The SCEAS System
Navigation Menu

Search the dblp DataBase


Josef Scharinger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Müller-Wipperfürth, Josef Scharinger, Franz Pichler
    FSM Shift Register Realization for Improved Testability. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 1993, pp:254-267 [Conf]
  2. Franz Pichler, Josef Scharinger
    Finite Dimensional Generalized Baker Dynamical Systems for Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 1995, pp:465-476 [Conf]
  3. Josef Scharinger
    Application of Signed Kolmogorov Hashes to Provide Integrity and Authenticity in Web-Based Software Distribution. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2001, pp:257-269 [Conf]
  4. Josef Scharinger
    Devices to Preserve Watermark Security in Image Printing and Scanning. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2003, pp:660-669 [Conf]
  5. Josef Scharinger
    An Excellent Permutation Operator for Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2005, pp:317-326 [Conf]
  6. Josef Scharinger
    Image Compression by Multilevel Polynominal Interpolation and Wavelet Texture Coding. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 1997, pp:431-443 [Conf]
  7. Dieter Schütt, Franz Pichler, Josef Scharinger
    Cryptographic Permutations Based on BOOT Decompositions of Walsh Matrices. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 1997, pp:580-590 [Conf]
  8. Josef Scharinger
    Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:196-205 [Conf]
  9. Josef Scharinger
    Fast Encryption of Image Data Using Chaotic Kolmogorov Flows. [Citation Graph (0, 0)][DBLP]
    Storage and Retrieval for Image and Video Databases (SPIE), 1997, pp:278-289 [Conf]
  10. Josef Scharinger
    A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2007, pp:10-17 [Conf]
  11. Josef Scharinger
    Detecting watermarks at arbitrary image resolution. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:82-87 [Conf]

  12. NFC Devices: Security and Privacy. [Citation Graph (, )][DBLP]

  13. A Quantitative Evaluation of Texture Feature Robustness and Interpolation Behaviour. [Citation Graph (, )][DBLP]

  14. Management of Multiple Cards in NFC-Devices. [Citation Graph (, )][DBLP]

  15. Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing System. [Citation Graph (, )][DBLP]

  16. Kolmogorov Stream Ciphers. [Citation Graph (, )][DBLP]

  17. Near Field Communication based Payment System. [Citation Graph (, )][DBLP]

  18. Evaluation of SmartCard webserver as an application platform from a user's perspective. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002