-
1
-
-
0031238209
-
The state of the art in electronic payment systems
-
N. Asokan, Phillipe A. Janson, Michael Steiner, Michael Waidner: The State of the Art in Electronic Payment Systems; Computer 30/9 (1997) 28-35.
-
(1997)
Computer
, vol.30
, Issue.9
, pp. 28-35
-
-
Asokan, N.1
Janson, P.A.2
Steiner, M.3
Waidner, M.4
-
2
-
-
84957873374
-
The steganographic file system
-
Information Hiding, 2nd Workshop, Portland, Oregon, Springer, Heidelberg
-
Ross Andersen, Roger Needham, Adi Shamir: The Steganographic File System; Information Hiding, 2nd Workshop, Portland, Oregon, LNCS 1525, Springer, Heidelberg 1998, 73-82.
-
(1998)
LNCS
, vol.1525
, pp. 73-82
-
-
Andersen, R.1
Needham, R.2
Shamir, A.3
-
3
-
-
0030646696
-
Optimistic protocols for fair exchange
-
Zürich, April
-
N. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange; 4th ACM Conference on Computer and Communications Security, Zürich, April 1997, 6-17.
-
(1997)
4th ACM Conference on Computer and Communications Security
, pp. 6-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
4
-
-
33746612195
-
Ein service zur haftungsverteilung für kompromittierte digitale signaturen
-
DuD Fachbeiträge, Vieweg, Braunschweig
-
Birgit Baum-Waidner: Ein Service zur Haftungsverteilung für kompromittierte digitale Signaturen; Verläßliche IT-Systeme, GI-Fachtagung VIS '99, DuD Fachbeiträge, Vieweg, Braunschweig 1999, 203-223.
-
(1999)
Verläßliche IT-Systeme, GI-Fachtagung VIS '99
, pp. 203-223
-
-
Baum-Waidner, B.1
-
5
-
-
0025568003
-
Value exchange systems enabling security and unobservability
-
Holger Bürk, Andreas Pfitzmann: Value Exchange Systems Enabling Security and Unobservability; Computers &: Security 9/8 (1990) 715-721.
-
(1990)
Computers & Security
, vol.9
, Issue.8
, pp. 715-721
-
-
Bürk, H.1
Pfitzmann, A.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
David Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms; Communications of the ACM 24/2 (1981) 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28/10 (1985) 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
8
-
-
0005389958
-
Privacy protected payments - Unconditional payer and/or payee untraceability
-
SMART CARD 2000: The Future of IC Cards, Laxenburg (Austria), 1987, North-Holland, Amsterdam
-
David Chaum: Privacy Protected Payments - Unconditional Payer and/or Payee Untraceability; SMART CARD 2000: The Future of IC Cards, Proc. of the IFIP WG 11.6 Intern. Conference; Laxenburg (Austria), 1987, North-Holland, Amsterdam 1989, 69-93.
-
(1989)
Proc. of the IFIP WG 11.6 Intern. Conference
, pp. 69-93
-
-
Chaum, D.1
-
9
-
-
85032463527
-
Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms
-
Auscrypt '90, Springer, Berlin
-
David Chaum: Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms; Auscrypt '90, LNCS 453, Springer, Berlin 1990, 246-264.
-
(1990)
LNCS
, vol.453
, pp. 246-264
-
-
Chaum, D.1
-
11
-
-
0029237418
-
Preserving privacy in a network of mobile computers
-
IEEE Computer Society Press, Los Alamitos
-
David A. Cooper, Kenneth P. Birman: Preserving Privacy in a Network of Mobile Computers; 1995 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos 1995, 26-38.
-
(1995)
1995 IEEE Symposium on Research in Security and Privacy
, pp. 26-38
-
-
Cooper, D.A.1
Birman, K.P.2
-
13
-
-
84941152835
-
-
Department of Defense Standard: Department of Defense Trusted Computer System Evaluation Criteria; December 1985, DOD 5200.28-STD, Supersedes CSC-STD-001-83, dtd 15 Aug 83, Library No. 8225,711
-
Department of Defense Standard: Department of Defense Trusted Computer System Evaluation Criteria; December 1985, DOD 5200.28-STD, Supersedes CSC-STD-001-83, dtd 15 Aug 83, Library No. 8225,711.
-
-
-
-
14
-
-
84955605258
-
Mixes in mobile communication systems: Location management with privacy
-
Information Hiding, 1st Workshop, Cambridge, UK, Springer, Heidelberg
-
Hannes Federrath, Anja Jerichow, Andreas Pfitzmann: Mixes in mobile communication systems: Location management with privacy; Information Hiding, 1st Workshop, Cambridge, UK, LNCS 1174, Springer, Heidelberg 1996, 321-135.
-
(1996)
LNCS
, vol.1174
, pp. 321-1135
-
-
Federrath, H.1
Jerichow, A.2
Pfitzmann, A.3
-
15
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
David Goldschlag, Michael Reed, Paul Syverson: Onion Routing for Anonymous and Private Internet Connections; Communications of the ACM 42/2 (1999) 39-41.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
16
-
-
84911338989
-
ITSEC: Information technology security evaluation criteria
-
(28 June) Office for Official Publications of the European Communities, Luxembourg 1991 (ISBN 92-826-3004-8)
-
European Communities - Commission: ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991) Office for Official Publications of the European Communities, Luxembourg 1991 (ISBN 92-826-3004-8).
-
(1991)
Provisional Harmonised Criteria, Version 1.2
-
-
-
17
-
-
0032074980
-
Real-time mixes: A bandwidth-efficient anonymity protocol
-
May
-
Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol; IEEE Journal on Selected Areas in Communications 16/4 (May 1998) 495-509.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 495-509
-
-
Jerichow, A.1
Müller, J.2
Pfitzmann, A.3
Pfitzmann, B.4
Waidner, M.5
-
18
-
-
33745883087
-
-
Andreas Pfitzmann, Marit Hansen: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology; http://dud.inf.tu-dresden.de/Anon_Terminology.shtml.
-
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
19
-
-
33746598786
-
Biometrie - Wie einsetzen und wie nicht? Zum umgang mit sicherheitsproblemen von biometrie und sicherheits- und datenschutzproblemen durch biometrie
-
Dec.
-
Andreas Pfitzmann: Biometrie - wie einsetzen und wie nicht? Zum Umgang mit Sicherheitsproblemen von Biometrie und Sicherheits- und Datenschutzproblemen durch Biometrie; digma, Zeitschrift für Datenrecht und Informationssicherheit, Schulthess 5/4 (Dec. 2005) 154-157.
-
(2005)
Digma, Zeitschrift für Datenrecht und Informationssicherheit, Schulthess
, vol.5
, Issue.4
, pp. 154-157
-
-
Pfitzmann, A.1
-
20
-
-
0023331864
-
Networks without user observability
-
Andreas Pfitzmann, Michael Waidrier: Networks without user observability; Computers & Security 6/2 (1987) 158-166.
-
(1987)
Computers & Security
, vol.6
, Issue.2
, pp. 158-166
-
-
Pfitzmann, A.1
Waidrier, M.2
-
21
-
-
0037844764
-
Trust-worthy user devices
-
G. Müller, K. Rannenberg (Eds.), Addison-Wesley
-
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Trust-worthy User Devices; in: G. Müller, K. Rannenberg (Eds.): Multilateral Security in Communications, Addison-Wesley 1999, 137-156.
-
(1999)
Multilateral Security in Communications
, pp. 137-156
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
22
-
-
84944184851
-
A Java-based distributed platform for multilateral security
-
IFIP/GI Working Conference "Trends in Electronic Commerce", Hamburg, Springer, Heidelberg
-
Andreas Pfitzmann, Alexander Schul, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner: A Java-based distributed platform for multilateral security; IFIP/GI Working Conference "Trends in Electronic Commerce", Hamburg, LNCS 1402, Springer, Heidelberg 1998, 52-64.
-
(1998)
LNCS
, vol.1402
, pp. 52-64
-
-
Pfitzmann, A.1
Schul, A.2
Westfeld, A.3
Wicke, G.4
Wolf, G.5
Zöllner, J.6
-
23
-
-
0001777423
-
Anonymous web transactions with crowds
-
Michael K. Reiter, Aviel D. Rubin: Anonymous Web Transactions with Crowds; Communications of the ACM 42/2 (1999) 32-38.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-38
-
-
Reiter, M.K.1
Rubin, A.D.2
-
24
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
Victor L. Voydock, Stephen T. Kent: Security Mechanisms in High-Level Network Protocols; ACM Computing Surveys 15/2 (1983) 135-171.
-
(1983)
ACM Computing Surveys
, vol.15
, Issue.2
, pp. 135-171
-
-
Voydock, V.L.1
Kent, S.T.2
-
25
-
-
0033717446
-
Properties of protection goals and their integration into a user interface
-
Gritta Wolf, Andreas Pfitzmann: Properties of protection goals and their integration into a user interface; Computer Networks 32 (2000) 685-699.
-
(2000)
Computer Networks
, vol.32
, pp. 685-699
-
-
Wolf, G.1
Pfitzmann, A.2
|