Publications

By year

2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1991 |

2000

  1. [ACCK00]
    Joy Algesheimer, Christian Cachin, Jan Camenisch, and Günter Karjoth.
    Cryptographic security for mobile code. Research Report RZ 3302 (# 93348), IBM Research, November 2000. For conference-version see [AlCaCaKa2001]. (PDF)
  2. [ABWP+00]
    N. Asokan, Birgit Baum-Waidner, Torben P. Pedersen, Birgit Pfitzmann, Matthias Schunter, Michael Steiner, and Michael Waidner.
    Architecture. In Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, and Michael Waidner, editors, SEMPER — Secure Electronic Marketplace for Europe, volume 1854 of Lecture Notes in Computer Science, pages 45-64. Springer-Verlag, Berlin Germany, August 2000. ISBN 3-540-67825-5.
  3. [AJSW00]
    N. Asokan, Phil Janson, Michael Steiner, and Michael Waidner.
    State of the art in electronic payment systems. In Marvin V. Zelkowitz, editor, Advances in Computers, volume 43, pages 425-449. Academic Press, March 2000.
  4. [ASW00]
    N. Asokan, Victor Shoup, and Michael Waidner.
    Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):593-610, April 2000. (Postscript)
  5. [AS00]
    N. Asokan and Michael Steiner.
    The payment framework. In Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, and Michael Waidner, editors, SEMPER — Secure Electronic Marketplace for Europe, volume 1854 of Lecture Notes in Computer Science, pages 187-214. Springer-Verlag, Berlin Germany, August 2000. ISBN 3-540-67825-5.
  6. [ACJT00]
    Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik.
    A practical and provably secure coalition-resistant group signature scheme. In Mihir Bellare, editor, Advances in Cryptology — CRYPTO2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 2000. (Postscript) (PDF)
  7. [AST00]
    Giuseppe Ateniese, Michael Steiner, and Gene Tsudik.
    New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications, 18(4):628-639, April 2000. See [PerQui2001a] for some security problems with this paper ... (Postscript) (PDF)
  8. [BWLP+00]
    Birgit Baum-Waidner, Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner, and Arnd Weber. Part i: The vision of SEMPER. In Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, and Michael Waidner, editors.
    SEMPER — Secure Electronic Marketplace for Europe, volume 1854 of Lecture Notes in Computer Science, pages 1-37. Springer-Verlag, Berlin Germany, August 2000. ISBN 3-540-67825-5.
  9. [BWW00]
    Birgit Baum-Waidner and Michael Waidner.
    Round-optimal and abuse-free multi-party contract signing. In 27th International Colloquium on Automata, Languages and Programming (ICALP 2000), volume 1853 of Lecture Notes in Computer Science, pages 524-535. Springer-Verlag, Berlin Germany, July 2000. (Postscript)
  10. [BGH+00]
    Mihir Bellare, Juan Garay, Ralf Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, and Michael Waidner.
    Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications, 18(4):611-627, April 2000. (Postscript) (PDF)
  11. [BESW00]
    Peter Buhler, Thomas Eirich, Michael Steiner, and Michael Waidner.
    Secure password-based cipher suite for TLS. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '00), pages 129-142, San Diego, CA, February 2000. Internet Society. (PDF)
  12. [Cac00]
    Christian Cachin.
    An information-theoretic model for steganography. Record 2000/028, Cryptology ePrint Archive, June 2000. Revised version of an extended abstract presented at IHW '98.
  13. [CC00]
    Christian Cachin and Jan Camenisch. Optimistic fair secure computation.
    In Mihir Bellare, editor, Advances in Cryptology — CRYPTO2000, volume 1880 of Lecture Notes in Computer Science, pages 93-111. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 2000. (Postscript) (PDF)
  14. [CCKM00]
    Christian Cachin, Jan Camenisch, Joe Kilian, and Joy Müller.
    One-round secure computation and secure autonomous mobile agents. In 27th International Colloquium on Automata, Languages and Programming (ICALP 2000), volume 1853 of Lecture Notes in Computer Science, pages 512-523. Springer-Verlag, Berlin Germany, July 2000.
  15. [CKS00]
    Christian Cachin, Klaus Kursawe, and Victor Shoup.
    Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. In Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing, Portland, Oregon, July 2000. ACM. Full version appeared as Cryptology ePrint Archive Report 2000/034 (2000/7/7).
  16. [Cam00]
    Jan Camenisch.
    Efficient anonymous fingerprinting with group signatures. In T. Okamoto, editor, Advances in Cryptology — ASIACRYPT2000, volume 1976 of Lecture Notes in Computer Science, pages 415-428, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. (PDF)
  17. [CD00]
    Jan Camenisch and Ivan Damgård.
    Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In T. Okamoto, editor, Advances in Cryptology — ASIACRYPT2000, volume 1976 of Lecture Notes in Computer Science, pages 331-345, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. (PDF)
  18. [CL00]
    Jan Camenisch and Anna Lysyanskaya.
    Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Research Report RZ 3295 (#93341), IBM Research, November 2000. See also [CamLys2001] and [CamLys2001a]. (PDF)
  19. [CM00]
    Jan Camenisch and Markus Michels.
    Confirmer signature schemes secure against adaptive adversaries. In Bart Preneel, editor, Advances in Cryptology -- EUROCRYPT2000, volume 1807 of Lecture Notes in Computer Science, pages 243-258, Brugge, Belgium, 2000. Springer-Verlag, Berlin Germany. (Postscript)
  20. [CS00]
    Ronald Cramer and Victor Shoup.
    Signature schemes based on the strong RSA assumption. ACM Transactions on Information and System Security, 3(3):161-185, August 2000. Journal version of [CraSho99].
  21. [Kar00a]
    Günter Karjoth.
    Authorization in CORBA security. Journal of Computer Security, 8(2/3):89-108, 2000.
  22. [Kar00b]
    Günter Karjoth.
    An operational semantics of Java 2 access control. In 13th IEEE Computer Security Foundations Workshop, pages 224-232. IEEE Computer Society Press, 2000.
  23. [Kar00c]
    Günter Karjoth.
    Secure mobile agent-based merchant brokering in distributed marketplaces. In D. Katz and F. Mattern, editors, Second Joint Symposium on Agent Systems and Applications / Mobile Agents (ASA/MA 2000), number 1882 in Lecture Notes in Computer Science, pages 44-56. Springer-Verlag, Berlin Germany, 2000.
  24. [KP00]
    Günter Karjoth and Joachim Posegga.
    Mobile agents and Telcos' nightmares. Annales des Télécommunications, 55(7/8):29-41, 2000.
  25. [Kur00]
    Klaus Kursawe. Optimistic asynchronous byzantine agreement. Research Report RZ 3202 (#93248), IBM Research, January 2000. (PDF)
  26. [OK00]
    Luke O'Connor and Günter Karjoth.
    Efficient downloading and updating applications on portable devices using authentication trees. In J. Domingo-Ferrer, D. Chan, and A. Watson, editors, Fourth Smart Card Research And Advanced Application Conference (CARDIS 2000), pages 327-343. Kluwer Academic Publishers, 2000.
  27. [PSW00a]
    Birgit Pfitzmann, Matthias Schunter, and Michael Waidner.
    Cryptographic security of reactive systems. Electronic Notes in Theoretical Computer Science (ENTCS), 32, 2000. Workshop on Secure Architectures and Information Flow, Royal Holloway, University of London, December 1 - 3, 1999. (PS)
  28. [PSW00b]
    Birgit Pfitzmann, Matthias Schunter, and Michael Waidner.
    Provably secure certified mail. Research Report RZ 3207 (#93253), IBM Research, August 2000. (Postscript)
  29. [PSW00c]
    Birgit Pfitzmann, Matthias Schunter, and Michael Waidner.
    Secure reactive systems. Research Report RZ 3206 (#93252), IBM Research, May 2000. (Postscript)
  30. [PW00a]
    Birgit Pfitzmann and Michael Waidner.
    Composition and integrity preservation of secure reactive systems. Research Report RZ 3234 (#93280), IBM Research, June 2000. Published also as [PW00b]. (Postscript)
  31. [PW00b]
    Birgit Pfitzmann and Michael Waidner.
    Composition and integrity preservation of secure reactive systems. In Sushil Jajodia, editor, Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 245-254, Athens, Greece, November 2000. ACM Press. copyright ACM, 2000. The author's version of the work is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version is published as proceedings of CCS 00, 1-58113-203-4/00/0011. (PDF)
  32. [PW00c]
    Birgit Pfitzmann and Michael Waidner.
    A model for asynchronous reactive systems and its application to secure message transmission. Research Report RZ 3304 (#93350), IBM Research, December 2000. Identical to [PW00d]. Preliminary and more extended version of [PfiWai2001]. (Postscript)
  33. [PW00d]
    Birgit Pfitzmann and Michael Waidner.
    A model for asynchronous reactive systems and its application to secure message transmission. Record 2000/066, Cryptology ePrint Archive, December 2000. Identical to [PW00c]. Preliminary and more extended version of [PfiWai2001].
  34. [PWP00]
    Birgit Pfitzmann, Michael Waidner, and Andreas Pfitzmann.
    Secure and anonymous electronic commerce: Providing legal certainty in open digital systems without compromising anonymity. Research Report RZ 3232 (#93278), IBM Research, May 2000. (Postscript)
  35. [SS00]
    Thomas Schweinberger and Victor Shoup.
    ACE: The advanced cryptographic engine. Technical report, IBM Research, March 2000. Submission to IEEE P1363a (http://grouper.ieee.org/groups/1363/). (PDF)
  36. [Sho00a]
    Victor Shoup.
    A composition theorem for universal one-way hash functions. In Bart Preneel, editor, Advances in Cryptology — EUROCRYPT2000, volume 1807 of Lecture Notes in Computer Science, pages 445-452, Brugge, Belgium, 2000. Springer-Verlag, Berlin Germany. (PDF)
  37. [Sho00b]
    Victor Shoup.
    OAEP reconsidered. Record 2000/060, Cryptology ePrint Archive, November 2000. Revised on Feb. 6, 2001. A revised version appeared as [Shoup2001a].
  38. [Sho00c]
    Victor Shoup.
    Practical threshold signatures. In Bart Preneel, editor, Advances in Cryptology — EUROCRYPT2000, volume 1807 of Lecture Notes in Computer Science, pages 207-220, Brugge, Belgium, 2000. Springer-Verlag, Berlin Germany. (PDF)
  39. [Sho00d]
    Victor Shoup.
    Using hash functions as a hedge against chosen ciphertext attacks. In Bart Preneel, editor, Advances in Cryptology — EUROCRYPT2000, volume 1807 of Lecture Notes in Computer Science, pages 275-288, Brugge, Belgium, 2000. Springer-Verlag, Berlin Germany. (Postscript)
  40. [STW00]
    Michael Steiner, Gene Tsudik, and Michael Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems, 11(8):769-780, August 2000.
  41. [Van00a]
    Els Van Herreweghen.
    Non-repudiation in SET: Open issues. In Proceedings of the Fourth Conference on Financial Cryptography (FC '00), Lecture Notes in Computer Science, Anguilla, British West Indies, February 2000. International Financial Cryptography Association (IFCA), Springer-Verlag, Berlin Germany. (PDF)
  42. [Van00b]
    Els Van Herreweghen.
    Secure anonymous signature-based transactions. Research Report RZ 3220, IBM Research, March 2000. (Postscript)
  43. [Van00c]
    Els Van Herreweghen.
    Secure anonymous signature-based transactions. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, Toulouse, France, November 2000. Springer-Verlag, Berlin Germany. (Postscript)
  44. [VW00]
    Els Van Herreweghen and Uta Wille.
    Using EMV for internet payments. In Hans Robert Hansen, Martin Bichler, and Harald Mahrer, editors, Proceedings of the 8th European Conference on Information Systems, pages 901-908. Vienna University of Economics and Business Administration, July 2000. (Postscript)
  45. [Wai00]
    Michael Waidner.
    Future directions in secure electronic commerce. In Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, and Michael Waidner, editors, SEMPER — Secure Electronic Marketplace for Europe, volume 1854 of Lecture Notes in Computer Science, pages 307-326. Springer-Verlag, Berlin Germany, August 2000. ISBN 3-540-67825-5.

Disclaimer

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.