Stefan Katzenbeisser

According to our database1, Stefan Katzenbeisser authored at least 227 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Decay-Based DRAM PUFs in Commodity Devices.
IEEE Trans. Dependable Sec. Comput., 2019

Safety and Security Coengineering in Embedded Systems.
Security and Communication Networks, 2019

Security Requirements Engineering in Safety-Critical Railway Signalling Networks.
Security and Communication Networks, 2019

Private Evaluation of Decision Trees using Sublinear Cost.
PoPETs, 2019

Secure Computation of the kth-Ranked Element in a Star Network.
CoRR, 2019

MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
CoRR, 2019

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
CoRR, 2019

Why Johnny Can't Develop Mobile Crowdsourcing Applications with Location Privacy.
CoRR, 2019

On (The Lack Of) Location Privacy in Crowdsourcing Applications.
Proceedings of the 28th USENIX Security Symposium, 2019

Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Vibrational Covert Channels using Low-Frequency Acoustic Signals.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Privacy & Usability of IPTV Recommender Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Dynamic Physically Unclonable Functions.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

A Practical Attestation Protocol for Autonomous Embedded Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Security in Autonomous Systems.
Proceedings of the 24th IEEE European Test Symposium, 2019

Spying on Temperature using DRAM.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

2018
Eliminating Leakage in Reverse Fuzzy Extractors.
IEEE Trans. Information Forensics and Security, 2018

Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption.
IEEE Trans. Information Forensics and Security, 2018

Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152).
Dagstuhl Reports, 2018

Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security .
Cryptography, 2018

An Overview of DRAM-Based Security Primitives.
Cryptography, 2018

QRES: Quantitative Reasoning on Encrypted Security SLAs.
CoRR, 2018

Examining Leakage of Access Counts in ORAM Constructions.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Tracking Private Browsing Sessions using CPU-based Covert Channels.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular Networks.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks.
Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing Systems, 2018

Security Analysis of the RaSTA Safety Protocol.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Behavioral Workload Generation for IPTV.
Proceedings of the 8th IEEE International Conference on Consumer Electronics - Berlin, 2018

Zero-permission acoustic cross-device tracking.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Proceedings of the International Workshop on MILS: Architecture and Assurance for Secure Systems, 2018

Securing IoT Devices Using Robust DRAM PUFs.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

Towards Practical RAM Based Secure Computation.
Proceedings of the Computer Security, 2018

Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

PROPYLA: Privacy Preserving Long-Term Secure Storage.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Compilation for Secure Multi-party Computation
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-67521-3, 2017

Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
PoPETs, 2017

Genomic Data Privacy and Security: Where We Stand and Where We Are Heading.
IEEE Security & Privacy, 2017

Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
IACR Cryptology ePrint Archive, 2017

ORAMs in a Quantum World.
IACR Cryptology ePrint Archive, 2017

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
IACR Cryptology ePrint Archive, 2017

On compiling Boolean circuits optimized for secure multi-party computation.
Formal Methods in System Design, 2017

PRoPyLA: Privacy Preserving Long-Term Secure Storage.
CoRR, 2017

Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
CoRR, 2017

SCAPI: a scalable attestation protocol to detect software and physical attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A Security Architecture for Railway Signalling.
Proceedings of the Computer Safety, Reliability, and Security, 2017

ORAMs in a Quantum World.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

A lightweight protocol for privacy preserving division.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Challenges and Approaches in Securing Safety-Relevant Railway Signalling.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
Proceedings of the Computer Security - ESORICS 2017, 2017

Using Oblivious RAM in Genomic Studies.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Microblogging in a Privacy-Preserving way.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Measuring privacy in high dimensional microdata collections.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
On the Privacy and Performance of Mobile Anonymous Microblogging.
IEEE Trans. Information Forensics and Security, 2016

Practical DRAM PUFs in Commodity Devices.
IACR Cryptology ePrint Archive, 2016

Blurry-ORAM: A Multi-Client Oblivious Storage Architecture.
IACR Cryptology ePrint Archive, 2016

Low-temperature data remanence attacks against intrinsic SRAM PUFs.
IACR Cryptology ePrint Archive, 2016

Technischer Schutz vor geheimdienstlicher Überwachung.
Datenschutz und Datensicherheit, 2016

Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032).
Dagstuhl Reports, 2016

Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Scalable secure computation from ANSI-C.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Correcting Finite Sampling Issues in Entropy l-diversity.
Proceedings of the Privacy in Statistical Databases, 2016

Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
Proceedings of the Computer Security - ESORICS 2016, 2016

Compiling Low Depth Circuits for Practical Secure Computation.
Proceedings of the Computer Security - ESORICS 2016, 2016

Run-Time Accessible DRAM PUFs in Commodity Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

Covert channels using mobile device's magnetic field sensors.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016

2015
Genomic Privacy (Dagstuhl Seminar 15431).
Dagstuhl Reports, 2015

Faster Secure Computation through Automatic Parallelization.
Proceedings of the 24th USENIX Security Symposium, 2015

PUF-Based Software Protection for Low-End Embedded Devices.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Compilation for Secure Two-Party Computations.
Proceedings of the Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März, 2015

Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors.
Proceedings of the Financial Cryptography and Data Security, 2015

On the Systematic Drift of Physically Unclonable Functions Due to Aging.
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015

Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015).
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Information Hiding.
Artech House information security and privacy series, Artech House, ISBN: 978-1-60807-928-5, 2015

2014
Eliminating Leakage in Reverse Fuzzy Extractors.
IACR Cryptology ePrint Archive, 2014

Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive, 2014

General Impossibility of Group Homomorphic Encryption in the Quantum World.
IACR Cryptology ePrint Archive, 2014

General Impossibility of Group Homomorphic Encryption in the Quantum World.
CoRR, 2014

Covert Computation - Hiding code in code through compile-time obfuscation.
Computers & Security, 2014

Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Data-centric phishing detection based on transparent virtualization technologies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

General Impossibility of Group Homomorphic Encryption in the Quantum World.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

IT-Security in Railway Signalling Systems.
Proceedings of the ISSE 2014, 2014

Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

MoP-2-MoP - Mobile Private Microblogging.
Proceedings of the Financial Cryptography and Data Security, 2014

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Proceedings of the Compiler Construction - 23rd International Conference, 2014

Hot-hardening: getting more out of your security settings.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

AES-SEC: Improving Software Obfuscation through Hardware-Assistance.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Efficiently Outsourcing Multiparty Computation Under Multiple Keys.
IEEE Trans. Information Forensics and Security, 2013

Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors].
IEEE Signal Process. Mag., 2013

Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
Inf. Sec. Techn. Report, 2013

Efficiently Outsourcing Multiparty Computation under Multiple Keys.
IACR Cryptology ePrint Archive, 2013

Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers.
IACR Cryptology ePrint Archive, 2013

Structure and Anonymity of the Bitcoin Transaction Graph.
Future Internet, 2013

Group homomorphic encryption: characterizations, impossibility results, and applications.
Des. Codes Cryptogr., 2013

Hardware-based Security for Virtual Trusted Platform Modules.
CoRR, 2013

Improving security of virtual machines during live migrations.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine.
Proceedings of the Communications and Multimedia Security, 2013

Covert computation: hiding code in code for obfuscation purposes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Challenges in compiler construction for secure two-party computation.
Proceedings of the PETShop'13, 2013

Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Secure PRNG seeding on commercial off-the-shelf microcontrollers.
Proceedings of the TrustED'13, 2013

Event-based isolation of critical data in the cloud.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version).
IACR Cryptology ePrint Archive, 2012

Physical Unclonable Functions.
Datenschutz und Datensicherheit, 2012

Privacy-preserving architecture for forensic image recognition.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Converse PUF-Based Authentication.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
Proceedings of the Information Security - 15th International Conference, 2012

Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
Proceedings of the Information Security - 15th International Conference, 2012

Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012

Robust Resampling Detection in Digital Images.
Proceedings of the Communications and Multimedia Security, 2012

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Secure two-party computations in ANSI C.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Fast dynamic extracted honeypots in cloud computing.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Malware Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Tardos Fingerprinting Codes in the Combined Digit Model.
IEEE Trans. Information Forensics and Security, 2011

Recyclable PUFs: logically reconfigurable PUFs.
J. Cryptographic Engineering, 2011

Hiding the Policy in Cryptographic Access Control.
IACR Cryptology ePrint Archive, 2011

Recyclable PUFs: Logically Reconfigurable PUFs.
IACR Cryptology ePrint Archive, 2011

Physically Uncloneable Functions in the Universal Composition Framework.
IACR Cryptology ePrint Archive, 2011

Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511).
Dagstuhl Reports, 2011

Hiding the Policy in Cryptographic Access Control.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Trustable outsourcing of business processes to cloud computing environments.
Proceedings of the 5th International Conference on Network and System Security, 2011

Public security: simulations need to replace conventional wisdom.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Code Obfuscation against Static and Dynamic Reverse Engineering.
Proceedings of the Information Hiding - 13th International Conference, 2011

Detecting Computer Worms in the Cloud.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Security of copy-move forgery detection techniques.
Proceedings of the IEEE International Conference on Acoustics, 2011

Oblivious Outsourced Storage with Delegation.
Proceedings of the Financial Cryptography and Data Security, 2011

Towards Secure Bioinformatics Services (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

Physically Uncloneable Functions in the Universal Composition Framework.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Recyclable PUFs: Logically Reconfigurable PUFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Strong PUFs: Models, Constructions, and Security Proofs.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Challenges and Solutions in Multimedia Document Authentication.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Digital Watermarking.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Semantic integrity in large-scale online simulations.
ACM Trans. Internet Techn., 2010

Proactive Detection of Computer Worms Using Model Checking.
IEEE Trans. Dependable Sec. Comput., 2010

Secure Computations on Non-Integer Values.
IACR Cryptology ePrint Archive, 2010

A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP.
IACR Cryptology ePrint Archive, 2010

Computation of mutual information from Hidden Markov Models.
Computational Biology and Chemistry, 2010

Secure computations on non-integer values.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

The PUF Promise.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Collusion-Secure Fingerprint Watermarking for Real World Applications.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Audio watermarking forensics: detecting malicious re-embedding.
Proceedings of the Media Forensics and Security II, 2010

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
Proceedings of the Communications and Multimedia Security, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

A New DRM Architecture with Strong Enforcement.
Proceedings of the ARES 2010, 2010

2009
Tardos Fingerprinting Codes in the Combined Digit Model.
IACR Cryptology ePrint Archive, 2009

PUF-Based Authentication Protocols - Revisited.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Tardos fingerprinting codes in the combined digit model.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Revocation of TPM Keys.
Proceedings of the Trusted Computing, 2009

Privacy-Preserving Face Recognition.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

On the Reliability of Cell Phone Camera Fingerprint Recognition.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009

2008
A Buyer-Seller Watermarking Protocol Based on Secure Embedding.
IEEE Trans. Information Forensics and Security, 2008

Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks.
IEEE Trans. Information Forensics and Security, 2008

Privacy-Preserving Matching of DNA Profiles.
IACR Cryptology ePrint Archive, 2008

Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes.
Des. Codes Cryptogr., 2008

Measuring unlinkability revisited.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams.
Proceedings of the Security, 2008

Trust in Consumer Electronics.
Proceedings of the ISSE 2008, 2008

Distributed Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008

Improving the scalability of platform attestation.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Privacy-Preserving Recommendation Systems for Consumer Healthcare Services.
Proceedings of the The Third International Conference on Availability, 2008

2007
Software transformations to improve malware detection.
Journal in Computer Virology, 2007

Decode-Time Forensic Watermarking of AAC Bitstreams.
IEEE Trans. Information Forensics and Security, 2007

Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes.
IACR Cryptology ePrint Archive, 2007

Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
IACR Cryptology ePrint Archive, 2007

Signal Processing in the Encrypted Domain.
EURASIP J. Information Security, 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Information Security, 2007

NS2: Networked Searchable Store with Correctness.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Computing under occupation.
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007

A secure multidimensional point inclusion protocol.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Rights Management Technologies: A Good Choice for Securing Electronic Health Records?
Proceedings of the ISSE/SECURE 2007, 2007

Combining Tardos Fingerprinting Codes and Fingercasting.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Forensic Watermarking During AAC Playback.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams.
Proceedings of the International Conference on Image Processing, 2007

Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables.
Proceedings of the IEEE International Conference on Acoustics, 2007

Privacy preserving error resilient dna searching through oblivious automata.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Forensic Watermarking in Digital Rights Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
The influence of neighbourhood and choice on the complexity of finding pure Nash equilibria.
Inf. Process. Lett., 2006

Secure Watermark Embedding Through Partial Encryption.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens.
Proceedings of the Information Hiding, 8th International Workshop, 2006

A Computational Model for Watermark Robustness.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Graceful infringement reactions in DRM systems.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2005
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
CoRR, 2005

Malware Engineering.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Ensuring Media Integrity on Third-Party Infrastructures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Detecting Malicious Code by Model Checking.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
Guest Editorial: Supplement on Secure Media - I.
IEEE Trans. Signal Processing, 2004

Provably Secure Authentication of Digital Media Through Invertible Watermarks.
IACR Cryptology ePrint Archive, 2004

Malicious attacks on media authentication schemes based on invertible watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Towards Formal Semantics for ODRL.
Proceedings of the First International Workshop on the Open Digital Rights Language (ODRL), 2004

Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security).
Proceedings of the Information Security, 7th International Conference, 2004

2003
Editorial.
Multimedia Syst., 2003

Watermark detection with zero-knowledge disclosure.
Multimedia Syst., 2003

On the Integration of Watermarks and Cryptography.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Watermarking schemes provably secure against copy and ambiguity attacks.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

2002
Securing symmetric watermarking schemes against protocol attacks.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Defining security in steganographic systems.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
Applied Information Security for m-Commerce and Digital Television Environments.
Proceedings of the Electronic Commerce and Web Technologies, 2001

On the Design of Copyright Protection Protocols for Multimedia Distributioni Using Symmetric and Public-Key Watermarking.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property.
Proceedings of the Electronic Commerce and Web Technologies, 2000

MATLAB 6 - eine Einführung.
Springer, ISBN: 978-3-211-83487-9, 2000


  Loading...