Anonymity, unobservability, and pseudonymity—a proposal for terminology A Pfitzmann, M Köhntopp Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001 | 2122* | 2001 |
Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools-and some lessons learned A Westfeld, A Pfitzmann International workshop on information hiding, 61-76, 1999 | 1879 | 1999 |
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, and Identity Management A Pfitzmann, M Hansen Technical report, August 2010. v0. 34, 2010 | 946* | 2010 |
Collision-free accumulators and fail-stop signature schemes without trees N Barić, B Pfitzmann International conference on the theory and applications of cryptographic …, 1997 | 788 | 1997 |
ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead A Pfitzmann, B Pfitzmann, M Waidner Kommunikation in verteilten Systemen: Grundlagen, Anwendungen, Betrieb GI …, 1991 | 410 | 1991 |
Modeling the security of steganographic systems J Zöllner, H Federrath, H Klimant, A Pfitzmann, R Piotraschke, A Westfeld, ... Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998 | 352 | 1998 |
Asymmetric fingerprinting B Pfitzmann, M Schunter International Conference on the Theory and Applications of Cryptographic …, 1996 | 334 | 1996 |
Cryptographically strong undeniable signatures, unconditionally secure for the signer D Chaum, E van Heijst, B Pfitzmann Advances in Cryptology—CRYPTO’91: Proceedings 11, 470-484, 1992 | 289 | 1992 |
Anonymous fingerprinting B Pfitzmann, M Waidner Advances in Cryptology—EUROCRYPT’97: International Conference on the Theory …, 1997 | 271 | 1997 |
The disadvantages of free MIX routes and how to overcome them O Berthold, A Pfitzmann, R Standtke Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001 | 262 | 2001 |
The ESPRIT project CAFE—High security digital payment systems JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ... Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994 | 256 | 1994 |
Networks without user observability A Pfitzmann, M Waidner Computers & Security 6 (2), 158-166, 1987 | 251 | 1987 |
The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability M Waidner, B Pfitzmann J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology …, 1989 | 244 | 1989 |
Modernisierung des Datenschutzrechts: Gutachten im Auftrag des Bundesministeriums des Innern A Roßnagel, A Pfitzmann, HJ Garstka Bundesministerium des Innern, 2001 | 213 | 2001 |
How to break the direct RSA-implementation of mixes B Pfitzmann, A Pfitzmann Advances in Cryptology—EUROCRYPT’89: Workshop on the Theory and Application …, 1990 | 195 | 1990 |
Networks without user observability—design options A Pfitzmann, M Waidner Workshop on the Theory and Application of of Cryptographic Techniques, 245-253, 1985 | 192 | 1985 |
Breaking an efficient anonymous channel B Pfitzmann Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 185 | 1995 |
Privacy-enhancing identity management M Hansen, P Berlich, J Camenisch, S Clauß, A Pfitzmann, M Waidner Information security technical report 9 (1), 35-44, 2004 | 179 | 2004 |
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best E Franz, A Jerichow, S Möller, A Pfitzmann, I Stierand Information Hiding: First International Workshop Cambridge, UK, May 30–June …, 1996 | 157 | 1996 |
Trusting mobile user devices and security modules A Pfitzmann, B Pfitzmann, M Schunter, M Waidner Computer 30 (2), 61-68, 1997 | 154 | 1997 |