Michael Waidner
Orcid: 0000-0001-7919-9961Affiliations:
- National Research Center for Applied Cybersecurity ATHENE, germany
- Technische Universität Darmstadt, Germany
- Fraunhofer-Institut für sichere Informationstechnologie SIT, Germany
According to our database1,
Michael Waidner
authored at least 169 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2004, "For contributions to the theory and practice of information security, privacy and cryptography.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Datenschutz und Datensicherheit (dud), January, 2024
Attacking with Something That Does Not Exist: Low-Rate Flood with 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
CoRR, 2024
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 2024 Applied Networking Research Workshop, 2024
2023
PACMNET, 2023
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ANRW '21: Applied Networking Research Workshop, 2021
2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
2019
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019
2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016
Proceedings of the 2016 IEEE International Conference on Software Science, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Datenschutz und Datensicherheit, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2012
Prax. Inf.verarb. Kommun., 2012
Dagstuhl Reports, 2012
2011
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Reports, 2011
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Manifestos, 2011
2010
Andreas Pfitzmann 1958-2010: Pioneer of Technical Privacy Protection in the Information Society.
Proceedings of the Privacy and Identity Management for Life, 2010
2007
Simplified Privacy Controls for Aggregated Services - Suspend and Resume of Personal Data.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Computer Security, 2006
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
Int. J. Inf. Sec., 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Foundations of Security Analysis and Design III, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the Business Process Management, International Conference, 2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
IEEE J. Sel. Areas Commun., 2000
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Proceedings of the CCS 2000, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
1998
IEEE J. Sel. Areas Commun., 1998
Comput. Networks, 1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997
1996
Proceedings of the Computer Security, 1996
Proceedings of the CCS '96, 1996
1995
ACM SIGOPS Oper. Syst. Rev., 1995
Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Computer Security, 1994
1992
Byzantinische Verteilung ohne kryptographische Annahmen trotz beliebig vieler Fehler.
PhD thesis, 1992
Proceedings of the STACS 92, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the VIS'91, 1991
Proceedings of the STACS 91, 1991
Proceedings of the Kommunikation in Verteilten Systemen, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990
Proceedings of the Advances in Cryptology, 1990
1989
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract).
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Prax. Inf.verarb. Kommun., 1988
Datenschutz garantierende offene Kommunikationsnetze.
Inform. Spektrum, 1988
1987
Proceedings of the Fehlertolerierende Rechensysteme / Fault-Tolerant Computing Systems, 1987
1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Datenschutz und Datensicherung im Wandel der Informationstechnologien, 1985