Publications

By year

2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1991 |

1998

  1. [APASW98]
    Jose L. Abad-Peiro, N. Asokan, Michael Steiner, and Michael Waidner.
    Designing a generic payment service. IBM Systems Journal, 37(1):72-88, January 1998.
  2. [APQ98]
    Jose L. Abad-Peiro and Jean-Jacques Quisquater.
    Quality in the access to information. Research Report RZ 3017 (# 93063), IBM Research, April 1998. (Postscript)
  3. [APS98]
    Jose L. Abad-Peiro and Patrick Steiger.
    Making electronic commerce easier to use with novel user interfaces. International Journal of Electronic Commerce, September 1998. (PDF)
  4. [Aso98a]
    N. Asokan.
    Fairness in Electronic Commerce. PhD thesis, University of Waterloo, May 1998. (Postscript)
  5. [Aso98b]
    N. Asokan.
    Fairness in electronic commerce. Research Report RZ 3027 (#93073), IBM Research, May 1998. (Postscript)
  6. [ABWSW98]
    N. Asokan, Birgit Baum-Waidner, Matthias Schunter, and Michael Waidner.
    Optimistic synchronous multi-party contract signing. Research Report RZ 3089, IBM Research Division, December 1998. (Postscript)
  7. [ASW98a]
    N. Asokan, Victor Shoup, and Michael Waidner.
    Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86-99, Oakland, CA, May 1998. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press. A minor bug in the proceedings version was fixed. An errata sheet, distributed at the conference, is available at 1998/ASW98-errata.ps.gz. (Postscript)
  8. [ASW98b]
    N. Asokan, Victor Shoup, and Michael Waidner.
    Optimistic fair exchange of digital signatures. In Kaisa Nyberg, editor, Advances in Cryptology — EUROCRYPT98, volume 1403 of Lecture Notes in Computer Science, pages 591-606. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1998. A longer version is available  [ASW97b]; A related paper  [ASW98a] is available as well. (Postscript)
  9. [AVHS98a]
    N. Asokan, Els Van Herreweghen, and Michael Steiner.
    Towards a framework for handling disputes in payment systems. Research Report RZ 2996, IBM Research, March 1998. Also available as  [AVHS98b]. (Postscript)
  10. [AVHS98b]
    N. Asokan, Els Van Herreweghen, and Michael Steiner.
    Towards a framework for handling disputes in payment systems. In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pages 187-202, Boston, Mass., September 1998. USENIX. (Postscript)
  11. [AST98a]
    Giuseppe Ateniese, Michael Steiner, and Gene Tsudik.
    Authenticated group key agreement and friends. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 17-26, San Francisco, California, November 1998. ACM Press. A journal version of this paper appeared later in JSAC  [AtStTs2000]. (Postscript)
  12. [AST98b]
    Giuseppe Ateniese, Michael Steiner, and Gene Tsudik.
    Authenticated group key agreement and friends. Research Report RZ 3063 (#93109), IBM Research, October 1998. Appeared later as [AST98a]. See also [AtStTs2000] for a revised journal version.
  13. [BWW98]
    Birgit Baum-Waidner and Michael Waidner.
    Optimistic asynchronous multi-party contract signing. Research Report RZ 3078, IBM Research Division, November 1998. (PDF)
  14. [BW98a]
    Klaus Becker and Uta Wille.
    Communication complexity of group key distribution. Research Report RZ 2995 (#93041), IBM Research, March 1998. For an updated version see [BW98b]. (Postscript)
  15. [BW98b]
    Klaus Becker and Uta Wille.
    Communication complexity of group key distribution. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 1-6, San Francisco, California, November 1998. ACM Press. (Postscript)
  16. [CCM98]
    Christian Cachin, Claude Crépeau, and Julien Marcil.
    Oblivious transfer with a memory-bounded receiver. In Proceedings of the 39th Symposium on Foundations of Computer Science (FOCS), pages 493-502. IEEE Computer Society Press, 1998. (Postscript)
  17. [CS98a]
    Ronald Cramer and Victor Shoup.
    A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Hugo Krawczyk, editor, Advances in Cryptology -- CRYPTO98, volume 1462 of Lecture Notes in Computer Science, pages 13-25. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1998.
  18. [CS98b]
    Ronald Cramer and Victor Shoup.
    Signature schemes based on the strong RSA assumption. Research Report RZ 3083, IBM Research, December 1998. Also accessible via the Theory of Cryptography as record 99-01. An updated version can be found in [CraSho99].
  19. [DDNW98]
    Hervé Debar, Marc Dacier, Medhi Nassehi, and Andreas Wespi.
    Fixed vs. variable-length patterns for detecting suspicious process behavior. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS), volume 1485 of Lecture Notes in Computer Science, pages 1-15, Louvain-la-Neuve, Belgium, September 1998. Springer-Verlag, Berlin Germany.
  20. [DDWL98]
    Hervé Debar, Marc Dacier, Andreas Wespi, and Stefan Lampart.
    A workbench for intrusion detection systems. Technical Report RZ 6519, IBM Research - Zurich, Säumerstrasse 4, CH-8803 Rüschlikon, Switzerland, March 1998.
  21. [HO98]
    Philip Hawkes and Luke O'Connor.
    Asmptotic bounds on differential probabilities. Research Report RZ 3018 (#93064), IBM Research, April 1998. (Postscript)
  22. [JMP+98]
    Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner.
    Real-time Mixes: A bandwidth-efficient anonymity protocol. IEEE Journal on Selected Areas in Communications, 16(4):495-509, 1998.
  23. [Kar98]
    Günter Karjoth.
    Authorization in CORBA security. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS), volume 1485 of Lecture Notes in Computer Science, pages 143-158. Springer-Verlag, Berlin Germany, September 1998.
  24. [KAG98a]
    Günter Karjoth, N. Asokan, and Ceki Gülcü.
    Protecting the computation results of free-roaming agents. In K. Rothermel and F. Hohl, editors, Second International Workshop on Mobile Agents (MA '98), volume 1477 of Lecture Notes in Computer Science, pages 195-207. Springer-Verlag, Berlin Germany, 1998.
  25. [KAG98b]
    Günter Karjoth, N. Asokan, and Ceki Gülcü.
    Protecting the computation results of free-roaming agents. Personal Technologies, 2(2):92-99, June 1998. reprint of [KAG98a].
  26. [KLO98]
    Günter Karjoth, Danny B. Lange, and Mitsuru Oshima.
    A security model for aglets. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, pages 188-205. Springer-Verlag, Berlin Germany, 1998. reprint of [KaLaOs97].
  27. [O'C98]
    Luke O'Connor.
    On the entropy of Arcfour keys. Research Report RZ 3019 (#93065), IBM Research, April 1998. (Postscript)
  28. [PSW98]
    Birgit Pfitzmann, Matthias Schunter, and Michael Waidner.
    Optimal efficiency of optimistic contract signing. In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pages 113-122, New York, May 1998. ACM. (PDF)
  29. [PW98]
    Birgit Pfitzmann and Michael Waidner.
    How to break fraud-detectable key recovery. ACM Operating Systems Review, 32(1):23-28, January 1998.
  30. [RS98a]
    James Riordan and Bruce Schneier. A certified e-mail protocol. In 14th Annual Computer Security Applications Conference, Phoenix, AZ, USA, 1998. ACM. (Postscript)
  31. [RS98b]
    James Riordan and Bruce Schneier.
    Environmental key generation towards clueless agents. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, pages 15-24. Springer-Verlag, Berlin Germany, 1998.
  32. [Sas98]
    Marcus Sasse.
    Smartcard-supported internet payments. Master's thesis, Institut für Informatik, Universität Hildesheim, Germany, April 1998. (Postscript)
  33. [SG98]
    Victor Shoup and Rosario Gennaro.
    Securing threshold cryptosystems against chosen ciphertext attack. In Kaisa Nyberg, editor, Advances in Cryptology — EUROCRYPT98, volume 1403 of Lecture Notes in Computer Science, pages 1-16. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1998. (Postscript)
  34. [Sho98]
    Victor Shoup.
    Why chosen ciphertext security matters. Research Report RZ 3076 (#93122), IBM Research, November 1998. (PDF)
  35. [STW98]
    Michael Steiner, Gene Tsudik, and Michael Waidner.
    CLIQUES: A new approach to group key agreement. In 18th International Conference on Distributed Computing Systems (ICDCS'98), pages 380-387, Amsterdam, May 1998. IEEE Computer Society Press. Appeared as heavily revised and extended journal version in  [StTsWa2000]. (Postscript)
  36. [Wai98]
    Michael Waidner.
    Open issues in secure electronic commerce. Technical Report RZ 3070 (#93116), IBM Research, October 1998. See [Waidne2000] for a revised version. (Postscript)

Disclaimer

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.