default search action
BibTeX records: Michael Steiner 0001
@article{DBLP:journals/iacr/KimWKVSC24, author = {Sejun Kim and Wen Wang and Duhyeong Kim and Adish Vartak and Michael Steiner and Rosario Cammarota}, title = {Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2024}, url = {https://eprint.iacr.org/2024/707}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimWKVSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wahc/AgrawalABCCSGKK23, author = {Rashmi Agrawal and Jung Ho Ahn and Flavio Bergamaschi and Ro Cammarota and Jung Hee Cheon and Fillipe D. M. de Souza and Huijing Gong and Minsik Kang and Duhyeong Kim and Jongmin Kim and Hubert de Lassus and Jai Hyun Park and Michael Steiner and Wen Wang}, editor = {Michael Brenner and Anamaria Costache and Kurt Rohloff}, title = {High-precision {RNS-CKKS} on fixed but smaller word-size architectures: theory and application}, booktitle = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023}, pages = {23--34}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605759.3625257}, doi = {10.1145/3605759.3625257}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wahc/AgrawalABCCSGKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalABCCSGKKKLPSW23, author = {Rashmi Agrawal and Jung Ho Ahn and Flavio Bergamaschi and Ro Cammarota and Jung Hee Cheon and Fillipe D. M. de Souza and Huijing Gong and Minsik Kang and Duhyeong Kim and Jongmin Kim and Hubert de Lassus and Jai Hyun Park and Michael Steiner and Wen Wang}, title = {High-precision {RNS-CKKS} on fixed but smaller word-size architectures: theory and application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1462}, year = {2023}, url = {https://eprint.iacr.org/2023/1462}, timestamp = {Sat, 03 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalABCCSGKKKLPSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/SangS0Z0VK22, author = {Fan Sang and Ming{-}Wei Shih and Sangho Lee and Xiaokuan Zhang and Michael Steiner and Mona Vij and Taesoo Kim}, editor = {Jiri Schindler and Noa Zilberman}, title = {{PRIDWEN:} Universally Hardening {SGX} Programs via Load-Time Synthesis}, booktitle = {Proceedings of the 2022 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2022, Carlsbad, CA, USA, July 11-13, 2022}, pages = {455--472}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/atc22/presentation/sang}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/SangS0Z0VK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlderAKPS19, author = {Fritz Alder and N. Asokan and Arseny Kurnikov and Andrew Paverd and Michael Steiner}, editor = {Radu Sion and Charalampos Papamanthou}, title = {S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel {SGX}}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019}, pages = {185--199}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338466.3358916}, doi = {10.1145/3338466.3358916}, timestamp = {Thu, 12 Oct 2023 12:32:09 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlderAKPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NunesERST19, author = {Ivan De Oliveira Nunes and Karim Eldefrawy and Norrathep Rattanavipanon and Michael Steiner and Gene Tsudik}, editor = {Nadia Heninger and Patrick Traynor}, title = {{VRASED:} {A} Verified Hardware/Software Co-Design for Remote Attestation}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1429--1446}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/de-oliveira-nunes}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/NunesERST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-05863, author = {Thomas Knauth and Michael Steiner and Somnath Chakrabarti and Li Lei and Cedric Xing and Mona Vij}, title = {Integrating Remote Attestation with Transport Layer Security}, journal = {CoRR}, volume = {abs/1801.05863}, year = {2018}, url = {http://arxiv.org/abs/1801.05863}, eprinttype = {arXiv}, eprint = {1801.05863}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-05863.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-05686, author = {Mic Bowman and Andrea Miele and Michael Steiner and Bruno Vavala}, title = {Private Data Objects: an Overview}, journal = {CoRR}, volume = {abs/1807.05686}, year = {2018}, url = {http://arxiv.org/abs/1807.05686}, eprinttype = {arXiv}, eprint = {1807.05686}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-05686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-06080, author = {Fritz Alder and N. Asokan and Arseny Kurnikov and Andrew Paverd and Michael Steiner}, title = {S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel {SGX}}, journal = {CoRR}, volume = {abs/1810.06080}, year = {2018}, url = {http://arxiv.org/abs/1810.06080}, eprinttype = {arXiv}, eprint = {1810.06080}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-06080.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-00175, author = {Karim Eldefrawy and Ivan Oliveira Nunes and Norrathep Rattanavipanon and Michael Steiner and Gene Tsudik}, title = {Formally Verified Hardware/Software Co-Design for Remote Attestation}, journal = {CoRR}, volume = {abs/1811.00175}, year = {2018}, url = {http://arxiv.org/abs/1811.00175}, eprinttype = {arXiv}, eprint = {1811.00175}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-00175.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FaberJKNRS15, author = {Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel{-}Catalin Rosu and Michael Steiner}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Rich Queries on Encrypted Data: Beyond Exact Matches}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {123--145}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_7}, doi = {10.1007/978-3-319-24177-7\_7}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FaberJKNRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaberJKNRS15, author = {Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Rich Queries on Encrypted Data: Beyond Exact Matches}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {927}, year = {2015}, url = {http://eprint.iacr.org/2015/927}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaberJKNRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CashJJJKRS14, author = {David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CashJJJKRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashJJJKRS14, author = {David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2014}, url = {http://eprint.iacr.org/2014/853}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashJJJKRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JareckiJKRS13, author = {Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Outsourced symmetric private information retrieval}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {875--888}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516730}, doi = {10.1145/2508859.2516730}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JareckiJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CashJJKRS13, author = {David Cash and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, editor = {Ran Canetti and Juan A. Garay}, title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {353--373}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_20}, doi = {10.1007/978-3-642-40041-4\_20}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CashJJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashJJKRS13, author = {David Cash and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2013}, url = {http://eprint.iacr.org/2013/169}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashJJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiJKRS13, author = {Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Outsourced Symmetric Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2013}, url = {http://eprint.iacr.org/2013/720}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanettiCHPRSV11, author = {Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Z. Venema}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Composable Security Analysis of {OS} Services}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {431--448}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_25}, doi = {10.1007/978-3-642-21554-4\_25}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CanettiCHPRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ChariDKPRRRSST10, author = {Suresh Chari and Vincenzo V. Diluoffo and Paul A. Karger and Elaine R. Palmer and Tal Rabin and Josyula R. Rao and Pankaj Rohatgi and Helmut Scherzer and Michael Steiner and David C. Toll}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Designing a Side Channel Resistant Random Number Generator}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {49--64}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_5}, doi = {10.1007/978-3-642-12510-2\_5}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/ChariDKPRRRSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCHPRSV10, author = {Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Z. Venema}, title = {Composable Security Analysis of {OS} Services}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2010}, url = {http://eprint.iacr.org/2010/213}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCHPRSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GajekSSX09, author = {Sebastian Gajek and J{\"{o}}rg Schwenk and Michael Steiner and Chen Xuan}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Risks of the CardSpace Protocol}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {278--293}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_23}, doi = {10.1007/978-3-642-04474-8\_23}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/GajekSSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KeukelaereBSCY08, author = {Frederik De Keukelaere and Sumeer Bhola and Michael Steiner and Suresh Chari and Sachiko Yoshihama}, editor = {Jinpeng Huai and Robin Chen and Hsiao{-}Wuen Hon and Yunhao Liu and Wei{-}Ying Ma and Andrew Tomkins and Xiaodong Zhang}, title = {SMash: secure component model for cross-domain mashups on unmodified browsers}, booktitle = {Proceedings of the 17th International Conference on World Wide Web, {WWW} 2008, Beijing, China, April 21-25, 2008}, pages = {535--544}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1367497.1367570}, doi = {10.1145/1367497.1367570}, timestamp = {Tue, 20 Dec 2022 21:20:03 +0100}, biburl = {https://dblp.org/rec/conf/www/KeukelaereBSCY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiHS06, author = {Ran Canetti and Shai Halevi and Michael Steiner}, editor = {Cynthia Dwork}, title = {Mitigating Dictionary Attacks on Password-Protected Local Storage}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {160--179}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_10}, doi = {10.1007/11818175\_10}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiHS06, author = {Ran Canetti and Shai Halevi and Michael Steiner}, title = {Mitigating Dictionary Attacks on Password-Protected Local Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2006}, url = {http://eprint.iacr.org/2006/276}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenESSS05, author = {Liqun Chen and Matthias Enzmann and Ahmad{-}Reza Sadeghi and Markus Schneider and Michael Steiner}, editor = {Andrew S. Patrick and Moti Yung}, title = {A Privacy-Protecting Coupon System}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {93--108}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_12}, doi = {10.1007/11507840\_12}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChenESSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiHS05, author = {Ran Canetti and Shai Halevi and Michael Steiner}, editor = {Joe Kilian}, title = {Hardness Amplification of Weakly Verifiable Puzzles}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {17--33}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_2}, doi = {10.1007/978-3-540-30576-7\_2}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiHS04, author = {Ran Canetti and Shai Halevi and Michael Steiner}, title = {Hardness amplification of weakly verifiable puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2004}, url = {http://eprint.iacr.org/2004/329}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtm/Steiner03, author = {Michael Steiner}, title = {Regional knowledge networks as evolving social technologies}, journal = {Int. J. Technol. Manag.}, volume = {26}, number = {2/3/4}, pages = {326--345}, year = {2003}, url = {https://doi.org/10.1504/IJTM.2003.003385}, doi = {10.1504/IJTM.2003.003385}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtm/Steiner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Steiner2004a, author = {Michael Steiner}, title = {Secure group key agreement}, school = {Saarland University, Saarbr{\"{u}}cken, Germany}, year = {2002}, url = {http://scidok.sulb.uni-saarland.de/volltexte/2004/239/index.html}, urn = {urn:nbn:de:bsz:291-scidok-2397}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Steiner2004a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesPSW02, author = {Michael Backes and Birgit Pfitzmann and Michael Steiner and Michael Waidner}, title = {Polynomial Fairness and Liveness}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {160--174}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSFW.2002.1021814}, doi = {10.1109/CSFW.2002.1021814}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BackesPSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SadeghiS02, author = {Ahmad{-}Reza Sadeghi and Michael Steiner}, title = {Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2002}, url = {http://eprint.iacr.org/2002/126}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SadeghiS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LinSSH01, author = {Chun{-}Li Lin and Hung{-}Min Sun and Michael Steiner and Tzonelih Hwang}, title = {Three-party encrypted key exchange without server public-keys}, journal = {{IEEE} Commun. Lett.}, volume = {5}, number = {12}, pages = {497--499}, year = {2001}, url = {https://doi.org/10.1109/4234.974498}, doi = {10.1109/4234.974498}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LinSSH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SteinerBEW01, author = {Michael Steiner and Peter Buhler and Thomas Eirich and Michael Waidner}, title = {Secure password-based cipher suite for {TLS}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {2}, pages = {134--157}, year = {2001}, url = {https://doi.org/10.1145/501963.501965}, doi = {10.1145/501963.501965}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SteinerBEW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SadeghiS01, author = {Ahmad{-}Reza Sadeghi and Michael Steiner}, editor = {Birgit Pfitzmann}, title = {Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {244--261}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_16}, doi = {10.1007/3-540-44987-6\_16}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SadeghiS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/AsokanJSW00, author = {N. Asokan and Philippe A. Janson and Michael Steiner and Michael Waidner}, title = {State of the art in electronic payment systems}, journal = {Adv. Comput.}, volume = {53}, pages = {425--449}, year = {2000}, url = {https://doi.org/10.1016/S0065-2458(00)80009-1}, doi = {10.1016/S0065-2458(00)80009-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/AsokanJSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/BellareGHHKSTHW00, author = {Mihir Bellare and Juan A. Garay and Ralf C. Hauser and Amir Herzberg and Hugo Krawczyk and Michael Steiner and Gene Tsudik and Els Van Herreweghen and Michael Waidner}, title = {Design, implementation, and deployment of the iKP secure electronic payment system}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {18}, number = {4}, pages = {611--627}, year = {2000}, url = {https://doi.org/10.1109/49.839936}, doi = {10.1109/49.839936}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/BellareGHHKSTHW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/AtenieseST00, author = {Giuseppe Ateniese and Michael Steiner and Gene Tsudik}, title = {New multiparty authentication services and key agreement protocols}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {18}, number = {4}, pages = {628--639}, year = {2000}, url = {https://doi.org/10.1109/49.839937}, doi = {10.1109/49.839937}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/AtenieseST00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SteinerTW00, author = {Michael Steiner and Gene Tsudik and Michael Waidner}, title = {Key Agreement in Dynamic Peer Groups}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {11}, number = {8}, pages = {769--780}, year = {2000}, url = {https://doi.org/10.1109/71.877936}, doi = {10.1109/71.877936}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SteinerTW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BuhlerEWS00, author = {Peter Buhler and Thomas Eirich and Michael Waidner and Michael Steiner}, title = {Secure Password-Based Cipher Suite for {TLS}}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2000, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2000}, url = {https://www.ndss-symposium.org/ndss2000/secure-password-based-cipher-suite-tls-paper/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BuhlerEWS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LacostePSW00, editor = {G{\'{e}}rard Lacoste and Birgit Pfitzmann and Michael Steiner and Michael Waidner}, title = {{SEMPER} - Secure Electronic Marketplace for Europe}, series = {Lecture Notes in Computer Science}, volume = {1854}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/b75215}, doi = {10.1007/B75215}, isbn = {3-540-67825-5}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LacostePSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AsokanDSW99, author = {N. Asokan and Herv{\'{e}} Debar and Michael Steiner and Michael Waidner}, title = {Authenticating public terminals}, journal = {Comput. Networks}, volume = {31}, number = {8}, pages = {861--870}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(98)00020-6}, doi = {10.1016/S1389-1286(98)00020-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AsokanDSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmsj/PeiroASW98, author = {Jos{\'{e}} L. Abad Peiro and N. Asokan and Michael Steiner and Michael Waidner}, title = {Designing a Generic Payment Service}, journal = {{IBM} Syst. J.}, volume = {37}, number = {1}, pages = {72--88}, year = {1998}, url = {https://doi.org/10.1147/sj.371.0072}, doi = {10.1147/SJ.371.0072}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ibmsj/PeiroASW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseST98, author = {Giuseppe Ateniese and Michael Steiner and Gene Tsudik}, editor = {Li Gong and Michael K. Reiter}, title = {Authenticated Group Key Agreement and Friends}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {17--26}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288097}, doi = {10.1145/288090.288097}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/SteinerTW98, author = {Michael Steiner and Gene Tsudik and Michael Waidner}, title = {{CLIQUES:} {A} New Approach to Group Key Agreement}, booktitle = {Proceedings of the 18th International Conference on Distributed Computing Systems, Amsterdam, The Netherlands, May 26-29, 1998}, pages = {380--387}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICDCS.1998.679745}, doi = {10.1109/ICDCS.1998.679745}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/SteinerTW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uwec/AsokanHS98, author = {N. Asokan and Els Van Herreweghen and Michael Steiner}, editor = {Bennet S. Yee}, title = {Towards a Framework for Handling Disputes in Payment Systems}, booktitle = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31 - September 3, 1998}, publisher = {{USENIX} Association}, year = {1998}, url = {https://www.usenix.org/conference/3rd-usenix-workshop-electronic-commerce/towards-framework-handling-disputes-payment}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uwec/AsokanHS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AsokanJSW97, author = {N. Asokan and Philippe A. Janson and Michael Steiner and Michael Waidner}, title = {The State of the Art in Electronic Payment Systems}, journal = {Computer}, volume = {30}, number = {9}, pages = {28--35}, year = {1997}, url = {https://doi.org/10.1109/2.612244}, doi = {10.1109/2.612244}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AsokanJSW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SteinerTW96, author = {Michael Steiner and Gene Tsudik and Michael Waidner}, editor = {Li Gong and Jacques Stearn}, title = {Diffie-Hellman Key Distribution Extended to Group Communication}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {31--37}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238182}, doi = {10.1145/238168.238182}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SteinerTW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/SteinerTW95, author = {Michael Steiner and Gene Tsudik and Michael Waidner}, title = {Refinement and Extension of Encrypted Key Exchange}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {29}, number = {3}, pages = {22--30}, year = {1995}, url = {https://doi.org/10.1145/206826.206834}, doi = {10.1145/206826.206834}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/SteinerTW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uwec/BellareHSTWHG95, author = {Mihir Bellare and Amir Herzberg and Michael Steiner and Gene Tsudik and Michael Waidner and Ralf C. Hauser and Juan A. Garay}, title = {iKP - {A} Family of Secure Electronic Payment Protocols}, booktitle = {First {USENIX} Workshop on Electronic Commerce, New York, New York, USA, July 11-12, 1995}, publisher = {{USENIX} Association}, year = {1995}, url = {https://www.usenix.org/conference/first-usenix-workshop-electronic-commerce/ikp-family-secure-electronic-payment-protocols}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uwec/BellareHSTWHG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uwec/HauserS95, author = {Ralf C. Hauser and Michael Steiner}, title = {Generic Extensions of {WWW} Browsers}, booktitle = {First {USENIX} Workshop on Electronic Commerce, New York, New York, USA, July 11-12, 1995}, publisher = {{USENIX} Association}, year = {1995}, url = {https://www.usenix.org/conference/first-usenix-workshop-electronic-commerce/generic-extensions-www-browsers}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uwec/HauserS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.