2008 - ACM Senior Member
Her primary scientific interests are in Computer security, Theoretical computer science, Cryptography, Cryptographic protocol and Database. The study incorporates disciplines such as Scheme and Internet privacy in addition to Computer security. Her Theoretical computer science research incorporates elements of Distributed computing, Reactive system, Formal methods, Security parameter and Symmetric-key algorithm.
Her Cryptography research is multidisciplinary, incorporating perspectives in Communication source, Serviceability and Dining cryptographers problem. The various areas that Birgit Pfitzmann examines in her Cryptographic protocol study include Key exchange and 40-bit encryption, Encryption. Her studies deal with areas such as World Wide Web, Operating system and Information repository as well as Database.
Her primary areas of study are Computer security, Cryptography, Theoretical computer science, Cryptographic protocol and Database. Her Computer security research is multidisciplinary, incorporating elements of Payment, Protocol and Internet privacy. The study incorporates disciplines such as Random oracle, Secrecy, Probabilistic logic, Encryption and Asynchronous communication in addition to Cryptography.
Her Theoretical computer science study also includes
Her primary areas of investigation include Database, Cloud computing, Operating system, Distributed computing and Component. Her Database research includes themes of Computer data storage, Information repository and World Wide Web. Her research integrates issues of Computer security, Disaster recovery, Server and Projection in her study of Cloud computing.
Her research on Computer security often connects related topics like Communication source. Her work on Component-based software engineering and Metadata as part of general Operating system research is frequently linked to Test case and Extraction, thereby connecting diverse disciplines of science. Her work deals with themes such as Cryptographic protocol, Software system, Security analysis, Isolation and SIMPLE, which intersect with Distributed computing.
Database, Cloud computing, Data mining, Workload and Operating system are her primary areas of study. Her work carried out in the field of Database brings together such families of science as Graph, World Wide Web, Server and Information repository. Her study in Cloud computing is interdisciplinary in nature, drawing from both Computer security, Distributed computing and Component.
Her research in Distributed computing intersects with topics in Identification and Business agility. Her biological study spans a wide range of topics, including Matching and Multi-image. Her Operating system study deals with Program code intersecting with Computer program.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Advances in Cryptology-Eurocrypt 2001
A model for asynchronous reactive systems and its application to secure message transmission
B. Pfitzmann;M. Waidner.
ieee symposium on security and privacy (2001)
ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead
Andreas Pfitzmann;Birgit Pfitzmann;Michael Waidner.
A composable cryptographic library with nested operations
Michael Backes;Birgit Pfitzmann;Michael Waidner.
computer and communications security (2003)
Composition and integrity preservation of secure reactive systems
Birgit Pfitzmann;Michael Waidner.
computer and communications security (2000)
Method and system for attribute exchange in a heterogeneous federated environment
George Blakley;Heather Hinton;Anthony Nadalin;Birgit Pfitzmann.
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
David Chaum;Eugène van Heijst;Birgit Pfitzmann.
international cryptology conference (1991)
The ESPRIT Project CAFE - High Security Digital Payment Systems
Jean-Paul Boly;Antoon Bosselaers;Ronald Cramer;Rolf Michelsen.
european symposium on research in computer security (1994)
Birgit Pfitzmann;Matthias Schunter.
theory and application of cryptographic techniques (1996)
Method and apparatus for automated migration of data among storage centers
William R Reohr;Birgit M Pfitzmann;Kevin M Kingsbury;Laura A Richardson.
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: