Michael Waidner
#26,395
Most Influential Person Now
German mathematician
Michael Waidner's AcademicInfluence.com Rankings
Michael Waidnermathematics Degrees
Mathematics
#5285
World Rank
#7449
Historical Rank
Measure Theory
#1770
World Rank
#2170
Historical Rank
Download Badge
Mathematics
Why Is Michael Waidner Influential?
(Suggest an Edit or Addition)According to Wikipedia, Michael Waidner is a German computer scientist. He is director of the Fraunhofer Institute for Secure Information Technology and ATHENE, the largest research institute for IT security in Europe. He is also professor of security in information technology at the department of computer science of the Technische Universität Darmstadt.
Michael Waidner's Published Works
Published Works
- Diffie-Hellman key distribution extended to group communication (1996) (824)
- Security and privacy challenges in industrial Internet of Things (2015) (751)
- Key Agreement in Dynamic Peer Groups (2000) (668)
- Optimistic fair exchange of digital signatures (2000) (650)
- Optimistic protocols for fair exchange (1997) (530)
- A model for asynchronous reactive systems and its application to secure message transmission (2001) (395)
- CLIQUES: a new approach to group key agreement (1998) (375)
- Asynchronous protocols for optimistic fair exchange (1998) (339)
- Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data (2002) (313)
- Composition and integrity preservation of secure reactive systems (2000) (309)
- Refinement and extension of encrypted key exchange (1995) (298)
- ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead (1991) (281)
- A composable cryptographic library with nested operations (2003) (262)
- The State of the Art in Electronic Payment Systems (1997) (254)
- iKP - A Family of Secure Electronic Payment Protocols (1995) (197)
- Networks without user observability (1987) (194)
- Anonymous Fingerprinting (1997) (193)
- Networks Without User Observability: Design Options (1985) (180)
- Privacy-enhancing identity management (2004) (179)
- Optimistic Fair Exchange of Digital Signatures (Extended Abstract) (1998) (178)
- Design, implementation, and deployment of the iKP secure electronic payment system (2000) (175)
- A General Composition Theorem for Secure Reactive Systems (2004) (149)
- Micro-Payments based on iKP (1996) (141)
- Unconditional Sender and Recipient Untraceability in Spite of Active Attacks (1990) (136)
- The ESPRIT Project CAFE - High Security Digital Payment Systems (1994) (132)
- Trusting Mobile User Devices and Security Modules (1997) (128)
- The reactive simulatability (RSIM) framework for asynchronous systems (2007) (121)
- A Universally Composable Cryptographic Library (2003) (116)
- Property Attestation — Scalable and Privacy-friendly Security Assessment of Peer Computers (2004) (116)
- Asymmetric fingerprinting for larger collusions (1997) (114)
- Real-time mixes: a bandwidth-efficient anonymity protocol (1998) (99)
- The PERSEUS System Architecture (2001) (98)
- Di e-hellman key distribution extended to groups (1996) (95)
- The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract) (1990) (92)
- Designing a Generic Payment Service (1998) (88)
- Conceptual Model and Architecture of MAFTIA (2003) (87)
- Analysis of Liberty Single-Sign-on with Enabled Clients (2003) (87)
- Server-Supported Signatures (1996) (86)
- Symmetric Authentication within a Simulatable Cryptographic Library (2003) (80)
- A Composable Cryptographic Library with Nested Operations (Extended Abstract) (2003) (79)
- Secure password-based cipher suite for TLS (2001) (76)
- How To Break and Repair A "Provably Secure" Untraceable Payment System (1991) (75)
- Cryptographic Security of Reactive Systems (1999) (75)
- Attacks on Protocols for Server-Aided RSA Computation (1992) (74)
- Secure Asynchronous Reactive Systems (2004) (69)
- Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing (2000) (68)
- Optimal efficiency of optimistic contract signing (1998) (68)
- Privacy-enabled services for enterprises (2002) (67)
- Cryptographically sound theorem proving (2006) (67)
- Unconditional Byzantine Agreement for any Number of Faulty Processors (1992) (67)
- SEMPER - Secure Electronic Marketplace for Europe (2000) (64)
- Security in Business Process Engineering (2003) (56)
- Privacy in browser-based attribute exchange (2002) (55)
- Authenticating public terminals (1999) (54)
- Computer Security - ESORICS 2000 (2000) (54)
- Computer Security — ESORICS 2002 (2002) (54)
- Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 (2007) (54)
- Domain Validation++ For MitM-Resilient PKI (2018) (51)
- Rechtssicherheit trotz Anonymität in offenen digitalen Systemen (1990) (48)
- Secure Reactive Systems (2000) (47)
- Development of a Secure Electronic Marketplace for Europe (1996) (47)
- Polynomial fairness and liveness (2002) (44)
- Trusted Virtual Domains: Secure Foundations for Business and IT Services (2005) (42)
- Optimistic Synchronous Multi-Party Contract Signing (1998) (41)
- Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes (2006) (40)
- Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution (2016) (40)
- A General Framework for Formal Notions of "Secure" Systems (1994) (39)
- Internet-wide study of DNS cache injections (2017) (38)
- Federated Identity-Management Protocols (2003) (38)
- MAFTIA (Malicious− and Accidental− Fault Tolerance for Internet Applications (2001) (35)
- One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet (2017) (33)
- A Remark on a Signature Scheme Where Forgery Can Be Proved (1991) (33)
- Federated Identity-Management Protocols -Where User Authentication Protocols May Go- (2003) (33)
- Strong loss tolerance of electronic coin systems (1997) (31)
- State of the art in electronic payment systems (2000) (31)
- Fragmentation Considered Leaking: Port Inference for DNS Poisoning (2014) (29)
- Fail-stop Signatures and their Application (1991) (29)
- Provably Secure Certified Mail (2000) (28)
- Service-oriented Assurance - Comprehensive Security by Explicit Assurances (2006) (28)
- Reactively secure signature schemes (2003) (25)
- Properties of Payment Systems - General Definition Sketch and Classification (1996) (24)
- Die PERSEUS Systemarchitektur (2001) (24)
- Digital Enlightenment Yearbook 2013: The Value of Personal Data (2013) (23)
- Unconditionally Untraceable and Fault-tolerant Broadcast and SecretBallot Election (1992) (22)
- How to break fraud-detectable key recovery (1998) (22)
- Low-Level Ideal Signatures and General Integrity Idealization (2004) (22)
- Token-based Web Single Signon with Enabled Clients (2002) (20)
- Unconditional Byzantine Agreement with Good Majority (1991) (20)
- Fair Exchange: A New Paradigm for Electronic Commerce (2000) (20)
- Architecture and Design of a Secure Electronic Marketplace (1997) (19)
- Towards Security of Internet Naming Infrastructure (2015) (19)
- NetCo: Reliable Routing With Unreliable Routers (2016) (19)
- Datenschutz garantierende offene Kommunikationsnetze (1988) (18)
- DNSSEC Misconfigurations in Popular Domains (2016) (18)
- Practical Experience: Methodologies for Measuring Route Origin Validation (2018) (18)
- Electronic Payment Systems (1996) (18)
- Towards Forensic Analysis of Attacks with DNSSEC (2014) (17)
- A Universally Composable Cryptographic Library with Nested Operations (2003) (17)
- Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061) (2011) (17)
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes (2006) (17)
- First Specification of APIs and Protocols for the MAFTIA Middleware (2001) (16)
- How to Break Another Provably Secure Payment System (1995) (16)
- Reference Model and Use Cases (2000) (15)
- BBAE -- A General Protocol for Browser-based Attribute Exchange (2002) (15)
- Amending P3P for clearer privacy promises (2003) (14)
- Cliques: a protocol suite for key agreement in dynamic groups (1997) (14)
- Secure and Anonymous Electronic Commerce: Providing Legal Certainty in Open Digital Systems Without (2000) (14)
- Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data (2007) (14)
- Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet (2017) (13)
- Open Issues in Secure Electronic Commerce (1998) (12)
- Design, Implementation and Deployment of a Secure Account-Based Electronic Payment System (2000) (12)
- Round-optimal and abuse-free multi-party contract signing (2000) (12)
- Proceedings of the 6th European Symposium on Research in Computer Security (1994) (12)
- Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule (1995) (12)
- Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library (2005) (11)
- The Impact of DNS Insecurity on Time (2020) (11)
- Conceptual Model and Architecture (2001) (11)
- Personal Information Dashboard: Putting the Individual Back in Control (2013) (11)
- HbbTV Security and Privacy: Issues and Challenges (2016) (11)
- Service and Protocol Architecture for the MAFTIA Middleware (2001) (10)
- DNSSEC for cyber forensics (2014) (10)
- Loss-tolerance for electronic wallets (1990) (9)
- Expressive Privacy Promises — How to Improve the Platform for Privacy Preferences (P3P) (2002) (9)
- Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004 (2004) (9)
- From IP to transport and beyond: cross-layer attacks against applications (2021) (8)
- Path MTU Discovery Considered Harmful (2018) (8)
- The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources (2022) (8)
- Stalloris: RPKI Downgrade Attack (2022) (8)
- MAFTIA Conceptual Model and Architecture (2001) (8)
- A Formal Model for Multiparty Group Key Agreement (2002) (7)
- MAFTIA: Reference Model and Use Cases (2000) (7)
- Detection and Forensics of Domains Hijacking (2014) (7)
- Formal Methods and Cryptography (2006) (6)
- A Status Report on the SEMPER Framework for Secure Electronic Commerce (1998) (6)
- Secure Electronic Commerce (2000) (6)
- Soundness Limits of Dolev-Yao Models (2006) (6)
- Polynomial liveness (2004) (6)
- IBM’s Unified Governance Framework (UGF) Initiative (2007) (5)
- Secure Consensus Generation with Distributed DoH (2020) (5)
- Let's Downgrade Let's Encrypt (2021) (5)
- Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen (1985) (5)
- State of Online Privacy: A Technical Perspective (2012) (5)
- IT-Sicherheit und Datenschutz im vernetzten Fahrzeug (2015) (5)
- Strong Loss Tolerance for Untraceable Electronic Coin Systems (1995) (5)
- The SEMPER Framework for Secure Electronic Commerce (1999) (5)
- Telefon-MIXe: Schutz der Vermittlungsdaten für zwei 64-kbit/s-Duplexkanäleüber den (2•64 + 16)-kbit/s-Teilnehmeranschluss (1989) (4)
- Future Directions in Secure Electronic Commerce (2000) (4)
- Poster: Insights into Global Deployment of RPKI Validation (2022) (4)
- Authentication-Bypass Vulnerabilities in SOHO Routers (2017) (4)
- Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler (1992) (4)
- One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains (2017) (4)
- Behind the Scenes of RPKI (2022) (4)
- Off-Path Attacks Against PKI (2018) (3)
- DNS-over-TCP considered vulnerable (2021) (3)
- Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society (2010) (3)
- Relating cryptography and cryptographic protocols (2001) (3)
- Fail-stop-Signaturen und ihre Anwendung (1991) (3)
- Smart RPKI Validation: Avoiding Errors and Preventing Hijacks (2022) (3)
- Introduction to The Value of Personal Data (2013) (3)
- Chapter 11: The Payment Framework (2000) (3)
- Secure International Payment and Information Transfer - Towards aMulti-Currency Electronic Wallet (1995) (3)
- Cybersecurity Research: Challenges and Course of Action (2019) (3)
- Privacy-enabled Management of Customer Data (2004) (3)
- Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTP (2020) (3)
- Removing the Bottleneck for Practical 2PC (2018) (3)
- DNS-Scopy: Towards Security of Internet Naming Infrastructure (2015) (3)
- Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten (1997) (2)
- Effizientere fail-stop Schlüsselerzeugung für das DC-Netz (1991) (2)
- Personal DLP for Facebook (2014) (2)
- Reactively Simulatable Certified Mail (2006) (2)
- Translating EPAL to P3P -- How to Keep Enterprise Privacy Promisesin Sync With the Actual Practices (Position Papers) (2003) (2)
- Electronic Payment Systems 1 (1996) (2)
- SICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit (2012) (2)
- POSTER: X-Ray Your DNS (2017) (2)
- Diving into Email Bomb Attack (2020) (2)
- Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks (2006) (2)
- Evaluating Resilience of Domains in PKI (2021) (2)
- Justifying a Dolev-Yao Model Under Active Attacks (2004) (2)
- Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281) (2012) (2)
- Verlusttolerante elektronische Brieftaschen (1987) (2)
- XDRI Attacks - and - How to Enhance Resilience of Residential Routers (2022) (2)
- Unbedingte Unbeobachtbarkeit mit kryprographischer Robustheit (1991) (1)
- Federated identity-management protocols. Commentary. Authors' reply (2005) (1)
- Ist Anonymität praktisch realisierbar (2004) (1)
- SERVFAIL: The Unintended Consequences of Algorithm Agility in DNSSEC (2022) (1)
- Safety und Security (2018) (1)
- White Paper Practical Post-Quantum Cryptography August 18 , 2017 (2017) (1)
- Vertrauenswrdiger Entwurf portabler Benutzerendgerte und Sicherheitsmodule (1995) (1)
- The Value of Personal Data. Digital Enlightenment Yearbook 2013 (2013) (1)
- Computer security - ESORICS 2002 : 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002 : proceedings (2002) (1)
- Chapter 13: Limiting Liability in Electronic Commerce (2000) (1)
- Poster: RPKI Kill Switch (2022) (1)
- Digital payment systems in the ESPRIT project CAFE (1994) (1)
- The Master and Parasite Attack (2021) (1)
- Towards Automated Measurements of Internet's Naming Infrastructure (2016) (1)
- Unternehmensweites Datenschutzmanagement bei IBM (2002) (1)
- Non-determinism in multi-party computation (2006) (1)
- Uber die Notwendigkeit genormter kryptographischer Verfahren (1987) (1)
- A Framework for Network Intrusion Detection on Open Platform Communications Unified Architecture (2017) (1)
- Intrusion Detection – Systeme für vernetzte Fahrzeuge – Konzepte und Herausforderungen für Privatheit und Cyber-Sicherheit (2019) (1)
- Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure (2016) (1)
- Performance penalties of resilient SDN infrastructures (2020) (1)
- The Fair Internet Trader (2000) (1)
- Chapter 14: Legal Aspects (2000) (1)
- Optimistische Mehrparteien-Vertragsunterzeichnung (1999) (1)
- The Commerce Layer: A Framework for Commercial Transactions (2000) (1)
- Software Protection Using an Installaton Product Having an EntitlementFile (2009) (0)
- Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze (2015) (0)
- Technical Report : Security in Business Process Engineering ⋆ (2015) (0)
- Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments (2021) (0)
- PriSEMD-A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices (2014) (0)
- On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions (2005) (0)
- SSLChecker (2021) (0)
- Poster: DNS in Routers Considered Harmful (2022) (0)
- Vertrauensw?rdiger Entwurf portabler Endger?te und Sicherheitsmodule (1995) (0)
- Chapter 5: Organizational Overview (2000) (0)
- Blocking Email Bombs with EmailGlass (2020) (0)
- Technical Report : Symmetric Authentication in a Simulatable Dolev-Yao-style Cryptographic Library ( Extended Version ) ∗ (2015) (0)
- Méthode et système pour établir une connection digne de foi entre un utilisateur et un terminal (1999) (0)
- Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers (2021) (0)
- Black-box caches fingerprinting (2020) (0)
- IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung (2012) (0)
- Kopierschutz durch asymmetrisches Fingerprinting (Copy protectionby asymmetric fingerprinting) (1998) (0)
- Poster: The Unintended Consequences of Algorithm Agility in DNSSEC (2022) (0)
- Anonyme und verlusttolerante elektronische Brieftaschen (1987) (0)
- Internet As a Source of Randomness (2018) (0)
- Special issue ESORICS 2021 (2022) (0)
- Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet (2023) (0)
- Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C. (2003) (0)
- Mailicious- and Accidental- Fault Tolerance for Internet Applications (MAFTIA) : Reference Model and Use Cases (2000) (0)
- Survey of Software Protection with Minimal Hardware (2016) (0)
- RZ 3207 ( # 93253 ) (2007) (0)
- Poster: Fragmentation Attacks on DNS over TCP (2021) (0)
- Part II. Project Achievements (2000) (0)
- SEMPER---Security Framework for Electronic Commerce (2000) (0)
- IT-Sicherheit und Datenschutz im vernetzten Fahrzeug (2015) (0)
- Datenschutz garantierende offene Kommunikationsnetze; DokumentationFachseminar Sicherheit in Netzen (1993) (0)
- Part I. The Vision of SEMPER (2000) (0)
- Federated Identity Management (2013) (0)
- Method for Tracing Payment Data in an Anonymous Payment System, asWell as Payment System in Which the Method is Applied (1996) (0)
- Weitere Aspekte fernmeldetechnischer Alternativen zum ISDN (1988) (0)
- Erratum zu: Safety und Security (2018) (0)
- Procede permettant de suivre des donnees de paiement dans un systeme de paiement anonyme et systeme de paiement dans lequel on utilise ledit procede (1996) (0)
- Distributed Domain Validation (DDV) (2019) (0)
- Chapter 12: Trust Management in the Certificate Block (2000) (0)
- Preface (2007) (0)
- Vision of Future Products (2000) (0)
- Ask The Experts: Cybersecurity (2015) (0)
- Poster (2022) (0)
- Reactively Secure Signature Schemes ( Long Version ) ⋆ (2015) (0)
- Safety and Security (2019) (0)
- Technische Erkennung von Desinformation – Von Kopien über Montagen bis zu Deep-Fake-Videos (2020) (0)
- PolicyPaper3_Artificial Intelligence_Druck.pub (2018) (0)
- Non-Determinism in Multi-Party Computation ( Abstract ) (2006) (0)
- Cryptanalysis of FNV-Based Cookies (2020) (0)
- Technical Aspects of Online Privacy (2012) (0)
- This paper is included in the Proceedings of the 31st USENIX Security Symposium. (2022) (0)
- Stratum Filtering: Cloud-based Detection of Attack Sources (2016) (0)
- Poster: Off-path VoIP Interception Attacks (2021) (0)
- Guest Editor's Introduction: 2005 IEEE Symposium on Security and Privacy (2005) (0)
- Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben (2015) (0)
- A method of exploration for payment data in an anonymous payment system, as well as a payment system in which this method is applied (1996) (0)
- Technical Report : Justifying a Dolev-Yao Model under Active Attacks ( Long Version ) ⋆ (2015) (0)
- Cryptographic Semantics For The Algebraic Models (2002) (0)
- Preface (2022) (0)
- Workshop Program Committee ASSD 2015 (2015) (0)
- DNSSEC for cyber forensics (2014) (0)
- Electronic Commerce (2000) (0)
This paper list is powered by the following services:
Other Resources About Michael Waidner
What Schools Are Affiliated With Michael Waidner?
Michael Waidner is affiliated with the following schools: