The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefan Katzenbeisser: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Katzenbeisser, Scott Craver
    Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  2. Stefan Katzenbeisser
    On the Design of Copyright Protection Protocols for Multimedia Distributioni Using Symmetric and Public-Key Watermarking. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:815-819 [Conf]
  3. Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Detecting Malicious Code by Model Checking. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:174-187 [Conf]
  4. André Adelsbach, Stefan Katzenbeisser, Helmut Veith
    Watermarking schemes provably secure against copy and ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:111-119 [Conf]
  5. Stefan Katzenbeisser, Philipp Tomsich
    Applied Information Security for m-Commerce and Digital Television Environments. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2001, pp:166-175 [Conf]
  6. Philipp Tomsich, Stefan Katzenbeisser
    Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:38-47 [Conf]
  7. Richard Bergmair, Stefan Katzenbeisser
    Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:257-267 [Conf]
  8. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:355-369 [Conf]
  9. Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen
    Secure Watermark Embedding Through Partial Encryption. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:433-445 [Conf]
  10. Stefan Katzenbeisser
    On the Integration of Watermarks and Cryptography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:50-60 [Conf]
  11. Markus Holzer, Stefan Katzenbeisser, Christian Schallhart
    Towards Formal Semantics for ODRL. [Citation Graph (0, 0)][DBLP]
    ODRL Workshop, 2004, pp:137-148 [Conf]
  12. Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Ensuring Media Integrity on Third-Party Infrastructures. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:493-508 [Conf]
  13. Jana Dittmann, Andreas Lang, Martin Steinebach, Stefan Katzenbeisser
    ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:189-192 [Conf]
  14. Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Malware Engineering. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:139-148 [Conf]
  15. Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
    Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:179-186 [Conf]
  16. Stefan Katzenbeisser, Jana Dittmann
    Malicious attacks on media authentication schemes based on invertible watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:838-847 [Conf]
  17. Felix A. Fischer, Markus Holzer, Stefan Katzenbeisser
    The influence of neighbourhood and choice on the complexity of finding pure Nash equilibria. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:99, n:6, pp:239-245 [Journal]
  18. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    Watermark detection with zero-knowledge disclosure. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:266-278 [Journal]
  19. Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon
    Editorial. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:215- [Journal]
  20. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:145-160 [Conf]
  21. Richard Bergmair, Stefan Katzenbeisser
    Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:109-123 [Conf]
  22. Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan Katzenbeisser
    NS2: Networked Searchable Store with Correctness. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:1342-1345 [Conf]
  23. Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma
    A secure multidimensional point inclusion protocol. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:109-120 [Conf]
  24. Uwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  25. Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. [Citation Graph (, )][DBLP]


  26. A New DRM Architecture with Strong Enforcement. [Citation Graph (, )][DBLP]


  27. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. [Citation Graph (, )][DBLP]


  28. Privacy preserving error resilient dna searching through oblivious automata. [Citation Graph (, )][DBLP]


  29. Improving the scalability of platform attestation. [Citation Graph (, )][DBLP]


  30. Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. [Citation Graph (, )][DBLP]


  31. Graceful infringement reactions in DRM systems. [Citation Graph (, )][DBLP]


  32. Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP]


  33. Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams. [Citation Graph (, )][DBLP]


  34. Distributed Attribute-Based Encryption. [Citation Graph (, )][DBLP]


  35. Forensic Watermarking During AAC Playback. [Citation Graph (, )][DBLP]


  36. Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]


  37. Privacy-Preserving Face Recognition. [Citation Graph (, )][DBLP]


  38. PUF-Based Authentication Protocols - Revisited. [Citation Graph (, )][DBLP]


  39. Measuring unlinkability revisited. [Citation Graph (, )][DBLP]


  40. Revocation of TPM Keys. [Citation Graph (, )][DBLP]


  41. The PUF Promise. [Citation Graph (, )][DBLP]


  42. Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation. [Citation Graph (, )][DBLP]


  43. Trust in Consumer Electronics. [Citation Graph (, )][DBLP]


  44. Audio watermarking forensics: detecting malicious re-embedding. [Citation Graph (, )][DBLP]


  45. Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002