2008 - ACM Distinguished Member
2004 - IEEE Fellow For contributions to the theory and practice of information security, privacy and cryptography.
Computer security, Cryptography, Cryptographic protocol, Distributed computing and Encryption are his primary areas of study. His Computer security research is multidisciplinary, relying on both Optimistic fair exchange, Payment, Software deployment and Internet privacy. His Cryptography research incorporates themes from Theoretical computer science, Digital signature, The Internet, Authentication and Key.
His work in Theoretical computer science tackles topics such as Key exchange which are related to areas like Key distribution, Hash-based message authentication code, Computational hardness assumption and Security of cryptographic hash functions. The Distributed computing study combines topics in areas such as Reactive system, Formal verification, Diffie–Hellman key exchange and Concrete security. His research integrates issues of Telecommunications network and Traffic analysis in his study of Encryption.
His main research concerns Computer security, The Internet, Cryptography, Theoretical computer science and Internet privacy. He specializes in Computer security, namely Authentication. His work carried out in the field of The Internet brings together such families of science as Computer network and Man-in-the-middle attack.
His study in Cryptography is interdisciplinary in nature, drawing from both Key, Distributed computing, Encryption and Asynchronous communication. He interconnects Reactive system, Hash function and Formal methods in the investigation of issues within Theoretical computer science. His Cryptographic protocol study incorporates themes from Message authentication code, Hash-based message authentication code and Key exchange.
His primary areas of investigation include Computer security, The Internet, Server, Computer network and DNS spoofing. Computer security and Denial-of-service attack are commonly linked in his work. He has researched The Internet in several fields, including Networking hardware, Cryptography and Internet privacy.
The concepts of his Internet privacy study are interwoven with issues in Security framework, Key and Industrial control system. His work on Name server as part of general Server study is frequently linked to Path MTU Discovery, bridging the gap between disciplines. Michael Waidner works mostly in the field of Computer network, limiting it down to topics relating to Round-robin DNS and, in certain cases, Internet users, Network topology, End user and Distributed computing.
His primary areas of investigation include Computer security, The Internet, Server, Computer network and DNS spoofing. As part of his studies on Computer security, Michael Waidner frequently links adjacent subjects like Internet privacy. His biological study spans a wide range of topics, including Key and Industrial control system.
The Internet and Cryptography are frequently intertwined in his study. He has included themes like Networking hardware, OpenFlow, Robustness and Router in his Cryptography study. The various areas that Michael Waidner examines in his DNS spoofing study include Domain and Man-in-the-middle attack, Authentication.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Diffie-Hellman key distribution extended to group communication
Michael Steiner;Gene Tsudik;Michael Waidner.
computer and communications security (1996)
Key agreement in dynamic peer groups
M. Steiner;G. Tsudik;M. Waidner.
IEEE Transactions on Parallel and Distributed Systems (2000)
Optimistic protocols for fair exchange
N. Asokan;Matthias Schunter;Michael Waidner.
computer and communications security (1997)
Security and privacy challenges in industrial internet of things
Ahmad-Reza Sadeghi;Christian Wachsmann;Michael Waidner.
design automation conference (2015)
CLIQUES: a new approach to group key agreement
Michael J. Steiner;Gene Tsudik;Michael Waidner.
international conference on distributed computing systems (1998)
Asynchronous protocols for optimistic fair exchange
N. Asokan;V. Shoup;M. Waidner.
ieee symposium on security and privacy (1998)
Optimistic fair exchange of digital signatures
N. Asokan;V. Shoup;M. Waidner.
IEEE Journal on Selected Areas in Communications (2000)
A model for asynchronous reactive systems and its application to secure message transmission
B. Pfitzmann;M. Waidner.
ieee symposium on security and privacy (2001)
Refinement and extension of encrypted key exchange
Michael Steiner;Gene Tsudik;Michael Waidner.
Operating Systems Review (1995)
State of the art in electronic payment systems
N. Asokan;Philippe A. Janson;Michael Steiner;Michael Waidner.
Advances in Computers (2000)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
IBM (United States)
Intel (United States)
Intel (United States)
University of Waterloo
University of California, Irvine
DFINITY
King Abdullah University of Science and Technology
New York University
Newcastle University
University of Bern
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: