Birgit Pfitzmann  Birgit Pfitzmann photo       

contact information

Lead Services Analytics
Zurich Research Laboratory, Saeumerstr. 4, 8803 Rueschlikon, Switzerland
  +41dash44dash724dash8608

links



[132]      Clea Zolotow, Florian Graf, Birgit Pfitzmann, Rebecca Huber, Marcel Schlatter, Claus Schrøder-Hansen, Anthony Hunt: Transition and Transformation into a Cloud Environment; in Handbook of Research on End-to-End Cloud Computing Architecture Design, IGI, 2016, pp. 254-278.

[131]      Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin McAuliffe, Ravishankar K. Iyer, William H. Sanders and Eric Cope: Managing Business Health in the Presence of Malicious Attacks; DSN Workshop on Recent Advances in Intrusion-Tolerant Systems (WRAITS 2011).

[130]      Birgit Pfitzmann, Nikolai Joukov: Migration to Multi-Image Cloud Templates; 8th IEEE Intern. Conf. on Service Computing (SCC 2011); July 2011, Washington, DC.

[129]      Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner and Wietse Venema: Composable Security Analysis of OS Services; 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), Malaga, June 2011.

[128]      Birgit Pfitzmann, Nikolai Joukov: Assets for IT Transformation Services; 20th Frontiers in Service Conference; June 2011, Columbus, OH.

[127]      Nikolai Joukov, Vasily Tarasov, Joel Ossher, Birgit Pfitzmann, Sergej Chicherin, Marco Pistoia, Takaaki Tateishi: Static Discovery and Remediation of Code-Embedded Resource Dependencies; 12th IFIP/IEEE Intern. Symp. on Integrated Network Management (IM'2011), May 2011, Dublin.

[126]      HariGovind Ramasamy, Cheng-Lin Tsao, Birgit Pfitzmann, Nikolai Joukov, James W. Murray: Towards Automated Identification of Security Zone Classification in Enterprise Networks; Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '11), Boston, March 2011, USENIX.

[125]      Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Murthy V. Devarakonda: Application-Storage Discovery; SYSTOR 2010, Haifa, May 2010

[124]      Nikolai Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy, Norbert G. Vogl, Murthy V. Devarakonda, Tryg Ager: ITBVM: IT Business Value Modeler; IEEE International Conference on Services Computing (SCC 2009), Bangalore, Sept. 2009.

[123]      David Basin, Felix Klaedtke, Samuel Müller, and Birgit Pfitzmann: Runtime Monitoring of Metric First-order Temporal Properties; Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2008), Dec. 2008.

[122]      Murthy V. Devarakonda, Nikolai Joukov, Kostas Magoutis, Birgit Pfitzmann, HariGovind V. Ramasamy, and Norbert G. Vogl: Using Automated Discovery for End-to-End Availability Assessment; DSN Industry Forum, June 2008, Anchorage, USA.

[121]      Michael Backes, Birgit Pfitzmann: Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR; International Journal on Information Security 7/1 (2008) 33-54

[120]      Michael Backes, Birgit Pfitzmann, Michael Waidner: The reactive simulatability (RSIM) framework for asynchronous systems; Information and Computation 205/12 (2007) 1685-1808.

[119]      Birgit Pfitzmann: Multi-layer Audit of Access Rights;

4th VLDB Workshop on Secure Data Management (SDM'07), LNCS 4721, Springer-Verlag, Berlin 2007, 18-32.

[118]      Jan Camenisch, Birgit Pfitzmann: Federated Identity Management; in: Milan Petkovic, Willem Jonker (eds.): Security, Privacy and Trust in Modern Data Management, Springer-Verlag, Data-Centric Systems and Applications, Berlin 2007, 213-238.

[117]      Michael Backes, Birgit Pfitzmann, Andre Scedrov: Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles; 20th IEEE Computer Security Foundations Symposium (CSF) 2007, 112-124.

[116]      Carl Abrams, Jürg von Känel, Samuel Müller, Birgit Pfitzmann, Susanne Ruschka-Taylor; Optimized Enterprise Risk Management; IBM Systems Journal 46/2 (2007) 219-234.

[115]      Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner:        Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks; 3rd Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), LNCS 4357, Springer-Verlag, Berlin 2006, 165-178.

[114]      Michael Backes, Birgit Pfitzmann, Michael Waidner: Formal Methods and Cryptography; FM 2006: Formal Methods, LNCS 4085, Springer-Verlag, Berlin 2006, 612-616.

[113]      Michael Backes, Birgit Pfitzmann, Michael Waidner: Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes; 11th European Symposium on Research in Computer Security (ESORICS 2006), LNCS 4189, Springer-Verlag, Berlin 2006, 404-423.

[112]      Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner: Cryptographically Sound Theorem Proving; 19th IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, Washington 2006, 153-166.

[111]      Samuel Müller, Birgit Pfitzmann: Effektives Compliance Management; DIGMA – Zeitschrift für Datenrecht und Informationssicherheit 6/1 (2006) 36-39.

[110]      Michael Backes, Birgit Pfitzmann: Cryptographic Key Secrecy of the Strengthened Yahalom Protocol via a Symbolic Security Proof; 21st IFIP TC-11 International Information Security Conference (SEC 2006), Springer-Verlag, New York 2006, 233-245. Preliminary version IBM Research Report RZ 3601 (#99611) 04/18/05.

[109]      Samuel Müller, Birgit Pfitzmann: Compliance Management basierend auf Gesetzesformalisierungen¾Das REALM-Projekt; 9. Internationales Rechtsinformatik Symposion (IRIS 2006), Richard Boorberg Verlag, Wien, 296-302.

[108]      Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò: Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario; Foundations of Software Science and Computation Structures (FOSSACS), LNCS 3921, Springer-Verlag, Berlin 2006, 428-445.

[107]      Christopher Giblin, Alice Y. Liu, Samuel Müller, Birgit Pfitzmann, Xin Zhou: Regulations Expressed As Logical Models (REALM); 18th Annual Conference on Legal Knowledge and Information Systems (JURIX 2005), IOS Press, Amsterdam, 37-48.

[106]      Michael Backes, Birgit Pfitzmann, Michael Waidner: Justifying a Dolev-Yao Model under Active Attacks; Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures, LNCS 3655, Springer-Verlag, 2005, 1-41.

[105]      Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving a WS-Federation Passive Requestor Profile with a Browser Model; 2005 ACM Workshop on Secure Web Services (SWS), ACM Press, 54-64.

[104]      Günter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Service-oriented Assurance – Comprehensive Security by Explicit Assurances; Quality of Protection: Security Measurements and Metrics (QoP 2005), Advances in Information Security, Springer-Verlag, 2006, 13-24.

[103]      Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Browser Model for Security Analysis of Browser-Based Protocols; 10th European Symposium on Research in Computer Security (ESORICS 2005), LNCS 3679, Springer-Verlag, Berlin 2005, 489-508.

[102]      Michael Backes, Birgit Pfitzmann: Limits of the Cryptographic Realization of Dolev-Yao-style XOR; 10th European Symposium on Research in Computer Security (ESORICS 2005), LNCS 3679, Springer-Verlag, Berlin 2005, 178-196.

[101]      Windsor W. Hsu, Shauchi Ong, Birgit Pfitzmann: Archiv mit Dokumentenversteinerung; DIGMA – Zeitschrift für Datenrecht und Informationssicherheit 5/2 (2005) 82-84 (invited).

[100]      Michael Backes, Birgit Pfitzmann: Relating symbolic and cryptographic secrecy; IEEE Transactions on Dependable and Secure Computing 2/2 (2005) 109-123.

[99]        Michael Backes, Birgit Pfitzmann: Relating symbolic and cryptographic secrecy; IEEE Symposium on Security and Privacy 2005, IEEE Computer Society Press, Washington 2004, 171-182.

[98]        Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes; International Journal of Information Security (IJIS) 4/4 (2005) 242-252.

[97]        Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication Within a Simulatable Cryptographic Library; International Journal of Information Security (IJIS) 4/3 (2005) 135-154.

[96]        Michael Backes, Birgit Pfitzmann: A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol; IEEE Journal on Selected Areas in Communication (JSAC) 22/10 (2004) 2075-2086.

[95]        Thomas Groß, Birgit Pfitzmann: Proving a WS-Federation Passive Requestor Profile; Preproceedings of ACM Secure Web Services Workshop, Washington, October 2004, 1-10 (proceedings to appear in ACM Press)

[94]        Michael Backes, Birgit Pfitzmann: Computational Probabilistic Non-Interference; International Journal of Information Security (IJIS) (Springer) 3/1 (2004) 42-60.

[93]        Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Liveness; Journal of Computer Security (JCS) 12/3-4 (2004) 589-618.

[92]        Michael Backes, Birgit Pfitzmann, Michael Waidner: Low-level Ideal Signatures and General Integrity Idealization; 7th Information Security Conference (ISC), LNCS 3225, Springer-Verlag, Berlin 2004, 39-51.

[91]        Michael Backes, Birgit Pfitzmann: Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library; 17th IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, Washington 2004, 204-218.

[90]        Birgit Pfitzmann: Privacy in Enterprise Identity Federation - Policies for Liberty 2 Single Signon; Elsevier Information Security Technical Report (ISTR) 9/1 (2004) 45-58.

[89]        Michael Backes, Birgit Pfitzmann, Michael Waidner: A General Composition Theorem for Secure Reactive Systems; 1st Theory of Cryptography Conference (TCC), LNCS 2951, Springer-Verlag, Berlin 2004, 336-354.

[88]        Michael Backes, Birgit Pfitzmann: A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol; Foundations of Software Technology and Theoretical Computer Science (FSTTCS 03), LNCS 2914, Springer-Verlag, Berlin 2003, 1-12.

[87]        Birgit Pfitzmann, Michael Waidner: Analysis of Liberty Single Signon with Enabled Clients; IEEE Internet Computing 7(6) 2003, 38-44.

[86]        Birgit Pfitzmann: Sound Idealizations of Cryptography for Tool-Supported Proofs (Position statement for panel discussion); 1st ACM Workshop on Formal Methods in Security Engineering (FMSE 2003), ACM Press, New York 2003, 64-65.

[85]        Michael Backes, Birgit Pfitzmann, Michael Waidner: A Composable Cryptographic Library with Nested Operations; 10th ACM Conference on Computer and Communications Security (CCS), ACM Press, New York 2003, 220-230.

[84]        Michael Backes, Birgit Pfitzmann, Michael Waidner: Symmetric Authentication Within a Simulatable Cryptographic Library; 8th European Symposium on Research in Computer Security (ESORICS 2003), LNCS 2808, Springer-Verlag, Berlin 2003, 271-290.

[83]        Michael Backes, Birgit Pfitzmann, Matthias Schunter: A Toolkit for Managing Enterprise Privacy Policies;  8th European Symposium on Research in Computer Security (ESORICS 2003), LNCS 2808, Springer-Verlag, Berlin 2003, 162-180 (Won Award for Outstanding Research in Privacy Enhancing Technologies 2004, PET Advisory Board, sponsored by Microsoft).

[82]        Michael Backes, Birgit Pfitzmann, Michael Waidner: Reactively Secure Signature Schemes; 6th Information Security Conference (ISC), LNCS 2851, Springer-Verlag, Berlin 2003, 84-95.

[81]        Michael Backes, Birgit Pfitzmann, Michael Waidner: Security in Business Process Engineering; International Conference on Business Process Management (BPM ’03), LNCS 2678, Springer-Verlag, Berlin 2003, 168-183.

[80]        Michael Backes, Birgit Pfitzmann: Intransitive Non-Interference for Cryptographic Purposes; IEEE Symposium on Security and Privacy 2003, IEEE Computer Society Press, Washington 2003, 140-152.

[79]        Birgit Pfitzmann, Michael Waidner: Federated Identity-Management Protocols — Where User Authentication Protocols May Go; 11th International Workshop on Security Protocols (Cambridge 2003), LNCS 3364, Springer-Verlag, Berlin 2005, 153-174.

[78]        Birgit Pfitzmann: Privacy in Enterprise Identity Federation ‑ Policies for Liberty Single Signon; 3rd International Workshop on Privacy Enhancing Technologies (PET 2003), LNCS 2760, Springer-Verlag, Berlin 2004, 189-204.

[77]        Birgit Pfitzmann, Michael Waidner: Privacy in Browser-Based Attribute Exchange; ACM Workshop on Privacy in the Electronic Society (WPES) 2002, ACM Press 2003, 52-62.

[76]        Michael Backes, Birgit Pfitzmann: Computational Probabilistic Non-Interference; 7th European Symposium on Research in Computer Security (ESORICS 2002), LNCS 2502, Springer-Verlag, Berlin 2002, 1-23.

[75]        Michael Backes, Christian Jacobi, Birgit Pfitzmann: Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation; Formal Methods Europe (FME, part of FLoC), LNCS 2391 2391, Springer-Verlag, Berlin 2002, 310-329

[74]        Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner: Polynomial Fairness and Liveness; IEEE Computer Security Foundations Workshop (CSFW), IEEE Computer Society Press, Washington 2002, 160-174.

[73]        D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. Veríssimo, M. Waidner: MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications); Supplement of the 2001 Int. Conf. on Dependable Systems and Networks, Göteborg, 2001, D32-D35, 2001.

[72]        Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, Arnd Weber: Die PERSEUS System-Architektur; Verläßliche IT-Systeme, GI-Fachtagung VIS '01, Vieweg, Braunschweig 2001, 1-17.

[71]        Birgit Pfitzmann, Michael Waidner: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission; IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Washington 2001, 184-200.

[70]        Birgit Pfitzmann (ed.): Proceedings Eurocrypt 2001, LNCS 2045, Springer-Verlag, Berlin 2001.

[69]        Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Optimized Self-Synchronizing Mode of Operation; 8th International Workshop on Fast Software Encryption (FSE), LNCS, Springer-Verlag, Berlin 2001, 78-91.

[68]        Birgit Pfitzmann, Ahmad-Reza Sadeghi: Anonymous Fingerprinting with Direct Non-Repudiation; Asiacrypt 2000, LNCS 1976, Springer-Verlag, Berlin 2000, 401-414.

[67]        Birgit Pfitzmann, Michael Waidner: Composition and Integrity Preservation of Secure Reactive Systems; 7th ACM Conference on Computer and Communications Security (CCS), ACM Press, New York 2000, 245-254.

[66]        Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Cryptographic Security of Reactive Systems; DERA/RHUL Workshop on Secure Architectures and Information Flow, Electronic Notes in Theoretical Computer Science (ENTCS), March 2000, http://www.elsevier.nl/locate/entcs/volume32.html.

[66]        Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner (ed.) SEMPER - Secure Electronic Marketplace for Europe; LNCS 1854, Springer-Verlag, Berlin 2000, Part I also online <http://www.semper.org/info/#final-report>.

              Also coauthor of Part I: Birgit Baum-Waidner, Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner, Arnd Weber: The Vision of SEMPER; 3-37

              and Ch. 6: N. Asokan, Birgit Baum-Waidner, Torben Pedersen, Birgit Pfitzmann, Matthias Schunter, Michael Steiner, Michael Waidner: Architecture; 45-63.

[65]        Birgit Pfitzmann, Ahmad-Reza Sadeghi: Self-Escrowed Cash Against User Blackmailing; 4th International Conference on Financial Cryptography (FC 2000), LNCS 1962, Springer-Verlag, Berlin 2001, 42-52.

[64]        Jürgen Guth, Birgit Pfitzmann: Error- and Collusion-Secure Fingerprinting for Digital Data; 3rd International Information Hiding Workshop (IHW '99), LNCS 1768, Springer-Verlag, Berlin 2000, 134-145.

[63]        André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi: Proving Ownership of Digital Content; 3rd International Information Hiding Workshop (IHW '99), LNCS 1768, Springer-Verlag, Berlin 2000, 117-133.

[62]        Birgit Pfitzmann, Ahmad-Reza Sadeghi: Selbst-Deanonymisierbarkeit gegen Benutzererpressung in digitalen Münzsystemen; Verläßliche IT-Systeme, GI-Fachtagung VIS '99, DuD Fachbeiträge, Vieweg, Braunschweig 1999, 35-48.

[61]        Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trustworthy User Devices; in: Günter Müller, Kai Rannenberg (ed.): Multilateral Security in Communications, Vol. 3: Technology, Infrastructure, Economy; Addison-Wesley, München 1999, 137-156.

[60]        Birgit Pfitzmann, Ahmad-Reza Sadeghi: Coin-Based Anonymous Fingerprinting; Eurocrypt '99, LNCS 1592, Springer-Verlag, Berlin 1999, 150-164.

[59]        Birgit Pfitzmann, Matthias Schunter: Die SEMPER Sicherheitsarchitektur für elektronischen Handel im Internet; Magazin Forschung 1/1999, Universität des Saarlandes 1999, 22-26.

[58]        Birgit Pfitzmann, Michael Waidner: Digital Signatures; to appear in Encyclopedia of Distributed Computing (ed.: Joseph Urban, Partha Dasgupta), Kluwer Academic Publishers, should have been 1998 (invited, http://cactus.eas.asu.edu/EDC/).

[57]        Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest: Self-Delegation with Controlled Propagation – or – What If You Lose Your Laptop; Crypto '98, LNCS 1462, Springer-Verlag, Berlin 1998, 153-168.

[56]        Ivan Damgård, Birgit Pfitzmann: Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP; 25th International Colloquium on Automata, Languages and Programming (ICALP), LNCS 1443, Springer-Verlag, Berlin 1998, 772-783.

[55]        Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Optimal Efficiency of Optimistic Contract Signing; 17th Symposium on Principles of Distributed Computing (PODC), ACM, New York 1998, 113-122.

[54]        Birgit Pfitzmann, Michael Waidner: Kopierschutz durch asymmetrisches Fingerprinting; Datenschutz und Datensicherheit DuD 22/5 (1998) 258-264 (invited).

[53]        Ivan B. Damgård, Torben P. Pedersen, Birgit Pfitzmann: Statistical Secrecy and Multi-Bit Commitments; IEEE Transactions on Information Theory 44/3 (1998) 1143-1151.

[52]        Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol; IEEE Journal on Selected Areas in Communications 16/4 (1998) 495-509.

[51]        Birgit Pfitzmann, Michael Waidner: How to Break “Fraud-Detectable Key-Escrow”; Operating Systems Review 32/1 (1998) 23-28.

[50]        Birgit Pfitzmann, Michael Waidner: Kopierschutz durch asymmetrische Schlüssel­kenn­zeichnung mit Signeten; Verläßliche IT-Systeme, GI-Fachtagung VIS '97, Vieweg, Braunschweig 1997, 17-32.

[49]        Birgit Pfitzmann, Michael Waidner: Strong Loss Tolerance of Electronic Coin Systems; ACM Transactions on Computer Systems 15/2 (1997) 194-213.

[48]        Niko Baric, Birgit Pfitzmann: Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees; Eurocrypt ’97, LNCS 1233, Springer-Verlag, Berlin 1997, 480-494.

[47]        Birgit Pfitzmann, Michael Waidner: Anonymous Fingerprinting; Eurocrypt ’97, LNCS 1233, Springer-Verlag, Berlin 1997, 88-102.

[46]        Ivan B. Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures; Journal of Cryptology 10/3 (1997) 163-194.

[45]        Torben P. Pedersen, Birgit Pfitzmann: Fail-stop Signatures; SIAM Journal on Computing 26/2 (1997) 291-330.

[44]        Birgit Pfitzmann, Michael Waidner: Asymmetric Fingerprinting for Larger Collusions; 4th ACM Conference on Computer and Communications Security (CCS), 151-160.

[43]        Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trusting Mobile User Devices and Security Modules; IEEE Computer 30/2 (1997) 61-68.

[42]        Birgit Pfitzmann: Digital Signature Schemes — General Framework and Fail-Stop Signatures; LNCS 1100, Springer-Verlag, August 1996, 396 pages.

[41]        Birgit Pfitzmann (collected by): Information Hiding Terminology — Results of an informal plenary meeting and additional proposals; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 347-350.

[40]        Birgit Pfitzmann: Trials of Traced Traitors; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 49-64.

[39]        Birgit Pfitzmann, Matthias Schunter: Asymmetric Fingerprinting; Eurocrypt ’96, LNCS 1070, Springer-Verlag, Berlin 1996, 84-95.

[38]        Birgit Pfitzmann: Sorting Out Signature Schemes; CWI Quarterly 8/2 (1995) 147-172 (invited; appeared March 1996).

[37]        Hannes Federrath, Anja Jerichow, Andreas Pfitzmann, Birgit Pfitzmann: Mehrseitig sichere Schlüsselerzeugung; Proc. Arbeitskonferenz Trust Center 95, DuD Fachbeiträge, Vieweg, Wiesbaden 1995, 117-131.

[36]        Birgit Pfitzmann, Matthias Schunter, Michael Waidner: How to Break Another “Provably Secure” Payment System; Eurocrypt ’95, LNCS 921, Springer-Verlag, Berlin 1995, 121-132.

[35]        Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Vertrauens­würdige portable Benutzerendgeräte und Sicherheitsmodule; VIS 95 (GI-Fachtagung Verläßliche Informations­systeme, Rostock), Vieweg, Braunschweig 1995, 329-350.

[34]        Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmaker, Luc Vallée, Michael Waidner: Digital Payment Systems in the ESPRIT Project CAFE; Securicom 94, Paris, 1.-3.6.1994, 35-45.

              Revision in: Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner: The ESPRIT Project CAFE — High Security Digital Payment Systems; 3rd European Symposium on Research in Computer Security (ESORICS 94), LNCS 875, Springer-Verlag, Berlin 1994, 217-230.

[33]        Birgit Pfitzmann: Breaking an Efficient Anonymous Channel; Eurocrypt ’94, LNCS 950, Springer-Verlag, Berlin 1995, 332-340.

[32]        Ivan B. Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures; Crypto ’93, LNCS 773, Springer-Verlag, Berlin 1994, 250-265.

[31]        Birgit Pfitzmann: Sorting Out Signature Schemes; 1st ACM Conference on Computer and Communications Security (CCS), 3.-5.11.1993, Fairfax, acm press 1993, 74-85.

[30]        Eugène van Heijst, Torben Pedersen, Birgit Pfitzmann: New Constructions of Fail-Stop Signatures and Lower Bounds; Crypto ’92, LNCS 740, Springer-Verlag, Berlin 1993, 15-30.

[29]        Birgit Pfitzmann, Michael Waidner: Attacks on protocols for server-aided RSA computation; Eurocrypt ’92, LNCS 658, Springer-Verlag, Berlin 1993, 153-162.

[28]        Andreas Ort, Ralf Aßmann, Gerrit Bleumer, Manfred Böttger, Dirk Fox, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Schutz in verteilten Systemen durch Kryptologie – Ein Praktikum im Informatik-Hauptstudium; Datenschutz und Datensicherung DuD 16/11 (1992) 571-579.

[27]        Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement for any Number of Faulty Processors; STACS ’92, LNCS 577, Springer-Verlag, Berlin 1992, 339-350.

[26]        Birgit Pfitzmann, Michael Waidner: How to Break and Repair a “Provably Secure” Untraceable Payment System; Crypto ’91, LNCS 576, Springer-Verlag, Berlin 1992, 338-350.

[25]        David Chaum, Eugène van Heijst, Birgit Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer; Crypto ’91, LNCS 576, Springer-Verlag, Berlin 1992, 470-484.

[24]        Birgit Pfitzmann: Fail-stop Signatures; Principles and Applications; invited talk, Proc. Compsec ’91, 8th world conference on computer security, audit and control, Elsevier, Oxford 1991, 125-134.

[23]        Birgit Pfitzmann: Neu und sicher: Digitale Fail-stop-Signaturen; KES – Zeitschrift für Kommunikations- und EDV-Sicherheit 7/5 (1991) 321-326.

[22]        Birgit Pfitzmann, Michael Waidner: Fail-stop Signatures and their Application; SECURICOM 91; 9th Worldwide Congress on Computer and Communications Security and Protection, 20. - 22. March 1991, Paris La Défense, 145-160.

[21]        Dirk Fox, Birgit Pfitzmann: Effiziente Software-Implementierung des GMR-Signatur­systems; Proc. GI-Fachtagung Verläßliche Informationssysteme (VIS’91), March 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 329-345.

[20]        Birgit Pfitzmann, Michael Waidner: Unbedingte Unbeobachtbarkeit mit kryptographischer Robustheit; Proc. GI-Fachtagung Verläßliche Informationssysteme (VIS’91), March 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 302-320.

[19]        Birgit Pfitzmann, Michael Waidner: Fail-stop-Signaturen und ihre Anwendung; Proc. GI-Fachtagung Verläßliche Informationssysteme (VIS’91), March 1991, Darmstadt, Informatik-Fachberichte 271, Springer-Verlag, Heidelberg 1991, 289-301.

[18]        Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommuni­kationsnetze; Teletech NRW, an initiative of Nordrhein-Westfalen; March 1991, paper for Talk 2, presentation at CeBIT’91.

              Revisions in: Dokumentation des Fachseminars “Programm-Manipulationen in Netzen”, SYSTEMS 91, München; Deutsche Informatik-Akademie, Bonn, October 1991

              and: Vernetzte Systeme und Sicherheit der Informationsverarbeitung, Deutsche Informatik Akademie, Material for a tutorial at the GI-Jahrestagung 1992, Karlsruhe, 75-120

              and: Dokumentation Fachseminar Sicherheit in Netzen, Oct. 21, 1993, SYSTEMS 93, München, 75-121.

[17]        Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes – Untraceable Communication with very small Bandwidth Overhead; Proc. Kommunikation in verteilten Systemen, Feb. 1991, Mannheim, Informatik-Fachberichte 267, Springer-Verlag, Heidel­berg 1991, 451-463.

              Slightly extended in: Information Security, Proc. IFIP/Sec’91, May 1991, Brighton, D. T. Lindsay, W. L. Price (eds.), North-Holland, Amsterdam 1991, 245-258.

[16]        Birgit Baum-Waidner, Birgit Pfitzmann, Michael Waidner: Unconditional Byzantine Agreement with Good Majority, STACS ’91, LNCS 480, Springer-Verlag, Heidelberg 1991, 285-295.

[15]        Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner: A Remark on a Signature Scheme where Forgery can be Proved; Eurocrypt ’90, LNCS 473, Springer-Verlag, Berlin 1991, 441-445.

[14]        Andreas Pfitzmann, Birgit Pfitzmann: Technical Aspects of Data Protection in Health Care Informatics; invited talk, AIM EUROFORUM, Dec. 13-15, 1990, Sevilla, Proceedings published by the Commission of the EU, DG XIII, 119-132.

              Revision in: Advances in Medical Informatics, J. Noothoven van Goor and J. P. Christensen (Eds.), IOS Press, Amsterdam 1992, 368-386

[13]        Birgit Pfitzmann, Michael Waidner, Andreas Pfitzmann: Rechtssicherheit trotz Anonymität in offenen digitalen Systemen; Datenschutz und Datensicherung DuD 14/5-6 (1990) 243-253, 305-315.

[12]        Birgit Pfitzmann, Andreas Pfitzmann: How to Break the Direct RSA-Implementation of MIXes; Eurocrypt ’89, LNCS 434, Springer-Verlag, Berlin 1990, 373-381.

[11]        Andreas Pfitzmann, Birgit Pfitzmann: Security in Medical Networks; Handling Health Data in the Future - AIM Working Conference on Data Protection and Confidentiality in Health Informatics (Commission of the European Communities); March 19-21, 1990, Brussels.

[10]        Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmer­anschluß; Datenschutz und Datensicherung DuD /12 (1989) 605-622.

[9]          Michael Waidner, Birgit Pfitzmann: Loss-tolerant Electronic Wallet; Proceedings Smart Card 2000, Amsterdam, Oct. 4-6, 1989.

              Extended version: Loss-Tolerance for Electronic Wallets; FTCS 20, June 26-28, 1990, Newcastle upon Tyne (UK), 140-147.

[8]          Birgit Pfitzmann, Andreas Pfitzmann: Anmerkungen zu “Matthias Leclerc: Schlüssel­manage­ment durch Teilschlüssel, DuD 12/88”; Datenschutz und Datensicherung DuD /3 (1989) 116.

[7]          Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Garantierter Datenschutz für zwei 64-kbit/s-Duplexkanäle über den (2•64 + 16)-kbit/s-Teilnehmeranschluß durch Telefon-MIXe; Volume 3 of 4th SAVE-Tagung, April 19-21, 1989, Köln, 1417-1447.

[6]          Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Weitere Aspekte fernmelde­tech­ni­scher Alternativen zum ISDN; PIK, Praxis der Informationsverarbeitung und Kommuni­ka­tion 11/1 (1988) 5-7.

[5]          Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Datenschutz garantierende offene Kommuni­kationsnetze; Informatik-Spektrum 11/3 (1988) 118-142.

[4]          Michael Waidner, Birgit Pfitzmann: Verlusttolerante elektronische Brieftaschen; 3rd Inter­national Conference on Fault-Tolerant Computing-Systems, IFB 147, Springer-Verlag, Berlin 1987, 36-50;

              Revision in: Datenschutz und Datensicherung DuD /10 (1987) 487-497.

[3]          Michael Waidner, Birgit Pfitzmann, Andreas Pfitzmann: Über die Notwendigkeit genormter kryptographischer Verfahren; Datenschutz und Datensicherung DuD /6 (1987) 293-299.

[2]          Birgit Pfitzmann, Michael Waidner, Andreas Pfitzmann: Rechtssicherheit trotz Anonymität in offenen digitalen Systemen; Computer und Recht 3/10,11,12 (1987) 712-717, 796-803, 898-904.

[1]          Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Technischer Datenschutz in dienste­integrierenden Digitalnetzen - Warum und wie?; Datenschutz und Datensicherung DuD /3 (1986) 178-191.