/conf/ih/ih96.html#Pfitzmann96a</url>
<ee>https://doi.org/10.1007/3-540-61996-8_52</ee>
</inproceedings>
</r>
<r><phdthesis key="phd/dnb/Pfitzmann95" mdate="2021-07-17">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Fail-stop signature schemes.</title>
<year>1995</year>
<pages>1-353</pages>
<school>University of Hildesheim, Germany</school>
<ee>https://d-nb.info/945515413</ee>
</phdthesis>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannSW95" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>How to Break Another Provably Secure Payment System.</title>
<pages>121-132</pages>
<ee>https://doi.org/10.1007/3-540-49264-X_10</ee>
<year>1995</year>
<crossref>conf/eurocrypt/95</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt95.html#PfitzmannSW95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannPSW95" mdate="2016-11-15">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="90/308">Michael Waidner</author>
<title>Vertrauensw&#252;rdiger Entwurf portabler Benutzerendger&#228;te und Sicherheitsmodule.</title>
<pages>329-</pages>
<year>1995</year>
<crossref>conf/vis/1995</crossref>
<booktitle>VIS</booktitle>
<url>db/conf/vis/vis95.html#PfitzmannPSW95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BolyBCMMMPPRSSVW94" mdate="2019-10-19">
<author pid="45/802">Jean-Paul Boly</author>
<author pid="b/ABosselaers">Antoon Bosselaers</author>
<author pid="c/RonaldCramer">Ronald Cramer</author>
<author pid="55/6369">Rolf Michelsen</author>
<author orcid="0000-0002-9940-6080" pid="67/4994">Stig Fr. Mj&#248;lsnes</author>
<author pid="77/7022">Frank Muller</author>
<author pid="02/2984">Torben P. Pedersen</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="93/5889">Peter de Rooij</author>
<author pid="10/4165">Berry Schoenmakers</author>
<author pid="86/1764">Matthias Schunter</author>
<author pid="80/2461">Luc Vall&#233;e</author>
<author pid="90/308">Michael Waidner</author>
<title>The ESPRIT Project CAFE - High Security Digital Payment Systems.</title>
<pages>217-230</pages>
<year>1994</year>
<crossref>conf/esorics/1994</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-58618-0_66</ee>
<url>db/conf/esorics/esorics1994.html#BolyBCMMMPPRSSVW94</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/Pfitzmann94" mdate="2017-05-20">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Breaking Efficient Anonymous Channel.</title>
<pages>332-340</pages>
<ee>https://doi.org/10.1007/BFb0053448</ee>
<year>1994</year>
<crossref>conf/eurocrypt/94</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt94.html#Pfitzmann94</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/Pfitzmann93" mdate="2020-11-10">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Sorting Out Signature Schemes.</title>
<pages>74-85</pages>
<year>1993</year>
<crossref>conf/ccs/1993</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/168588.168597</ee>
<url>db/conf/ccs/ccs1993.html#Pfitzmann93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/DamgardPP93" mdate="2017-05-20">
<author pid="d/IvanDamgaard">Ivan Damg&#229;rd</author>
<author pid="02/2984">Torben P. Pedersen</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.</title>
<pages>250-265</pages>
<ee>https://doi.org/10.1007/3-540-48329-2_22</ee>
<year>1993</year>
<crossref>conf/crypto/1993</crossref>
<booktitle>CRYPTO</booktitle>
<url>db/conf/crypto/crypto93.html#DamgardPP93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/HeijstPP92" mdate="2017-05-20">
<author pid="67/5620">Eug&#232;ne van Heijst</author>
<author pid="02/2984">Torben P. Pedersen</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract).</title>
<pages>15-30</pages>
<ee>https://doi.org/10.1007/3-540-48071-4_2</ee>
<year>1992</year>
<crossref>conf/crypto/1992</crossref>
<booktitle>CRYPTO</booktitle>
<url>db/conf/crypto/crypto92.html#HeijstPP92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannW92" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Attacks on Protocols for Server-Aided RSA Computation.</title>
<pages>153-162</pages>
<ee>https://doi.org/10.1007/3-540-47555-9_13</ee>
<year>1992</year>
<crossref>conf/eurocrypt/92</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt92.html#PfitzmannW92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/stacs/PfitzmannW92" mdate="2024-05-07">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Unconditional Byzantine Agreement for any Number of Faulty Processors.</title>
<pages>339-350</pages>
<year>1992</year>
<crossref>conf/stacs/1992</crossref>
<booktitle>STACS</booktitle>
<url>db/conf/stacs/stacs92.html#PfitzmannW92</url>
<ee>https://doi.org/10.1007/3-540-55210-3_195</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/PfitzmannW91" mdate="2017-05-20">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>How To Break and Repair A &#34;Provably Secure&#34; Untraceable Payment System.</title>
<pages>338-350</pages>
<ee>https://doi.org/10.1007/3-540-46766-1_28</ee>
<year>1991</year>
<crossref>conf/crypto/1991</crossref>
<booktitle>CRYPTO</booktitle>
<url>db/conf/crypto/crypto91.html#PfitzmannW91</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/ChaumHP91" mdate="2017-05-20">
<author pid="c/DavidChaum">David Chaum</author>
<author pid="67/5620">Eug&#232;ne van Heijst</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.</title>
<pages>470-484</pages>
<ee>https://doi.org/10.1007/3-540-46766-1_38</ee>
<year>1991</year>
<crossref>conf/crypto/1991</crossref>
<booktitle>CRYPTO</booktitle>
<url>db/conf/crypto/crypto91.html#ChaumHP91</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kivs/PfitzmannPW91" mdate="2017-05-23">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead.</title>
<pages>451-463</pages>
<year>1991</year>
<crossref>conf/kivs/1991</crossref>
<booktitle>Kommunikation in Verteilten Systemen</booktitle>
<url>db/conf/kivs/kivs91.html#PfitzmannPW91</url>
<ee>https://doi.org/10.1007/978-3-642-76462-2_32</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/stacs/Baum-WaidnerPW91" mdate="2024-05-07">
<author pid="03/4815">Birgit Baum-Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>Unconditional Byzantine Agreement with Good Majority.</title>
<pages>285-295</pages>
<year>1991</year>
<crossref>conf/stacs/1991</crossref>
<booktitle>STACS</booktitle>
<url>db/conf/stacs/stacs91.html#Baum-WaidnerPW91</url>
<ee>https://doi.org/10.1007/BFb0020806</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannW91" mdate="2017-05-21">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Fail-stop-Signaturen und ihre Anwendung.</title>
<pages>289-301</pages>
<year>1991</year>
<crossref>conf/vis/1991</crossref>
<booktitle>VIS</booktitle>
<url>db/conf/vis/vis91.html#PfitzmannW91</url>
<ee>https://doi.org/10.1007/978-3-642-76562-9_18</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/PfitzmannW91a" mdate="2017-05-21">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit.</title>
<pages>302-320</pages>
<year>1991</year>
<crossref>conf/vis/1991</crossref>
<booktitle>VIS</booktitle>
<url>db/conf/vis/vis91.html#PfitzmannW91a</url>
<ee>https://doi.org/10.1007/978-3-642-76562-9_19</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/vis/FoxP91" mdate="2017-05-21">
<author pid="82/938">Dirk Fox</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Effiziente Software-Implementierung des GMR-Signatursystems.</title>
<pages>329-345</pages>
<year>1991</year>
<crossref>conf/vis/1991</crossref>
<booktitle>VIS</booktitle>
<url>db/conf/vis/vis91.html#FoxP91</url>
<ee>https://doi.org/10.1007/978-3-642-76562-9_21</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/BleumerPW90" mdate="2024-05-07">
<author pid="81/3632">Gerrit Bleumer</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<title>A Remark on a Signature Scheme Where Forgery Can Be Proved.</title>
<pages>441-445</pages>
<ee>https://doi.org/10.1007/3-540-46877-3_39</ee>
<year>1990</year>
<crossref>conf/eurocrypt/90</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt90.html#BleumerPW90</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ftcs/WaidnerP90" mdate="2017-05-23">
<author pid="90/308">Michael Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Loss-tolerance for electronic wallets.</title>
<pages>140-147</pages>
<year>1990</year>
<booktitle>FTCS</booktitle>
<ee>https://doi.org/10.1109/FTCS.1990.89349</ee>
<crossref>conf/ftcs/1990</crossref>
<url>db/conf/ftcs/ftcs1990.html#WaidnerP90</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/PfitzmannP89" mdate="2017-05-19">
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<title>How to Break the Direct RSA-Implementation of Mixes.</title>
<pages>373-381</pages>
<ee>https://doi.org/10.1007/3-540-46885-4_37</ee>
<year>1989</year>
<crossref>conf/eurocrypt/89</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt89.html#PfitzmannP89</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/WaidnerP89" mdate="2024-05-07">
<author orcid="0000-0001-7919-9961" pid="90/308">Michael Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).</title>
<pages>690</pages>
<ee>https://doi.org/10.1007/3-540-46885-4_69</ee>
<year>1989</year>
<crossref>conf/eurocrypt/89</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt89.html#WaidnerP89</url>
</inproceedings>
</r>
<r><article key="journals/insk/PfitzmannPW88" mdate="2020-08-13">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Datenschutz garantierende offene Kommunikationsnetze.</title>
<pages>118-142</pages>
<year>1988</year>
<volume>11</volume>
<journal>Inform. Spektrum</journal>
<number>3</number>
<url>db/journals/insk/insk11.html#PfitzmannPW88</url>
</article>
</r>
<r><article key="journals/pik/PfitzmannPW88" mdate="2021-04-29">
<author pid="p/AndreasPfitzmann">Andreas Pfitzmann</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<author pid="90/308">Michael Waidner</author>
<title>Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.</title>
<pages>5-8</pages>
<year>1988</year>
<volume>11</volume>
<journal>Prax. Inf.verarb. Kommun.</journal>
<number>1</number>
<ee>https://doi.org/10.1515/piko.1988.11.1.5</ee>
<url>db/journals/pik/pik11.html#PfitzmannPW88</url>
</article>
</r>
<r><inproceedings key="conf/icftcs/WaidnerP87" mdate="2017-05-17">
<author pid="90/308">Michael Waidner</author>
<author pid="p/BPfitzmann">Birgit Pfitzmann</author>
<title>Verlusttolerante elektronische Brieftaschen.</title>
<pages>36-50</pages>
<year>1987</year>
<crossref>conf/icftcs/1987</crossref>
<booktitle>Fehlertolerierende Rechensysteme</booktitle>
<url>db/conf/icftcs/icftcs1987.html#WaidnerP87</url>
<ee>https://doi.org/10.1007/978-3-642-45628-2_4</ee>
</inproceedings>
</r>
<coauthors n="156" nc="1">
<co c="0"><na f="a/Abrams:Carl_E=" pid="10/4091">Carl E. Abrams</na></co>
<co c="0"><na f="a/Accomazzi:Alberto" pid="66/31">Alberto Accomazzi</na></co>
<co c="0"><na f="a/Adam:Constantin" pid="29/3366">Constantin Adam</na></co>
<co c="0"><na f="a/Adelsbach:Andr=eacute=" pid="54/6683">Andr&#233; Adelsbach</na></co>
<co c="0"><na f="a/Ager:Tryg" pid="00/4406">Tryg Ager</na></co>
<co c="0"><na f="a/Alkassar:Ammar" pid="a/AmmarAlkassar">Ammar Alkassar</na></co>
<co c="0"><na f="a/Allen:Thomas" pid="97/1020">Thomas Allen</na></co>
<co c="0"><na f="a/Anerousis:Nikos" pid="a/NikosAnerousis">Nikos Anerousis</na></co>
<co c="0"><na f="a/Ansdell:Megan" pid="279/4427">Megan Ansdell</na></co>
<co c="0"><na f="a/Atluri:Vijayalakshmi" pid="a/VAtluri">Vijayalakshmi Atluri</na></co>
<co c="0"><na f="a/Auer:Christoph" pid="62/1211">Christoph Auer</na></co>
<co c="0"><na f="a/Ayachitula:Naga" pid="39/6032">Naga Ayachitula</na></co>
<co c="0"><na f="b/Backes_0001:Michael" pid="b/MichaelBackes1">Michael Backes 0001</na></co>
<co c="-1"><na f="b/Baric:Niko" pid="76/3635">Niko Baric</na></co>
<co c="0"><na f="b/Basin:David_A=" pid="b/DavidABasin">David A. Basin</na></co>
<co c="0"><na f="b/Baum=Waidner:Birgit" pid="03/4815">Birgit Baum-Waidner</na></co>
<co c="0"><na f="b/Benenson:Zinaida" pid="b/ZBenenson">Zinaida Benenson</na></co>
<co c="0" n="2"><na f="b/Berrospi:Cesar" pid="21/5775">Cesar Berrospi</na><na>Cesar Berrospi Ramis</na></co>
<co c="0"><na f="b/Bhattacharjee:Bishwaranjan" pid="19/2910">Bishwaranjan Bhattacharjee</na></co>
<co c="0"><na f="b/Blanco=Cuaresma:Sergi" pid="195/6255">Sergi Blanco-Cuaresma</na></co>
<co c="0"><na f="b/Bleumer:Gerrit" pid="81/3632">Gerrit Bleumer</na></co>
<co c="0"><na f="b/Boly:Jean=Paul" pid="45/802">Jean-Paul Boly</na></co>
<co c="0"><na f="b/Bosselaers:Antoon" pid="b/ABosselaers">Antoon Bosselaers</na></co>
<co c="0"><na f="b/Bugbee:Kaylin_M=" pid="171/0035">Kaylin M. Bugbee</na></co>
<co c="0"><na f="b/Bulut:Muhammed_Fatih" pid="31/7655">Muhammed Fatih Bulut</na></co>
<co c="0"><na f="c/Camenisch:Jan" pid="c/JanCamenisch">Jan Camenisch</na></co>
<co c="0"><na f="c/Canetti:Ran" pid="c/RanCanetti">Ran Canetti</na></co>
<co c="0"><na f="c/Chari:Suresh" pid="11/17">Suresh Chari</na></co>
<co c="0"><na f="c/Chaum:David" pid="c/DavidChaum">David Chaum</na></co>
<co c="0"><na f="c/Chicherin:Sergej" pid="95/9979">Sergej Chicherin</na></co>
<co c="0"><na f="c/Cope:Eric" pid="83/9356">Eric Cope</na></co>
<co c="0" n="2"><na f="c/Costes:Sylvain_V=" pid="40/11035">Sylvain V. Costes</na><na>Sylvain Costes</na></co>
<co c="0"><na f="c/Cramer:Ronald" pid="c/RonaldCramer">Ronald Cramer</na></co>
<co c="0"><na f="d/Damg=aring=rd:Ivan" pid="d/IvanDamgaard">Ivan Damg&#229;rd</na></co>
<co c="0"><na f="d/Dandala:Bharath" pid="140/3483">Bharath Dandala</na></co>
<co c="0"><na f="d/Dasgupta:Gargi" pid="40/6666">Gargi Dasgupta</na></co>
<co c="0"><na f="d/Deng_0004:Yu" pid="96/5406-4">Yu Deng 0004</na></co>
<co c="0"><na f="d/Devarakonda:Murthy_V=" pid="41/3022">Murthy V. Devarakonda</na></co>
<co c="0"><na f="d/Diao:Yixin" pid="48/6719">Yixin Diao</na></co>
<co c="0"><na f="d/Dolfi:Michele" pid="140/7566">Michele Dolfi</na></co>
<co c="0"><na f="e/El=Kurdi:Yousef" pid="65/235">Yousef El-Kurdi</na></co>
<co c="0"><na f="f/Fancher:Elizabeth" pid="377/7097">Elizabeth Fancher</na></co>
<co c="0"><na f="f/Fox:Dirk" pid="82/938">Dirk Fox</na></co>
<co c="0"><na f="f/Freiling:Felix_C=" pid="f/FCFreiling">Felix C. Freiling</na></co>
<co c="0"><na f="f/Fuller:Nicholas_C=" pid="138/8039">Nicholas C. Fuller</na></co>
<co c="0"><na f="g/Geraldy:Alexander" pid="51/6817">Alexander Geraldy</na></co>
<co c="0"><na f="g/Gerasimov:Irina" pid="92/5863">Irina Gerasimov</na></co>
<co c="0"><na f="g/Giblin:Christopher" pid="99/3573">Christopher Giblin</na></co>
<co c="0"><na f="g/Goldreich_0001:Oded" pid="g/OdedGoldreich">Oded Goldreich 0001</na></co>
<co c="0"><na f="g/Gopisetty:Sandeep" pid="72/5871">Sandeep Gopisetty</na></co>
<co c="0"><na f="g/Gr=egrave=zes:F=eacute=lix" pid="118/8262">F&#233;lix Gr&#232;zes</na></co>
<co c="0"><na f="g/Gro=szlig=_0001:Thomas" pid="g/ThomasGross">Thomas Gro&#223; 0001</na></co>
<co c="0"><na f="g/Gurung:Iksha" pid="229/5263">Iksha Gurung</na></co>
<co c="-1"><na f="g/Guth:Hans=J=uuml=rgen" pid="64/1671">Hans-J&#252;rgen Guth</na></co>
<co c="0"><na f="h/Halevi:Shai" pid="65/4781">Shai Halevi</na></co>
<co c="0"><na f="h/Heijst:Eug=egrave=ne_van" pid="67/5620">Eug&#232;ne van Heijst</na></co>
<co c="0"><na f="h/Hernandez:Milton" pid="51/11528">Milton Hernandez</na></co>
<co c="0"><na f="h/Hwang:Jinho" pid="68/425">Jinho Hwang</na></co>
<co c="0"><na f="i/Iannucci:Pietro" pid="220/2816">Pietro Iannucci</na></co>
<co c="0"><na f="i/Iyer:Ravishankar_K=" pid="i/RavishankarKIyer">Ravishankar K. Iyer</na></co>
<co c="0"><na f="j/Jacobi_0002:Christian" pid="j/CJacobi2">Christian Jacobi 0002</na></co>
<co c="0"><na f="j/Jerichow:Anja" pid="23/645">Anja Jerichow</na></co>
<co c="0"><na f="j/Joukov:Nikolai" pid="71/6060">Nikolai Joukov</na></co>
<co c="0"><na f="k/Kalbarczyk:Zbigniew_T=" pid="18/5985">Zbigniew T. Kalbarczyk</na></co>
<co c="0"><na f="k/Kalia:Anup_K=" pid="118/4007">Anup K. Kalia</na></co>
<co c="0" n="2"><na f="k/K=auml=nel:J=uuml=rg_von" pid="59/6734">J&#252;rg von K&#228;nel</na><na>Juerg von K&#228;nel</na></co>
<co c="0"><na f="k/Karjoth:G=uuml=nter" pid="k/GunterKarjoth">G&#252;nter Karjoth</na></co>
<co c="0"><na f="k/Klaedtke:Felix" pid="27/6182">Felix Klaedtke</na></co>
<co c="0"><na f="k/Kloeckner:Kristof" pid="36/5150">Kristof Kloeckner</na></co>
<co c="0"><na f="l/Lacoste:G=eacute=rard" pid="59/205">G&#233;rard Lacoste</na></co>
<co c="0"><na f="l/Lanfranchi:Giovanni" pid="84/41">Giovanni Lanfranchi</na></co>
<co c="0"><na f="l/Lanyi:David" pid="140/8257">David Lanyi</na></co>
<co c="0"><na f="l/Lee:Tsengdar_J=" pid="139/2378">Tsengdar J. Lee</na></co>
<co c="0"><na f="l/Lima:Rafael_Teixeira_de" pid="285/6689">Rafael Teixeira de Lima</na></co>
<co c="0"><na f="l/Little:Michael" pid="390/3632">Michael Little</na></co>
<co c="0"><na f="l/Little:Mike" pid="208/8708">Mike Little</na></co>
<co c="0" n="2"><na f="l/Liu_0045:Ying" pid="91/112-45">Ying Liu 0045</na><na>Alice Y. Liu</na></co>
<co c="0"><na f="l/Lockhart:Kelly_E=" pid="234/8946">Kelly E. Lockhart</na></co>
<co c="0"><na f="l/Ludwig:Heiko" pid="l/HeikoLudwig">Heiko Ludwig</na></co>
<co c="0"><na f="m/Mahamuni:A=" pid="220/2654">A. Mahamuni</na></co>
<co c="0"><na f="m/Mahindru:Ruchi" pid="95/6783">Ruchi Mahindru</na></co>
<co c="0"><na f="m/Maskey:Manil" pid="08/3449">Manil Maskey</na></co>
<co c="0"><na f="m/McAuliffe:Kevin_P=" pid="98/6006">Kevin P. McAuliffe</na></co>
<co c="0"><na f="m/McDaniel:Patrick_D=" pid="m/PatrickDrewMcDaniel">Patrick D. McDaniel</na></co>
<co c="0"><na f="m/McGranaghan:Ryan" pid="336/3676">Ryan McGranaghan</na></co>
<co c="0"><na f="m/Mehrabian:Armin" pid="192/1494">Armin Mehrabian</na></co>
<co c="0"><na f="m/Meng:Fan_Jing" pid="28/1444">Fan Jing Meng</na></co>
<co c="0"><na f="m/Michelsen:Rolf" pid="55/6369">Rolf Michelsen</na></co>
<co c="0"><na f="m/Mj=oslash=lsnes:Stig_Fr=" pid="67/4994">Stig Fr. Mj&#248;lsnes</na></co>
<co c="0"><na f="m/M=ouml=dersheim:Sebastian" pid="39/5285">Sebastian M&#246;dersheim</na></co>
<co c="0"><na f="m/Mukkavilli:S=_Karthik" pid="241/5086">S. Karthik Mukkavilli</na></co>
<co c="0"><na f="m/Muller:Frank" pid="77/7022">Frank Muller</na></co>
<co c="0"><na f="m/M=uuml=ller_0001:Jan" pid="48/2018">Jan M&#252;ller 0001</na></co>
<co c="0"><na f="m/M=uuml=ller_0002:Samuel" pid="19/697-2">Samuel M&#252;ller 0002</na></co>
<co c="0"><na f="m/Muraoka:Masayasu" pid="174/7321">Masayasu Muraoka</na></co>
<co c="0"><na f="m/Murray:James_W=" pid="85/6728">James W. Murray</na></co>
<co c="0"><na f="m/Murthy:Karin" pid="k/KarinKailing">Karin Murthy</na></co>
<co c="0"><na f="n/Nakamura:Taiga" pid="84/6715">Taiga Nakamura</na></co>
<co c="0"><na f="n/Nassar:Ahmed_S=" pid="321/9993">Ahmed S. Nassar</na></co>
<co c="0"><na f="n/Nezhad:Hamid_R=_Motahari" pid="36/4677">Hamid R. Motahari Nezhad</na></co>
<co c="0"><na f="o/Ossher:Joel" pid="95/4745">Joel Ossher</na></co>
<co c="0"><na f="p/Pantha:Nishan" pid="357/6442">Nishan Pantha</na></co>
<co c="0"><na f="p/Paradkar:Amit_M=" pid="23/502">Amit M. Paradkar</na></co>
<co c="0" n="2"><na f="p/Pedersen:Torben_P=" pid="02/2984">Torben P. Pedersen</na><na>Torben Pryds Pedersen</na></co>
<co c="0"><na f="p/Perpetua:Dennis_A=" pid="205/8814">Dennis A. Perpetua</na></co>
<co c="0"><na f="p/Pfitzmann:Andreas" pid="p/AndreasPfitzmann">Andreas Pfitzmann</na></co>
<co c="0"><na f="p/Pistoia:Marco" pid="p/MarcoPistoia">Marco Pistoia</na></co>
<co c="0"><na f="r/Ramachandran:Rahul" pid="91/5457">Rahul Ramachandran</na></co>
<co c="0"><na f="r/Ramasamy:HariGovind_V=" pid="98/5762">HariGovind V. Ramasamy</na></co>
<co c="0"><na f="r/Ramasubramanian:Muthukumaran" pid="253/6077">Muthukumaran Ramasubramanian</na></co>
<co c="0"><na f="r/Riordan:James" pid="16/3647">James Riordan</na></co>
<co c="0"><na f="r/Rivest:Ronald_L=" pid="r/RonaldLRivest">Ronald L. Rivest</na></co>
<co c="0"><na f="r/Rohner:Christian" pid="18/1549">Christian Rohner</na></co>
<co c="0"><na f="r/Rooij:Peter_de" pid="93/5889">Peter de Rooij</na></co>
<co c="0"><na f="r/Rosu_0001:Daniela" pid="40/578">Daniela Rosu 0001</na></co>
<co c="0"><na f="r/Roy_0001:Arnab" pid="88/4138-1">Arnab Roy 0001</na></co>
<co c="0"><na f="r/Ruschka=Taylor:Susanne" pid="75/5443">Susanne Ruschka-Taylor</na></co>
<co c="0"><na f="s/Sadeghi:Ahmad=Reza" pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</na></co>
<co c="0"><na f="s/Sanders:Lauren_M=" pid="269/0365">Lauren M. Sanders</na></co>
<co c="0"><na f="s/Sanders:William_H=" pid="s/WilliamHSanders">William H. Sanders</na></co>
<co c="0"><na f="s/Scedrov:Andre" pid="39/3354">Andre Scedrov</na></co>
<co c="0"><na f="s/Schoenmakers:Berry" pid="10/4165">Berry Schoenmakers</na></co>
<co c="0"><na f="s/Schunter:Matthias" pid="86/1764">Matthias Schunter</na></co>
<co c="0"><na f="s/Sharma:Aashish" pid="70/5324">Aashish Sharma</na></co>
<co c="0"><na f="s/Shwartz:Larisa" pid="32/6257">Larisa Shwartz</na></co>
<co c="0"><na f="s/Sprenger_0001:Christoph" pid="s/ChristophSprenger">Christoph Sprenger 0001</na></co>
<co c="0"><na f="s/Staar:Peter_W=_J=" pid="136/7966">Peter W. J. Staar</na></co>
<co c="0"><na f="s/Steiner_0001:Michael" pid="64/5301-1">Michael Steiner 0001</na></co>
<co c="0"><na f="s/St=uuml=ble:Christian" pid="76/3305">Christian St&#252;ble</na></co>
<co c="0"><na f="s/Su:Zhong" pid="87/1363">Zhong Su</na></co>
<co c="0"><na f="s/Surendra:Maheswaran" pid="49/889">Maheswaran Surendra</na></co>
<co c="0"><na f="t/Tao:Shu" pid="64/4055">Shu Tao</na></co>
<co c="0"><na f="t/Tarasov:Vasily" pid="73/5769">Vasily Tarasov</na></co>
<co c="0"><na f="t/Tateishi:Takaaki" pid="29/636">Takaaki Tateishi</na></co>
<co c="0"><na f="t/Trivedi:Aashka" pid="276/7796">Aashka Trivedi</na></co>
<co c="0"><na f="t/Tsao:Cheng=Lin" pid="01/5088">Cheng-Lin Tsao</na></co>
<co c="0"><na f="u/Udagawa:Takuma" pid="244/9945">Takuma Udagawa</na></co>
<co c="0"><na f="v/Vagenas:Panagiotis" pid="43/11411">Panagiotis Vagenas</na></co>
<co c="0"><na f="v/Vahidinia:Sanaz" pid="377/6350">Sanaz Vahidinia</na></co>
<co c="0"><na f="v/Vall=eacute=e:Luc" pid="80/2461">Luc Vall&#233;e</na></co>
<co c="0"><na f="v/Venema:Wietse_Z=" pid="170/8132">Wietse Z. Venema</na></co>
<co c="0"><na f="v/Vigan=ograve=_0001:Luca" pid="93/2273">Luca Vigan&#242; 0001</na></co>
<co c="0"><na f="v/Vogl:Norbert_G=" pid="81/763">Norbert G. Vogl</na></co>
<co c="0"><na f="v/V=ouml=lzer:Hagen" pid="10/3990">Hagen V&#246;lzer</na></co>
<co c="0"><na f="v/Vukovic:Maja" pid="78/3069">Maja Vukovic</na></co>
<co c="0"><na f="w/Waidner:Michael" pid="90/308">Michael Waidner</na></co>
<co c="0"><na f="w/Weber:Arnd" pid="15/1879">Arnd Weber</na></co>
<co c="0"><na f="w/Wertheimer:Davis" pid="239/5621">Davis Wertheimer</na></co>
<co c="0"><na f="w/Wiesmann:Dorothea" pid="72/3640">Dorothea Wiesmann</na></co>
<co c="0"><na f="w/Wozniak:S=" pid="124/6478">S. Wozniak</na></co>
<co c="0"><na f="w/Wright:Gary" pid="68/8331">Gary Wright</na></co>
<co c="0"><na f="x/Xiao_0005:Jin" pid="62/4290-5">Jin Xiao 0005</na></co>
<co c="0"><na f="z/Zeng:Sai" pid="25/4091">Sai Zeng</na></co>
<co c="0"><na f="z/Zhang:Rong" pid="13/5366">Rong Zhang</na></co>
<co c="0"><na f="z/Zhou:Xin" pid="05/3403">Xin Zhou</na></co>
<co c="0"><na f="z/Zonouz:Saman_A=" pid="89/4316">Saman A. Zonouz</na></co>
</coauthors>
</dblpperson>

