Birgit Pfitzmann
Affiliations:- IBM Research Zurich, Switzerland
- Saarland University, Department of Computer Science, Saarbrücken, Germany (former)
- University of Hildesheim, Germany (PhD 1995)
According to our database1,
Birgit Pfitzmann
authored at least 110 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing: EMNLP 2024, 2024
2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
2018
IBM J. Res. Dev., 2018
2011
Towards Automated Identification of Security Zone Classification in Enterprise Networks.
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, 2010
2009
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009
2008
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.
J. Comput. Secur., 2008
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008
2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Computer Security, 2006
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
Int. J. Inf. Sec., 2005
IACR Cryptol. ePrint Arch., 2005
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Proceedings of the Legal Knowledge and Information Systems, 2005
2004
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol.
IEEE J. Sel. Areas Commun., 2004
Inf. Secur. Tech. Rep., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Foundations of Security Analysis and Design III, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Security Protocols, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003
Proceedings of the Computer Security, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the Business Process Management, International Conference, 2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
Proceedings of the FME 2002: Formal Methods, 2002
Proceedings of the Computer Security, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IACR Cryptol. ePrint Arch., 2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Financial Cryptography, 2000
Proceedings of the CCS 2000, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
1998
IEEE J. Sel. Areas Commun., 1998
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
1997
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.
J. Cryptol., 1997
IACR Cryptol. ePrint Arch., 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997
1996
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Advances in Cryptology, 1996
Lecture Notes in Computer Science 1100, Springer, ISBN: 3-540-61517-2, 1996
1995
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Computer Security, 1994
1993
1992
Proceedings of the STACS 92, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the VIS'91, 1991
Proceedings of the VIS'91, 1991
Proceedings of the STACS 91, 1991
Proceedings of the Kommunikation in Verteilten Systemen, 1991
Proceedings of the Advances in Cryptology, 1991
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990
Proceedings of the Advances in Cryptology, 1990
1989
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Prax. Inf.verarb. Kommun., 1988
Datenschutz garantierende offene Kommunikationsnetze.
Inform. Spektrum, 1988
1987
Proceedings of the Fehlertolerierende Rechensysteme / Fault-Tolerant Computing Systems, 1987