Johannes Merkle

According to our database1, Johannes Merkle authored at least 36 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-biometrische Kryptosysteme.
Datenschutz und Datensicherheit, 2023

Multi-Biometric Fuzzy Vault based on Face and Fingerprints.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
State of the Art of Quality Assessment of Facial Images.
CoRR, 2022

Deep face fuzzy vault: Implementation and performance.
Comput. Secur., 2022

Fusion of Face Demorphing and Deep Face Representations for Differential Morphing Attack Detection.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022

2020
Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS) Version 1.3.
RFC, February, 2020

Deep Face Representations for Differential Morphing Attack Detection.
IEEE Trans. Inf. Forensics Secur., 2020

Morphing-Angriffe.
Datenschutz und Datensicherheit, 2020

Simulation of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks.
Proceedings of the BIOSIG 2020, 2020

2019
Face Recognition Systems Under Morphing Attacks: A Survey.
IEEE Access, 2019

Fingerprint Pre-Alignment based on Deep Learning.
Proceedings of the 2019 International Conference of the Biometrics Special Interest Group, 2019

2017
Xtarp: Improving the Tented Arch Reference Point Detection Algorithm.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

2016
Correlation-resistant fuzzy vault for fingerprints.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

2015
HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3.
RFC, October, 2015

Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features.
Proceedings of the BIOSIG 2015, 2015

2014
Requirements for Standard Elliptic Curves.
IACR Cryptol. ePrint Arch., 2014

2013
Elliptic Curve Cryptography (ECC) Brainpool Curves for Transport Layer Security (TLS).
RFC, October, 2013

Using the Elliptic Curve Cryptography (ECC) Brainpool Curves for the Internet Key Exchange Protocol Version 2 (IKEv2).
RFC, July, 2013

Security of the Improved Fuzzy Vault Scheme in the Presence of Record Multiplicity (Full Version).
CoRR, 2013

2012
Multi-modal and multi-instance fusion for biometric cryptosystems.
Proceedings of the 2012 BIOSIG, 2012

2011
Biometric Template Protection - Ein Bericht über das Projekt BioKeyS.
Datenschutz und Datensicherheit, 2011

Filtertechniken für geschützte biometrische Datenbanken.
Proceedings of the Datenbanksysteme für Business, 2011

Efficient Database Techniques for Identification with Fuzzy Vault Templates.
Proceedings of the BIOSIG 2011, 2011

2010
Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation.
RFC, March, 2010

Performance of the Fuzzy Vault for Multiple Fingerprints (Extended Version)
CoRR, 2010

Towards Improving the NIST Fingerprint Image Quality (NFIQ) Algorithm (Extended Version)
CoRR, 2010

Towards Improving the NIST Fingerprint Image Quality (NFIQ) Algorithm.
Proceedings of the BIOSIG 2010, 2010

Performance of the Fuzzy Vault for Multiple Fingerprints.
Proceedings of the BIOSIG 2010, 2010

A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems.
Proceedings of the BIOSIG 2010, 2010

2009
Datenschutzfreundliche Authentisierung mit Fingerabdrücken - Konzeption und Implementierung eines Template Protection Verfahrens - ein Erfahrungsbericht.
Datenschutz und Datensicherheit, 2009

2008
A Cryptographic Biometric Authentication System based on Genetic Fingerprints.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

2000
Effiziente Signaturerzeugung durch Server-Unterstützung und Vorberechnung.
PhD thesis, 2000

An Efficient NICE-Schnorr-Type Signature Scheme.
Proceedings of the Public Key Cryptography, 2000

Multi-round passive attacks on server-aided RSA protocols.
Proceedings of the CCS 2000, 2000

1999
Secure and Cost Efficient Electronic Stamps.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1997
On the Security of Server aided RSA protocols
Electron. Colloquium Comput. Complex., 1997


  Loading...