The SCEAS System
Navigation Menu

Search the dblp DataBase


Rainer Böhme: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rainer Böhme, Andreas Westfeld
    Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:125-140 [Conf]
  2. Rainer Böhme
    A Comparison of Market Approaches to Software Vulnerability Disclosure. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:298-311 [Conf]
  3. Rainer Böhme
    Assessment of Steganalytic Methods Using Multiple Regression Models. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:278-295 [Conf]
  4. Rainer Böhme, Andreas Westfeld
    Exploiting Preserved Statistics for Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:82-96 [Conf]
  5. Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann
    On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:243-255 [Conf]
  6. Sven Koble, Rainer Böhme
    Economics of Identity Management: A Supply-Side Perspective. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:259-272 [Conf]
  7. Rainer Böhme
    IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:27-40 [Conf]
  8. Rainer Böhme, Gaurav Kataria
    On the Limits of Cyber-Insurance. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:31-40 [Conf]
  9. Rainer Böhme, Andreas Westfeld
    Feature-based encoder classification of compressed audio streams. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:108-120 [Journal]
  10. Thomas Gloe, Matthias Kirchner, Antje Winkler, Rainer Böhme
    Can we trust digital image forensics? [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2007, pp:78-86 [Conf]
  11. Rainer Böhme, Andreas Westfeld
    Statistical characterisation of MP3 encoders for steganalysis. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:25-34 [Conf]

  12. Trained to accept?: a field experiment on consent dialogs. [Citation Graph (, )][DBLP]

  13. Validation of Predictions with Measurements. [Citation Graph (, )][DBLP]

  14. Economic Security Metrics. [Citation Graph (, )][DBLP]

  15. On Metrics and Measurements. [Citation Graph (, )][DBLP]

  16. Multimedia-Forensik als Teildisziplin der digitalen Forensik. [Citation Graph (, )][DBLP]

  17. An Epistemological Approach to Steganography. [Citation Graph (, )][DBLP]

  18. Tamper Hiding: Defeating Image Forensics. [Citation Graph (, )][DBLP]

  19. Weighted Stego-Image Steganalysis for JPEG Covers. [Citation Graph (, )][DBLP]

  20. The 'Dresden Image Database' for benchmarking digital image forensics. [Citation Graph (, )][DBLP]

  21. Multimedia Forensics Is Not Computer Forensics. [Citation Graph (, )][DBLP]

  22. The Role of Soft Information in Trust Building: Evidence from Online Social Lending. [Citation Graph (, )][DBLP]

  23. Privacy-Enhanced Event Scheduling. [Citation Graph (, )][DBLP]

  24. Security Economics and European Policy. [Citation Graph (, )][DBLP]

  25. Synthesis of color filter array pattern in digital images. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002