Seguir
Stefan Katzenbeisser
Stefan Katzenbeisser
Professor, Chair of Computer Engineering, University of Passau
Dirección de correo verificada de uni-passau.de - Página principal
Título
Citado por
Citado por
Año
Information Hiding
S Katzenbeisser, FAP Petitcolas
Artech House, London, 2000
3379*2000
Privacy-preserving face recognition
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
7072009
A survey of steganographic techniques
NF Johnson, S Katzenbeisser
Information hiding, 43-78, 2000
3862000
Structure and anonymity of the bitcoin transaction graph
M Ober, S Katzenbeisser, K Hamacher
Future internet 5 (2), 237-250, 2013
3802013
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
3402012
Distributed attribute-based encryption
S Müller, S Katzenbeisser, C Eckert
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
3192009
Privacy preserving error resilient DNA searching through oblivious automata
JR Troncoso-Pastoriza, S Katzenbeisser, M Celik
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2702007
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005
2372005
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
A Van Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, ...
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
2182012
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
2182007
Depreciating motivation and empirical security analysis of chaos-based image and video encryption
M Preishuber, T Hütter, S Katzenbeisser, A Uhl
IEEE Transactions on Information Forensics and Security 13 (9), 2137-2150, 2018
2172018
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 1-37, 2016
1972016
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
1802013
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1772011
Secure two-party computations in ANSI C
A Holzer, M Franz, S Katzenbeisser, H Veith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1632012
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B Škorić, S Katzenbeisser, MU Celik
Designs, Codes and Cryptography 46 (2), 137-166, 2008
1622008
Defining security in steganographic systems
S Katzenbeisser, FAP Petitcolas
Security and Watermarking of Multimedia Contents IV 4675, 50-56, 2002
1582002
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1442010
Recyclable pufs: Logically reconfigurable pufs
S Katzenbeisser, Ü Kocabaş, V Van Der Leest, AR Sadeghi, GJ Schrijen, ...
Journal of Cryptographic Engineering 1, 177-186, 2011
1432011
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1392014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20