Michael Steiner
Michael Steiner
Research Scientist, Intel Labs
Verified email at acm.org
Cited by
Cited by
Diffie-Hellman key distribution extended to group communication
M Steiner, G Tsudik, M Waidner
Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996
Key agreement in dynamic peer groups
M Steiner, G Tsudik, M Waidner
IEEE Transactions on Parallel and Distributed Systems 11 (8), 769-780, 2000
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Annual cryptology conference, 353-373, 2013
Dynamic searchable encryption in very-large databases: data structures and implementation.
D Cash, J Jaeger, S Jarecki, CS Jutla, H Krawczyk, MC Rosu, M Steiner
NDSS 14, 23-26, 2014
CLIQUES: A new approach to group key agreement
M Steiner, G Tsudik, M Waidner
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
New multiparty authentication services and key agreement protocols
G Ateniese, M Steiner, G Tsudik
IEEE journal on selected areas in communications 18 (4), 628-639, 2000
Refinement and extension of encrypted key exchange
M Steiner, G Tsudik, M Waidner
ACM SIGOPS Operating Systems Review 29 (3), 22-30, 1995
State of the art in electronic payment systems
N Asokan, P Janson, M Steiner, M Waidner
Advances in Computers 53, 425-449, 2000
iKP-A Family of Secure Electronic Payment Protocols.
M Bellare, A Herzberg, M Steiner, G Tsudik, M Waidner, RC Hauser, ...
USENIX Workshop on Electronic Commerce, 1995
Authenticated group key agreement and friends
G Ateniese, M Steiner, G Tsudik
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
Design, implementation, and deployment of the iKP secure electronic payment system
M Bellare, JA Garay, R Hauser, A Herzberg, H Krawczyk, M Steiner, ...
IEEE Journal on selected areas in communications 18 (4), 611-627, 2000
Micro-payments based on iKP
R Hauser, M Steiner, M Waidner
IBM TJ Watson Research Center, 1996
Outsourced symmetric private information retrieval
S Jarecki, C Jutla, H Krawczyk, M Rosu, M Steiner
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Three-party encrypted key exchange without server public-keys
CL Lin, HM Sun, M Steiner, T Hwang
IEEE Communications letters 5 (12), 497-499, 2001
Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
C Binding, SG Hild, LJ O'connor, SK Singhal, VJ Shoup, M Steiner
US Patent 6,775,772, 2004
Smash: secure component model for cross-domain mashups on unmodified browsers
F De Keukelaere, S Bhola, M Steiner, S Chari, S Yoshihama
Proceedings of the 17th international conference on World Wide Web, 535-544, 2008
Rich queries on encrypted data: Beyond exact matches
S Faber, S Jarecki, H Krawczyk, Q Nguyen, M Rosu, M Steiner
European symposium on research in computer security, 123-145, 2015
Designing a generic payment service
JLA Peiro, N Asokan, M Steiner, M Waidner
IBM Systems Journal 37 (1), 72-88, 1998
Systems and methods for protecting web based applications from cross site request forgery attacks
SK Bhola, TE Kaplinger, M Steiner
US Patent 8,020,193, 2011
Intrusion detection system
S Chari, PC Cheng, J Rao, P Rohatgi, M Steiner
US Patent App. 11/037,695, 2006
The system can't perform the operation now. Try again later.
Articles 1–20