BibTeX records: Michael Steiner 0001

download as .bib file

@article{DBLP:journals/iacr/KimWKVSC24,
  author       = {Sejun Kim and
                  Wen Wang and
                  Duhyeong Kim and
                  Adish Vartak and
                  Michael Steiner and
                  Rosario Cammarota},
  title        = {Towards a Polynomial Instruction Based Compiler for Fully Homomorphic
                  Encryption Accelerators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/707},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimWKVSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wahc/AgrawalABCCSGKK23,
  author       = {Rashmi Agrawal and
                  Jung Ho Ahn and
                  Flavio Bergamaschi and
                  Ro Cammarota and
                  Jung Hee Cheon and
                  Fillipe D. M. de Souza and
                  Huijing Gong and
                  Minsik Kang and
                  Duhyeong Kim and
                  Jongmin Kim and
                  Hubert de Lassus and
                  Jai Hyun Park and
                  Michael Steiner and
                  Wen Wang},
  editor       = {Michael Brenner and
                  Anamaria Costache and
                  Kurt Rohloff},
  title        = {High-precision {RNS-CKKS} on fixed but smaller word-size architectures:
                  theory and application},
  booktitle    = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605759.3625257},
  doi          = {10.1145/3605759.3625257},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wahc/AgrawalABCCSGKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalABCCSGKKKLPSW23,
  author       = {Rashmi Agrawal and
                  Jung Ho Ahn and
                  Flavio Bergamaschi and
                  Ro Cammarota and
                  Jung Hee Cheon and
                  Fillipe D. M. de Souza and
                  Huijing Gong and
                  Minsik Kang and
                  Duhyeong Kim and
                  Jongmin Kim and
                  Hubert de Lassus and
                  Jai Hyun Park and
                  Michael Steiner and
                  Wen Wang},
  title        = {High-precision {RNS-CKKS} on fixed but smaller word-size architectures:
                  theory and application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1462},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1462},
  timestamp    = {Sat, 03 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalABCCSGKKKLPSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/SangS0Z0VK22,
  author       = {Fan Sang and
                  Ming{-}Wei Shih and
                  Sangho Lee and
                  Xiaokuan Zhang and
                  Michael Steiner and
                  Mona Vij and
                  Taesoo Kim},
  editor       = {Jiri Schindler and
                  Noa Zilberman},
  title        = {{PRIDWEN:} Universally Hardening {SGX} Programs via Load-Time Synthesis},
  booktitle    = {Proceedings of the 2022 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2022, Carlsbad, CA, USA, July 11-13, 2022},
  pages        = {455--472},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/atc22/presentation/sang},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/SangS0Z0VK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlderAKPS19,
  author       = {Fritz Alder and
                  N. Asokan and
                  Arseny Kurnikov and
                  Andrew Paverd and
                  Michael Steiner},
  editor       = {Radu Sion and
                  Charalampos Papamanthou},
  title        = {S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel
                  {SGX}},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing
                  Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019},
  pages        = {185--199},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338466.3358916},
  doi          = {10.1145/3338466.3358916},
  timestamp    = {Thu, 12 Oct 2023 12:32:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AlderAKPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NunesERST19,
  author       = {Ivan De Oliveira Nunes and
                  Karim Eldefrawy and
                  Norrathep Rattanavipanon and
                  Michael Steiner and
                  Gene Tsudik},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{VRASED:} {A} Verified Hardware/Software Co-Design for Remote Attestation},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1429--1446},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/de-oliveira-nunes},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NunesERST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-05863,
  author       = {Thomas Knauth and
                  Michael Steiner and
                  Somnath Chakrabarti and
                  Li Lei and
                  Cedric Xing and
                  Mona Vij},
  title        = {Integrating Remote Attestation with Transport Layer Security},
  journal      = {CoRR},
  volume       = {abs/1801.05863},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.05863},
  eprinttype    = {arXiv},
  eprint       = {1801.05863},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-05863.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-05686,
  author       = {Mic Bowman and
                  Andrea Miele and
                  Michael Steiner and
                  Bruno Vavala},
  title        = {Private Data Objects: an Overview},
  journal      = {CoRR},
  volume       = {abs/1807.05686},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.05686},
  eprinttype    = {arXiv},
  eprint       = {1807.05686},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-05686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-06080,
  author       = {Fritz Alder and
                  N. Asokan and
                  Arseny Kurnikov and
                  Andrew Paverd and
                  Michael Steiner},
  title        = {S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel
                  {SGX}},
  journal      = {CoRR},
  volume       = {abs/1810.06080},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.06080},
  eprinttype    = {arXiv},
  eprint       = {1810.06080},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-06080.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-00175,
  author       = {Karim Eldefrawy and
                  Ivan Oliveira Nunes and
                  Norrathep Rattanavipanon and
                  Michael Steiner and
                  Gene Tsudik},
  title        = {Formally Verified Hardware/Software Co-Design for Remote Attestation},
  journal      = {CoRR},
  volume       = {abs/1811.00175},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.00175},
  eprinttype    = {arXiv},
  eprint       = {1811.00175},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-00175.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FaberJKNRS15,
  author       = {Sky Faber and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Quan Nguyen and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Rich Queries on Encrypted Data: Beyond Exact Matches},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {123--145},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_7},
  doi          = {10.1007/978-3-319-24177-7\_7},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FaberJKNRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaberJKNRS15,
  author       = {Sky Faber and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Quan Nguyen and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Rich Queries on Encrypted Data: Beyond Exact Matches},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {927},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/927},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaberJKNRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CashJJJKRS14,
  author       = {David Cash and
                  Joseph Jaeger and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures
                  and Implementation},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CashJJJKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashJJJKRS14,
  author       = {David Cash and
                  Joseph Jaeger and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures
                  and Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/853},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashJJJKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JareckiJKRS13,
  author       = {Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Outsourced symmetric private information retrieval},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {875--888},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516730},
  doi          = {10.1145/2508859.2516730},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JareckiJKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CashJJKRS13,
  author       = {David Cash and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean
                  Queries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {353--373},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_20},
  doi          = {10.1007/978-3-642-40041-4\_20},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CashJJKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashJJKRS13,
  author       = {David Cash and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean
                  Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/169},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashJJKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiJKRS13,
  author       = {Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Outsourced Symmetric Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/720},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiJKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CanettiCHPRSV11,
  author       = {Ran Canetti and
                  Suresh Chari and
                  Shai Halevi and
                  Birgit Pfitzmann and
                  Arnab Roy and
                  Michael Steiner and
                  Wietse Z. Venema},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Composable Security Analysis of {OS} Services},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {431--448},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_25},
  doi          = {10.1007/978-3-642-21554-4\_25},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CanettiCHPRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ChariDKPRRRSST10,
  author       = {Suresh Chari and
                  Vincenzo V. Diluoffo and
                  Paul A. Karger and
                  Elaine R. Palmer and
                  Tal Rabin and
                  Josyula R. Rao and
                  Pankaj Rohatgi and
                  Helmut Scherzer and
                  Michael Steiner and
                  David C. Toll},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Designing a Side Channel Resistant Random Number Generator},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_5},
  doi          = {10.1007/978-3-642-12510-2\_5},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/ChariDKPRRRSST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCHPRSV10,
  author       = {Ran Canetti and
                  Suresh Chari and
                  Shai Halevi and
                  Birgit Pfitzmann and
                  Arnab Roy and
                  Michael Steiner and
                  Wietse Z. Venema},
  title        = {Composable Security Analysis of {OS} Services},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/213},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCHPRSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GajekSSX09,
  author       = {Sebastian Gajek and
                  J{\"{o}}rg Schwenk and
                  Michael Steiner and
                  Chen Xuan},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Risks of the CardSpace Protocol},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {278--293},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_23},
  doi          = {10.1007/978-3-642-04474-8\_23},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/GajekSSX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KeukelaereBSCY08,
  author       = {Frederik De Keukelaere and
                  Sumeer Bhola and
                  Michael Steiner and
                  Suresh Chari and
                  Sachiko Yoshihama},
  editor       = {Jinpeng Huai and
                  Robin Chen and
                  Hsiao{-}Wuen Hon and
                  Yunhao Liu and
                  Wei{-}Ying Ma and
                  Andrew Tomkins and
                  Xiaodong Zhang},
  title        = {SMash: secure component model for cross-domain mashups on unmodified
                  browsers},
  booktitle    = {Proceedings of the 17th International Conference on World Wide Web,
                  {WWW} 2008, Beijing, China, April 21-25, 2008},
  pages        = {535--544},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1367497.1367570},
  doi          = {10.1145/1367497.1367570},
  timestamp    = {Tue, 20 Dec 2022 21:20:03 +0100},
  biburl       = {https://dblp.org/rec/conf/www/KeukelaereBSCY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiHS06,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Michael Steiner},
  editor       = {Cynthia Dwork},
  title        = {Mitigating Dictionary Attacks on Password-Protected Local Storage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_10},
  doi          = {10.1007/11818175\_10},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHS06,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Michael Steiner},
  title        = {Mitigating Dictionary Attacks on Password-Protected Local Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/276},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenESSS05,
  author       = {Liqun Chen and
                  Matthias Enzmann and
                  Ahmad{-}Reza Sadeghi and
                  Markus Schneider and
                  Michael Steiner},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {A Privacy-Protecting Coupon System},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {93--108},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_12},
  doi          = {10.1007/11507840\_12},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChenESSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiHS05,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Michael Steiner},
  editor       = {Joe Kilian},
  title        = {Hardness Amplification of Weakly Verifiable Puzzles},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_2},
  doi          = {10.1007/978-3-540-30576-7\_2},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHS04,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Michael Steiner},
  title        = {Hardness amplification of weakly verifiable puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/329},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtm/Steiner03,
  author       = {Michael Steiner},
  title        = {Regional knowledge networks as evolving social technologies},
  journal      = {Int. J. Technol. Manag.},
  volume       = {26},
  number       = {2/3/4},
  pages        = {326--345},
  year         = {2003},
  url          = {https://doi.org/10.1504/IJTM.2003.003385},
  doi          = {10.1504/IJTM.2003.003385},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtm/Steiner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Steiner2004a,
  author       = {Michael Steiner},
  title        = {Secure group key agreement},
  school       = {Saarland University, Saarbr{\"{u}}cken, Germany},
  year         = {2002},
  url          = {http://scidok.sulb.uni-saarland.de/volltexte/2004/239/index.html},
  urn          = {urn:nbn:de:bsz:291-scidok-2397},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Steiner2004a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesPSW02,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Steiner and
                  Michael Waidner},
  title        = {Polynomial Fairness and Liveness},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {160--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSFW.2002.1021814},
  doi          = {10.1109/CSFW.2002.1021814},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesPSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SadeghiS02,
  author       = {Ahmad{-}Reza Sadeghi and
                  Michael Steiner},
  title        = {Assumptions Related to Discrete Logarithms: Why Subtleties Make a
                  Real Difference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/126},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SadeghiS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LinSSH01,
  author       = {Chun{-}Li Lin and
                  Hung{-}Min Sun and
                  Michael Steiner and
                  Tzonelih Hwang},
  title        = {Three-party encrypted key exchange without server public-keys},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {5},
  number       = {12},
  pages        = {497--499},
  year         = {2001},
  url          = {https://doi.org/10.1109/4234.974498},
  doi          = {10.1109/4234.974498},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LinSSH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SteinerBEW01,
  author       = {Michael Steiner and
                  Peter Buhler and
                  Thomas Eirich and
                  Michael Waidner},
  title        = {Secure password-based cipher suite for {TLS}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {134--157},
  year         = {2001},
  url          = {https://doi.org/10.1145/501963.501965},
  doi          = {10.1145/501963.501965},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SteinerBEW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SadeghiS01,
  author       = {Ahmad{-}Reza Sadeghi and
                  Michael Steiner},
  editor       = {Birgit Pfitzmann},
  title        = {Assumptions Related to Discrete Logarithms: Why Subtleties Make a
                  Real Difference},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {244--261},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_16},
  doi          = {10.1007/3-540-44987-6\_16},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SadeghiS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/AsokanJSW00,
  author       = {N. Asokan and
                  Philippe A. Janson and
                  Michael Steiner and
                  Michael Waidner},
  title        = {State of the art in electronic payment systems},
  journal      = {Adv. Comput.},
  volume       = {53},
  pages        = {425--449},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0065-2458(00)80009-1},
  doi          = {10.1016/S0065-2458(00)80009-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/AsokanJSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/BellareGHHKSTHW00,
  author       = {Mihir Bellare and
                  Juan A. Garay and
                  Ralf C. Hauser and
                  Amir Herzberg and
                  Hugo Krawczyk and
                  Michael Steiner and
                  Gene Tsudik and
                  Els Van Herreweghen and
                  Michael Waidner},
  title        = {Design, implementation, and deployment of the iKP secure electronic
                  payment system},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {18},
  number       = {4},
  pages        = {611--627},
  year         = {2000},
  url          = {https://doi.org/10.1109/49.839936},
  doi          = {10.1109/49.839936},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/BellareGHHKSTHW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/AtenieseST00,
  author       = {Giuseppe Ateniese and
                  Michael Steiner and
                  Gene Tsudik},
  title        = {New multiparty authentication services and key agreement protocols},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {18},
  number       = {4},
  pages        = {628--639},
  year         = {2000},
  url          = {https://doi.org/10.1109/49.839937},
  doi          = {10.1109/49.839937},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/AtenieseST00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SteinerTW00,
  author       = {Michael Steiner and
                  Gene Tsudik and
                  Michael Waidner},
  title        = {Key Agreement in Dynamic Peer Groups},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {11},
  number       = {8},
  pages        = {769--780},
  year         = {2000},
  url          = {https://doi.org/10.1109/71.877936},
  doi          = {10.1109/71.877936},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SteinerTW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BuhlerEWS00,
  author       = {Peter Buhler and
                  Thomas Eirich and
                  Michael Waidner and
                  Michael Steiner},
  title        = {Secure Password-Based Cipher Suite for {TLS}},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2000, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2000},
  url          = {https://www.ndss-symposium.org/ndss2000/secure-password-based-cipher-suite-tls-paper/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BuhlerEWS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/LacostePSW00,
  editor       = {G{\'{e}}rard Lacoste and
                  Birgit Pfitzmann and
                  Michael Steiner and
                  Michael Waidner},
  title        = {{SEMPER} - Secure Electronic Marketplace for Europe},
  series       = {Lecture Notes in Computer Science},
  volume       = {1854},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/b75215},
  doi          = {10.1007/B75215},
  isbn         = {3-540-67825-5},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/LacostePSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AsokanDSW99,
  author       = {N. Asokan and
                  Herv{\'{e}} Debar and
                  Michael Steiner and
                  Michael Waidner},
  title        = {Authenticating public terminals},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {8},
  pages        = {861--870},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(98)00020-6},
  doi          = {10.1016/S1389-1286(98)00020-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AsokanDSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmsj/PeiroASW98,
  author       = {Jos{\'{e}} L. Abad Peiro and
                  N. Asokan and
                  Michael Steiner and
                  Michael Waidner},
  title        = {Designing a Generic Payment Service},
  journal      = {{IBM} Syst. J.},
  volume       = {37},
  number       = {1},
  pages        = {72--88},
  year         = {1998},
  url          = {https://doi.org/10.1147/sj.371.0072},
  doi          = {10.1147/SJ.371.0072},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ibmsj/PeiroASW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseST98,
  author       = {Giuseppe Ateniese and
                  Michael Steiner and
                  Gene Tsudik},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Authenticated Group Key Agreement and Friends},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288097},
  doi          = {10.1145/288090.288097},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/SteinerTW98,
  author       = {Michael Steiner and
                  Gene Tsudik and
                  Michael Waidner},
  title        = {{CLIQUES:} {A} New Approach to Group Key Agreement},
  booktitle    = {Proceedings of the 18th International Conference on Distributed Computing
                  Systems, Amsterdam, The Netherlands, May 26-29, 1998},
  pages        = {380--387},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICDCS.1998.679745},
  doi          = {10.1109/ICDCS.1998.679745},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/SteinerTW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uwec/AsokanHS98,
  author       = {N. Asokan and
                  Els Van Herreweghen and
                  Michael Steiner},
  editor       = {Bennet S. Yee},
  title        = {Towards a Framework for Handling Disputes in Payment Systems},
  booktitle    = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston,
                  Massachusetts, USA, August 31 - September 3, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  url          = {https://www.usenix.org/conference/3rd-usenix-workshop-electronic-commerce/towards-framework-handling-disputes-payment},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uwec/AsokanHS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AsokanJSW97,
  author       = {N. Asokan and
                  Philippe A. Janson and
                  Michael Steiner and
                  Michael Waidner},
  title        = {The State of the Art in Electronic Payment Systems},
  journal      = {Computer},
  volume       = {30},
  number       = {9},
  pages        = {28--35},
  year         = {1997},
  url          = {https://doi.org/10.1109/2.612244},
  doi          = {10.1109/2.612244},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AsokanJSW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SteinerTW96,
  author       = {Michael Steiner and
                  Gene Tsudik and
                  Michael Waidner},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Diffie-Hellman Key Distribution Extended to Group Communication},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {31--37},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238182},
  doi          = {10.1145/238168.238182},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SteinerTW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/SteinerTW95,
  author       = {Michael Steiner and
                  Gene Tsudik and
                  Michael Waidner},
  title        = {Refinement and Extension of Encrypted Key Exchange},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {29},
  number       = {3},
  pages        = {22--30},
  year         = {1995},
  url          = {https://doi.org/10.1145/206826.206834},
  doi          = {10.1145/206826.206834},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/SteinerTW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uwec/BellareHSTWHG95,
  author       = {Mihir Bellare and
                  Amir Herzberg and
                  Michael Steiner and
                  Gene Tsudik and
                  Michael Waidner and
                  Ralf C. Hauser and
                  Juan A. Garay},
  title        = {iKP - {A} Family of Secure Electronic Payment Protocols},
  booktitle    = {First {USENIX} Workshop on Electronic Commerce, New York, New York,
                  USA, July 11-12, 1995},
  publisher    = {{USENIX} Association},
  year         = {1995},
  url          = {https://www.usenix.org/conference/first-usenix-workshop-electronic-commerce/ikp-family-secure-electronic-payment-protocols},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uwec/BellareHSTWHG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uwec/HauserS95,
  author       = {Ralf C. Hauser and
                  Michael Steiner},
  title        = {Generic Extensions of {WWW} Browsers},
  booktitle    = {First {USENIX} Workshop on Electronic Commerce, New York, New York,
                  USA, July 11-12, 1995},
  publisher    = {{USENIX} Association},
  year         = {1995},
  url          = {https://www.usenix.org/conference/first-usenix-workshop-electronic-commerce/generic-extensions-www-browsers},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uwec/HauserS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}