Search the dblp DataBase
Stefan Katzenbeisser :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stefan Katzenbeisser , Scott Craver Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2001, pp:- [Conf ] Stefan Katzenbeisser On the Design of Copyright Protection Protocols for Multimedia Distributioni Using Symmetric and Public-Key Watermarking. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 2001, pp:815-819 [Conf ] Johannes Kinder , Stefan Katzenbeisser , Christian Schallhart , Helmut Veith Detecting Malicious Code by Model Checking. [Citation Graph (0, 0)][DBLP ] DIMVA, 2005, pp:174-187 [Conf ] André Adelsbach , Stefan Katzenbeisser , Helmut Veith Watermarking schemes provably secure against copy and ambiguity attacks. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:111-119 [Conf ] Stefan Katzenbeisser , Philipp Tomsich Applied Information Security for m-Commerce and Digital Television Environments. [Citation Graph (0, 0)][DBLP ] EC-Web, 2001, pp:166-175 [Conf ] Philipp Tomsich , Stefan Katzenbeisser Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property. [Citation Graph (0, 0)][DBLP ] EC-Web, 2000, pp:38-47 [Conf ] Richard Bergmair , Stefan Katzenbeisser Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:257-267 [Conf ] André Adelsbach , Stefan Katzenbeisser , Ahmad-Reza Sadeghi On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:355-369 [Conf ] Aweke N. Lemma , Stefan Katzenbeisser , Mehmet Utku Celik , Michiel van der Veen Secure Watermark Embedding Through Partial Encryption. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:433-445 [Conf ] Stefan Katzenbeisser On the Integration of Watermarks and Cryptography. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:50-60 [Conf ] Markus Holzer , Stefan Katzenbeisser , Christian Schallhart Towards Formal Semantics for ODRL. [Citation Graph (0, 0)][DBLP ] ODRL Workshop, 2004, pp:137-148 [Conf ] Jana Dittmann , Stefan Katzenbeisser , Christian Schallhart , Helmut Veith Ensuring Media Integrity on Third-Party Infrastructures. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:493-508 [Conf ] Jana Dittmann , Andreas Lang , Martin Steinebach , Stefan Katzenbeisser ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. [Citation Graph (0, 0)][DBLP ] Sicherheit, 2005, pp:189-192 [Conf ] Stefan Katzenbeisser , Christian Schallhart , Helmut Veith Malware Engineering. [Citation Graph (0, 0)][DBLP ] Sicherheit, 2005, pp:139-148 [Conf ] Somesh Jha , Stefan Katzenbeisser , Christian Schallhart , Helmut Veith , Stephen Chenney Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:179-186 [Conf ] Stefan Katzenbeisser , Jana Dittmann Malicious attacks on media authentication schemes based on invertible watermarks. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:838-847 [Conf ] Felix A. Fischer , Markus Holzer , Stefan Katzenbeisser The influence of neighbourhood and choice on the complexity of finding pure Nash equilibria. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2006, v:99, n:6, pp:239-245 [Journal ] André Adelsbach , Stefan Katzenbeisser , Ahmad-Reza Sadeghi Watermark detection with zero-knowledge disclosure. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2003, v:9, n:3, pp:266-278 [Journal ] Jana Dittmann , Stefan Katzenbeisser , Nasir D. Memon Editorial. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2003, v:9, n:3, pp:215- [Journal ] André Adelsbach , Stefan Katzenbeisser , Ahmad-Reza Sadeghi A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:145-160 [Conf ] Richard Bergmair , Stefan Katzenbeisser Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:109-123 [Conf ] Radu Sion , Sumeet Bajaj , Bogdan Carbunar , Stefan Katzenbeisser NS2: Networked Searchable Store with Correctness. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:1342-1345 [Conf ] Juan Ramón Troncoso-Pastoriza , Stefan Katzenbeisser , Mehmet Utku Celik , Aweke N. Lemma A secure multidimensional point inclusion protocol. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:109-120 [Conf ] Uwe Hermann , Stefan Katzenbeisser , Christian Schallhart , Helmut Veith Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. [Citation Graph (, )][DBLP ] A New DRM Architecture with Strong Enforcement. [Citation Graph (, )][DBLP ] Redactable Signatures for Tree-Structured Data: Definitions and Constructions. [Citation Graph (, )][DBLP ] Privacy preserving error resilient dna searching through oblivious automata. [Citation Graph (, )][DBLP ] Improving the scalability of platform attestation. [Citation Graph (, )][DBLP ] Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. [Citation Graph (, )][DBLP ] Graceful infringement reactions in DRM systems. [Citation Graph (, )][DBLP ] Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP ] Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams. [Citation Graph (, )][DBLP ] Distributed Attribute-Based Encryption. [Citation Graph (, )][DBLP ] Forensic Watermarking During AAC Playback. [Citation Graph (, )][DBLP ] Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP ] Privacy-Preserving Face Recognition. [Citation Graph (, )][DBLP ] PUF-Based Authentication Protocols - Revisited. [Citation Graph (, )][DBLP ] Measuring unlinkability revisited. [Citation Graph (, )][DBLP ] Revocation of TPM Keys. [Citation Graph (, )][DBLP ] The PUF Promise. [Citation Graph (, )][DBLP ] Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation. [Citation Graph (, )][DBLP ] Trust in Consumer Electronics. [Citation Graph (, )][DBLP ] Audio watermarking forensics: detecting malicious re-embedding. [Citation Graph (, )][DBLP ] Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.307secs