Seguir
Stefan Katzenbeisser
Stefan Katzenbeisser
Professor, Chair of Computer Engineering, University of Passau
Dirección de correo verificada de uni-passau.de - Página principal
Título
Citado por
Citado por
Año
Information Hiding
S Katzenbeisser, FAP Petitcolas
Artech House, London, 2000
3396*2000
Privacy-preserving face recognition
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
7282009
Structure and anonymity of the bitcoin transaction graph
M Ober, S Katzenbeisser, K Hamacher
Future internet 5 (2), 237-250, 2013
3922013
A survey of steganographic techniques
NF Johnson, S Katzenbeisser
Information hiding, 43-78, 2000
3902000
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
3522012
Distributed attribute-based encryption
S Müller, S Katzenbeisser, C Eckert
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
3232009
Privacy preserving error resilient DNA searching through oblivious automata
JR Troncoso-Pastoriza, S Katzenbeisser, M Celik
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2802007
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005
2382005
Depreciating motivation and empirical security analysis of chaos-based image and video encryption
M Preishuber, T Hütter, S Katzenbeisser, A Uhl
IEEE Transactions on Information Forensics and Security 13 (9), 2137-2150, 2018
2292018
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
A Van Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, ...
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
2242012
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
2192007
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
Acm computing surveys (csur) 49 (1), 1-37, 2016
2132016
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
1852013
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1842011
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B Škorić, S Katzenbeisser, MU Celik
Designs, Codes and Cryptography 46 (2), 137-166, 2008
1642008
Defining security in steganographic systems
S Katzenbeisser, FAP Petitcolas
Security and Watermarking of Multimedia Contents IV 4675, 50-56, 2002
1622002
Secure two-party computations in ANSI C
A Holzer, M Franz, S Katzenbeisser, H Veith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1592012
Recyclable pufs: Logically reconfigurable pufs
S Katzenbeisser, Ü Kocabaş, V Van Der Leest, AR Sadeghi, GJ Schrijen, ...
Journal of Cryptographic Engineering 1, 177-186, 2011
1452011
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1442010
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1432014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20