Følg
Andreas Pfitzmann
Andreas Pfitzmann
Technische Universität Dresden
Verificeret mail på xamax.com.au
Titel
Citeret af
Citeret af
År
Anonymity, unobservability, and pseudonymity—a proposal for terminology
A Pfitzmann, M Köhntopp
Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001
2122*2001
Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools-and some lessons learned
A Westfeld, A Pfitzmann
International workshop on information hiding, 61-76, 1999
18791999
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, and Identity Management
A Pfitzmann, M Hansen
Technical report, August 2010. v0. 34, 2010
946*2010
Collision-free accumulators and fail-stop signature schemes without trees
N Barić, B Pfitzmann
International conference on the theory and applications of cryptographic …, 1997
7881997
ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead
A Pfitzmann, B Pfitzmann, M Waidner
Kommunikation in verteilten Systemen: Grundlagen, Anwendungen, Betrieb GI …, 1991
4101991
Modeling the security of steganographic systems
J Zöllner, H Federrath, H Klimant, A Pfitzmann, R Piotraschke, A Westfeld, ...
Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998
3521998
Asymmetric fingerprinting
B Pfitzmann, M Schunter
International Conference on the Theory and Applications of Cryptographic …, 1996
3341996
Cryptographically strong undeniable signatures, unconditionally secure for the signer
D Chaum, E van Heijst, B Pfitzmann
Advances in Cryptology—CRYPTO’91: Proceedings 11, 470-484, 1992
2891992
Anonymous fingerprinting
B Pfitzmann, M Waidner
Advances in Cryptology—EUROCRYPT’97: International Conference on the Theory …, 1997
2711997
The disadvantages of free MIX routes and how to overcome them
O Berthold, A Pfitzmann, R Standtke
Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001
2622001
The ESPRIT project CAFE—High security digital payment systems
JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ...
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
2561994
Networks without user observability
A Pfitzmann, M Waidner
Computers & Security 6 (2), 158-166, 1987
2511987
The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
M Waidner, B Pfitzmann
J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology …, 1989
2441989
Modernisierung des Datenschutzrechts: Gutachten im Auftrag des Bundesministeriums des Innern
A Roßnagel, A Pfitzmann, HJ Garstka
Bundesministerium des Innern, 2001
2132001
How to break the direct RSA-implementation of mixes
B Pfitzmann, A Pfitzmann
Advances in Cryptology—EUROCRYPT’89: Workshop on the Theory and Application …, 1990
1951990
Networks without user observability—design options
A Pfitzmann, M Waidner
Workshop on the Theory and Application of of Cryptographic Techniques, 245-253, 1985
1921985
Breaking an efficient anonymous channel
B Pfitzmann
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
1851995
Privacy-enhancing identity management
M Hansen, P Berlich, J Camenisch, S Clauß, A Pfitzmann, M Waidner
Information security technical report 9 (1), 35-44, 2004
1792004
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
E Franz, A Jerichow, S Möller, A Pfitzmann, I Stierand
Information Hiding: First International Workshop Cambridge, UK, May 30–June …, 1996
1571996
Trusting mobile user devices and security modules
A Pfitzmann, B Pfitzmann, M Schunter, M Waidner
Computer 30 (2), 61-68, 1997
1541997
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20