The documents distributed by this server have been provided by the
contributing authors as a means to ensure timely dissemination of
scholarly and technical work on a noncommercial basis. Copyright and
all rights therein are maintained by the authors or by other copyright
holders, notwithstanding that they have offered their works here
electronically. It is understood that all persons copying this
information will adhere to the terms and constraints invoked by each
author's copyright.
These works may not be reposted without the explicit permission
of the copyright holder.
N. Asokan, Birgit Baum-Waidner, Matthias
Schunter, and Michael Waidner.
Optimistic synchronous multi-party contract signing.
Research Report RZ 3089, IBM Research Division, December 1998.
(Postscript)
Jose L. Abad-Peiro, N. Asokan, Michael
Steiner, and Michael Waidner.
Designing a
generic payment service.
IBM Systems Journal, 37(1):72-88, January 1998.
Jose L. Abad-Peiro and Jean-Jacques
Quisquater.
Quality in the access to information.
Research Report RZ 3017 (# 93063), IBM Research, April 1998.
(Postscript)
Giuseppe Ateniese, Michael Steiner, and
Gene Tsudik.
Authenticated group key agreement and friends.
In Proceedings of the 5th ACM Conference on Computer and Communications
Security, pages 17-26, San Francisco, California, November 1998. ACM
Press.
A journal version of this paper appeared later in JSAC [AtStTs2000].
(Postscript)
Giuseppe Ateniese, Michael Steiner, and
Gene Tsudik.
Authenticated group key agreement and friends.
Research Report RZ 3063 (#93109), IBM Research, October 1998.
Appeared later as [AST98a]. See also [AtStTs2000] for a revised
journal version.
N. Asokan, Victor Shoup, and Michael
Waidner.
Asynchronous protocols for optimistic fair exchange.
In Proceedings of the IEEE Symposium on Research in Security and
Privacy, pages 86-99, Oakland, CA, May 1998. IEEE Computer Society,
Technical Committee on Security and Privacy, IEEE Computer Society Press.
A minor bug in the proceedings version was fixed. An errata sheet, distributed
at the conference, is available at 1998/ASW98-errata.ps.gz.
(Postscript)
N. Asokan, Victor Shoup, and Michael
Waidner.
Optimistic fair exchange of digital signatures.
In Kaisa Nyberg, editor, Advances in Cryptology --
EUROCRYPT98, volume 1403 of Lecture Notes in Computer
Science, pages 591-606. International Association for Cryptologic
Research, Springer-Verlag, Berlin Germany, 1998.
A longer version is available [ASW97b]; A related paper [ASW98a] is
available as well.
(Postscript)
N. Asokan, Els Van Herreweghen, and
Michael Steiner.
Towards a framework for handling disputes in payment systems.
Research Report RZ 2996, IBM Research, March 1998.
Also available as [AVHS98b].
(Postscript)
N. Asokan, Els Van Herreweghen, and
Michael Steiner.
Towards a framework for handling disputes in payment systems.
In Proceedings of the 3rd USENIX Workshop on Electronic
Commerce, pages 187-202, Boston, Mass., September 1998. USENIX.
(Postscript)
Klaus Becker and Uta Wille.
Communication complexity of group key distribution.
Research Report RZ 2995 (#93041), IBM Research, March 1998.
For an updated version see [BW98b].
(Postscript)
Klaus Becker and Uta Wille.
Communication complexity of group key distribution.
In Proceedings of the 5th ACM Conference on Computer and Communications
Security, pages 1-6, San Francisco, California, November 1998. ACM
Press.
(Postscript)
Birgit Baum-Waidner and Michael Waidner.
Optimistic asynchronous multi-party contract signing.
Research Report RZ 3078, IBM Research Division, November 1998.
(PDF)
Christian Cachin, Claude Crépeau, and
Julien Marcil.
Oblivious transfer with a memory-bounded receiver.
In Proceedings of the 39th Symposium on Foundations of Computer Science
(FOCS), pages 493-502. IEEE Computer Society Press, 1998.
(Postscript)
Ronald Cramer and Victor Shoup.
A practical public key cryptosystem provably secure against adaptive chosen
ciphertext attack.
In Hugo Krawczyk, editor, Advances in Cryptology -- CRYPTO98,
volume 1462 of Lecture Notes in Computer Science, pages 13-25.
International Association for Cryptologic Research, Springer-Verlag, Berlin
Germany, 1998.
Ronald Cramer and Victor Shoup.
Signature schemes based on the strong RSA assumption.
Research Report RZ 3083, IBM Research, December 1998.
Also accessible via the Theory of Cryptography as record 99-01. An updated
version can be found in [CraSho99].
Hervé Debar, Marc Dacier, Medhi
Nassehi, and Andreas Wespi.
Fixed vs. variable-length patterns for detecting suspicious process behavior.
In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter
Gollmann, editors, Computer Security - ESORICS 98, 5th European
Symposium on Research in Computer Security, volume 1485 of
LNCS, pages 1-15, Louvain-la-Neuve, Belgium, September 1998.
Springer Verlag.
Hervé Debar, Marc Dacier, Andreas
Wespi, and Stefan Lampart.
A workbench for intrusion detection systems.
Technical Report RZ 6519, IBM Zurich Research Laboratory, Säumerstrasse 4,
CH-8803 Rüschlikon, Switzerland, March 1998.
Philip Hawkes and Luke O'Connor.
Asmptotic bounds on differential probabilities.
Research Report RZ 3018 (#93064), IBM Research, April 1998.
(Postscript)
Anja Jerichow, Jan Müller, Andreas
Pfitzmann, Birgit Pfitzmann, and Michael Waidner.
Real-time Mixes: A bandwidth-efficient anonymity protocol.
IEEE Journal on Selected Areas in Communications,
16(4):495-509, 1998.
Günter Karjoth, N. Asokan, and Ceki
Gülcü.
Protecting the computation results of free-roaming agents.
In K. Rothermel and F. Hohl, editors, Second International Workshop on
Mobile Agents (MA '98), volume 1477 of Lecture Notes in Computer
Science, pages 195-207. Springer-Verlag, Berlin Germany, 1998.
Günter Karjoth, N. Asokan, and Ceki
Gülcü.
Protecting the computation results of free-roaming agents.
Personal Technologies, 2(2):92-99, June 1998.
reprint of [KAG98a].
Günter Karjoth.
Authorization in CORBA security.
In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors,
Proceedings of the Fifth European Symposium on Research in Computer
Security (ESORICS), volume 1485 of Lecture Notes in Computer
Science, pages 143-158. Springer-Verlag, Berlin Germany, September
1998.
Günter Karjoth, Danny B. Lange, and
Mitsuru Oshima.
A
security model for aglets.
In G. Vigna, editor, Mobile Agents and Security, volume 1419 of
Lecture Notes in Computer Science, pages 188-205.
Springer-Verlag, Berlin Germany, 1998.
reprint of [KaLaOs97].
Birgit Pfitzmann, Matthias Schunter, and
Michael Waidner.
Optimal efficiency of optimistic contract signing.
In Proceedings of the Seventeenth Annual ACM Symposium on Principles of
Distributed Computing, pages 113-122, New York, May 1998. ACM.
(PDF)
James Riordan and Bruce Schneier.
A certified e-mail protocol.
In 14th Annual Computer Security Applications Conference, Phoenix,
AZ, USA, 1998. ACM.
(Postscript)
James Riordan and Bruce Schneier.
Environmental key generation towards clueless agents.
In G. Vigna, editor, Mobile Agents and Security, volume 1419 of
Lecture Notes in Computer Science, pages 15-24.
Springer-Verlag, Berlin Germany, 1998.
Marcus Sasse.
Smartcard-supported internet payments.
Master's thesis, Institut für Informatik, Universität Hildesheim,
Germany, April 1998.
(Postscript)
Victor Shoup and Rosario Gennaro.
Securing threshold cryptosystems against chosen ciphertext attack.
In Kaisa Nyberg, editor, Advances in Cryptology --
EUROCRYPT98, volume 1403 of Lecture Notes in Computer
Science, pages 1-16. International Association for Cryptologic
Research, Springer-Verlag, Berlin Germany, 1998.
(Postscript)
Michael Steiner, Gene Tsudik, and Michael
Waidner.
CLIQUES: A new approach to group key agreement.
In 18th International Conference on Distributed Computing Systems
(ICDCS'98), pages 380-387, Amsterdam, May 1998. IEEE Computer
Society Press.
Appeared as heavily revised and extended journal version in [StTsWa2000].
(Postscript)
Michael Waidner.
Open issues in secure electronic commerce.
Technical Report RZ 3070 (#93116), IBM Research, October 1998.
See [Waidne2000] for a revised version.
(Postscript)