Birgit Pfitzmann

Affiliations:
  • IBM Research Zurich, Switzerland
  • Saarland University, Department of Computer Science, Saarbrücken, Germany (former)
  • University of Hildesheim, Germany (PhD 1995)


According to our database1, Birgit Pfitzmann authored at least 108 papers between 1987 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
DocLayNet: A Large Human-Annotated Dataset for Document-Layout Analysis.
CoRR, 2022

DocLayNet: A Large Human-Annotated Dataset for Document-Layout Segmentation.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

2018
Building a cognitive platform for the managed IT services lifecycle.
IBM J. Res. Dev., 2018

2011
Towards Automated Identification of Security Zone Classification in Enterprise Networks.
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011

Static discovery and remediation of code-embedded resource dependencies.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Managing business health in the presence of malicious attacks.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Migration to Multi-image Cloud Templates.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Composable Security Analysis of OS Services.
IACR Cryptol. ePrint Arch., 2010

Application-storage discovery.
Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, 2010

2009
ITBVM: IT Business Value Modeler.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

2008
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.
J. Comput. Secur., 2008

Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
Int. J. Inf. Sec., 2008

Runtime Monitoring of Metric First-order Temporal Properties.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008

2007
Optimized enterprise risk management.
IBM Syst. J., 2007

Multi-layer Audit of Access Rights.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Federated Identity Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Service-oriented Assurance - Comprehensive Security by Explicit Assurances.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Cryptographically Sound Theorem Proving.
IACR Cryptol. ePrint Arch., 2006

Reactively Simulatable Certified Mail.
IACR Cryptol. ePrint Arch., 2006

Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
IACR Cryptol. ePrint Arch., 2006

Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
IACR Cryptol. ePrint Arch., 2006

On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Formal Methods and Cryptography.
Proceedings of the FM 2006: Formal Methods, 2006

Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Proceedings of the Computer Security, 2006

Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Reactively secure signature schemes.
Int. J. Inf. Sec., 2005

Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library.
Int. J. Inf. Sec., 2005

Browser Model for Security Analysis of Browser-Based Protocols.
IACR Cryptol. ePrint Arch., 2005

Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
IACR Cryptol. ePrint Arch., 2005

Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
IACR Cryptol. ePrint Arch., 2005

Proving a WS-federation passive requestor profile with a browser model.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Regulations Expressed As Logical Models (REALM).
Proceedings of the Legal Knowledge and Information Systems, 2005

2004
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol.
IEEE J. Sel. Areas Commun., 2004

Polynomial liveness.
J. Comput. Secur., 2004

Privacy in enterprise identity federation - policies for Liberty 2 single sign on.
Inf. Secur. Tech. Rep., 2004

Computational probabilistic noninterference.
Int. J. Inf. Sec., 2004

The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
IACR Cryptol. ePrint Arch., 2004

Relating Symbolic and Cryptographic Secrecy.
IACR Cryptol. ePrint Arch., 2004

Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
IACR Cryptol. ePrint Arch., 2004

A General Composition Theorem for Secure Reactive Systems.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Proving a WS-Federation passive requestor profile.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

Low-Level Ideal Signatures and General Integrity Idealization.
Proceedings of the Information Security, 7th International Conference, 2004

Justifying a Dolev-Yao Model Under Active Attacks.
Proceedings of the Foundations of Security Analysis and Design III, 2004

2003
Analysis of Liberty Single-Sign-on with Enabled Clients.
IEEE Internet Comput., 2003

Symmetric Authentication Within a Simulatable Cryptographic Library.
IACR Cryptol. ePrint Arch., 2003

A Universally Composable Cryptographic Library.
IACR Cryptol. ePrint Arch., 2003

Federated Identity-Management Protocols.
Proceedings of the Security Protocols, 2003

Federated Identity-Management Protocols (Discussion).
Proceedings of the Security Protocols, 2003

Intransitive Non-Interference for Cryptographic Purpose.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

A Toolkit for Managing Enterprise Privacy Policies.
Proceedings of the Computer Security, 2003

A composable cryptographic library with nested operations.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Security in Business Process Engineering.
Proceedings of the Business Process Management, International Conference, 2003

2002
Privacy in browser-based attribute exchange.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
Proceedings of the FME 2002: Formal Methods, 2002

Computational Probabilistic Non-interference.
Proceedings of the Computer Security, 2002

Polynomial Fairness and Liveness.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Die PERSEUS Systemarchitektur.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Optimized Self-Synchronizing Mode of Operation.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IACR Cryptol. ePrint Arch., 2000

Anonymous Fingerprinting with Direct Non-Repudiation.
IACR Cryptol. ePrint Arch., 2000

Self-Escrowed Cash against User Blackmailing.
Proceedings of the Financial Cryptography, 2000

Composition and integrity preservation of secure reactive systems.
Proceedings of the CCS 2000, 2000

1999
Cryptographic Security of Reactive Systems.
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999

Error- and Collusion-Secure Fingerprinting for Digital Data.
Proceedings of the Information Hiding, Third International Workshop, 1999

Proving Ownership of Digital Content.
Proceedings of the Information Hiding, Third International Workshop, 1999

Coin-Based Anonymous Fingerprinting.
Proceedings of the Advances in Cryptology, 1999

1998
Statistical Secrecy and Multibit Commitments.
IEEE Trans. Inf. Theory, 1998

How to Break Fraud-Detectable Key Recovery.
ACM SIGOPS Oper. Syst. Rev., 1998

Real-time mixes: a bandwidth-efficient anonymity protocol.
IEEE J. Sel. Areas Commun., 1998

Optimal Efficiency of Optimistic Contract Signing.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

1997
Strong Loss Tolerance of Electronic Coin Systems.
ACM Trans. Comput. Syst., 1997

Fail-Stop Signatures.
SIAM J. Comput., 1997

On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.
J. Cryptol., 1997

Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
IACR Cryptol. ePrint Arch., 1997

Trusting Mobile User Devices and Security Modules.
Computer, 1997

Anonymous Fingerprinting.
Proceedings of the Advances in Cryptology, 1997

Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees.
Proceedings of the Advances in Cryptology, 1997

Asymmetric Fingerprinting for Larger Collusions.
Proceedings of the CCS '97, 1997

Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997

1996
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

Trials of Traced Traitors.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

Asymmetric Fingerprinting (Extended Abstract).
Proceedings of the Advances in Cryptology, 1996

Digital Signature Schemes, General Framework and Fail-Stop Signatures
Lecture Notes in Computer Science 1100, Springer, ISBN: 3-540-61517-2, 1996

1995
Fail-stop signature schemes.
PhD thesis, 1995

Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995

How to Break Another Provably Secure Payment System.
Proceedings of the Advances in Cryptology, 1995

1994
Breaking Efficient Anonymous Channel.
Proceedings of the Advances in Cryptology, 1994


1993
Sorting Out Signature Schemes.
Proceedings of the CCS '93, 1993

1992
Unconditional Byzantine Agreement for any Number of Faulty Processors.
Proceedings of the STACS 92, 1992

Attacks on Protocols for Server-Aided RSA Computation.
Proceedings of the Advances in Cryptology, 1992

New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

1991
Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit.
Proceedings of the VIS'91, 1991

Fail-stop-Signaturen und ihre Anwendung.
Proceedings of the VIS'91, 1991

Effiziente Software-Implementierung des GMR-Signatursystems.
Proceedings of the VIS'91, 1991

Unconditional Byzantine Agreement with Good Majority.
Proceedings of the STACS 91, 1991

ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead.
Proceedings of the Kommunikation in Verteilten Systemen, 1991

How To Break and Repair A "Provably Secure" Untraceable Payment System.
Proceedings of the Advances in Cryptology, 1991

Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
Proceedings of the Advances in Cryptology, 1991

1990
Loss-tolerance for electronic wallets.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

A Remark on a Signature Scheme Where Forgery Can Be Proved.
Proceedings of the Advances in Cryptology, 1990

1989
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).
Proceedings of the Advances in Cryptology, 1989

How to Break the Direct RSA-Implementation of Mixes.
Proceedings of the Advances in Cryptology, 1989

1988
Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN.
Prax. Inf.verarb. Kommun., 1988

Datenschutz garantierende offene Kommunikationsnetze.
Inform. Spektrum, 1988

1987
Verlusttolerante elektronische Brieftaschen.
Proceedings of the Fehlertolerierende Rechensysteme / Fault-Tolerant Computing Systems, 1987


  Loading...