2008 - ACM Senior Member
Michael Steiner focuses on Cryptography, Computer security, Group key, Group Domain of Interpretation and Encryption. His Cryptography research includes elements of The Internet, Authorization, Payment service provider and Anonymity. His research in Computer security focuses on subjects like Payment, which are connected to Key management and Software deployment.
As part of the same scientific family, Michael Steiner usually focuses on Group key, concentrating on Distributed computing and intersecting with Class and Theoretical computer science. Key and Key distribution are the two main areas of interest in his Group Domain of Interpretation studies. As part of one scientific family, Michael Steiner deals mainly with the area of Encryption, narrowing it down to issues related to the Database, and often Data structure, Asymptotically optimal algorithm, Web page and Server.
His main research concerns Computer security, Cryptography, Computer network, Encryption and Payment. Michael Steiner has researched Computer security in several fields, including The Internet and Internet privacy. His Cryptography research is multidisciplinary, relying on both Computational complexity theory, Theoretical computer science, Authorization and Key.
His primary area of study in Computer network is in the field of Key exchange. His work is dedicated to discovering how Encryption, Database are connected with Data structure and Web page and other disciplines. His work in Payment tackles topics such as Software deployment which are related to areas like Credit card.
Michael Steiner spends much of his time researching Encryption, Symmetric-key algorithm, Theoretical computer science, Database and Protocol. His work carried out in the field of Encryption brings together such families of science as Cryptography, Information retrieval, Query optimization and Web search query, Sargable. Michael Steiner is interested in Cryptographic protocol, which is a field of Cryptography.
The Theoretical computer science study combines topics in areas such as Wildcard and Scalability. His biological study spans a wide range of topics, including Web page and Data structure. His Protocol research includes themes of Private information retrieval, Authorization, Range, Plaintext and Server.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Diffie-Hellman key distribution extended to group communication
Michael Steiner;Gene Tsudik;Michael Waidner.
computer and communications security (1996)
Key agreement in dynamic peer groups
M. Steiner;G. Tsudik;M. Waidner.
IEEE Transactions on Parallel and Distributed Systems (2000)
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash;Stanislaw Jarecki;Charanjit S. Jutla;Hugo Krawczyk.
international cryptology conference (2013)
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash;Joseph Jaeger;Stanislaw Jarecki;Charanjit S. Jutla.
network and distributed system security symposium (2014)
CLIQUES: a new approach to group key agreement
Michael J. Steiner;Gene Tsudik;Michael Waidner.
international conference on distributed computing systems (1998)
New multiparty authentication services and key agreement protocols
G. Ateniese;M. Steiner;G. Tsudik.
IEEE Journal on Selected Areas in Communications (2000)
Refinement and extension of encrypted key exchange
Michael Steiner;Gene Tsudik;Michael Waidner.
Operating Systems Review (1995)
State of the art in electronic payment systems
N. Asokan;Philippe A. Janson;Michael Steiner;Michael Waidner.
Advances in Computers (2000)
The state of the art in electronic payment systems
N. Asokan;P.A. Janson;M. Steiner;M. Waidner.
IEEE Computer (1997)
iKP: a family of secure electronic payment protocols
Mihir Bellare;Juan A. Garay;Ralf Hauser;Amir Herzberg.
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1 (1995)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: