Stefan Katzenbeisser
Stefan Katzenbeisser
Professor, Chair of Computer Engineering, University of Passau
Bestätigte E-Mail-Adresse bei uni-passau.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Information Hiding
S Katzenbeisser, FAP Petitcolas
Artech House, London, 2000
3068*2000
Digital Watermarking
S Katzenbeisser, FAP Petitcolas
Artech House, London, 2000
30612000
Privacy-preserving face recognition
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft
International symposium on privacy enhancing technologies symposium, 235-253, 2009
5912009
A survey of steganographic techniques
NF Johnson, S Katzenbeisser
Information hiding, 43-78, 2000
3572000
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 283-301, 2012
2862012
Distributed attribute-based encryption
S Müller, S Katzenbeisser, C Eckert
International Conference on Information Security and Cryptology, 20-36, 2008
2702008
Structure and anonymity of the bitcoin transaction graph
M Ober, S Katzenbeisser, K Hamacher
Future internet 5 (2), 237-250, 2013
2672013
Privacy preserving error resilient DNA searching through oblivious automata
JR Troncoso-Pastoriza, S Katzenbeisser, M Celik
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2342007
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
International Conference on Detection of Intrusions and Malware, and …, 2005
2172005
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
2002007
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
A Van Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, ...
International Conference on Financial Cryptography and Data Security, 374-389, 2012
1642012
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B Škorić, S Katzenbeisser, MU Celik
Designs, Codes and Cryptography 46 (2), 137-166, 2008
1522008
Secure two-party computations in ANSI C
A Holzer, M Franz, S Katzenbeisser, H Veith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1432012
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Annual Cryptology Conference, 51-70, 2011
1432011
Defining security in steganographic systems
S Katzenbeisser, FAP Petitcolas
Security and Watermarking of Multimedia Contents IV 4675, 50-56, 2002
1412002
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
1352013
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016
1262016
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1222010
Malware normalization
M Christodorescu, J Kinder, S Jha, S Katzenbeisser, H Veith
University of Wisconsin-Madison Department of Computer Sciences, 2005
1192005
On multi-authority ciphertext-policy attribute-based encryption
S Muller, S Katzenbeisser, C Eckert
Bulletin of the Korean Mathematical Society 46 (4), 803-819, 2009
1152009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20