The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

André Adelsbach: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:136-147 [Conf]
  2. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:129-139 [Conf]
  3. André Adelsbach, Stefan Katzenbeisser, Helmut Veith
    Watermarking schemes provably secure against copy and ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:111-119 [Conf]
  4. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Towards multilateral secure digital rights distribution infrastructures. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:45-54 [Conf]
  5. André Adelsbach, Ulrich Greveler
    A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:246-257 [Conf]
  6. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Property-Based Broadcast Encryption for Multi-level Security Policies. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:15-31 [Conf]
  7. André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:117-133 [Conf]
  8. André Adelsbach, Ahmad-Reza Sadeghi
    Zero-Knowledge Watermark Detection and Proof of Ownership. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:273-288 [Conf]
  9. André Adelsbach, Sebastian Gajek, Jörg Schwenk
    Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:204-216 [Conf]
  10. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Secure Software Delivery and Installation in Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:255-267 [Conf]
  11. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:355-369 [Conf]
  12. André Adelsbach, Ulrich Greveler
    Satellite Communication without Privacy - Attacker's Paradise. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:257-268 [Conf]
  13. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    Watermark detection with zero-knowledge disclosure. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:266-278 [Journal]
  14. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:143-158 [Journal]
  15. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:73-103 [Journal]
  16. André Adelsbach, Ulrich Greveler
    Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:469-484 [Conf]
  17. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:145-160 [Conf]
  18. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Overcoming the obstacles of zero-knowledge watermark detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:46-55 [Conf]
  19. André Adelsbach, Jörg Schwenk
    Key-assignment strategies for CPPM. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:107-115 [Conf]
  20. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP]
    T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:1-34 [Journal]

  21. Methodology to Align Business and IT Policies: Use Case from an IT Company. [Citation Graph (, )][DBLP]


  22. ANOCAST: Rethinking Broadcast Anonymity in the Case of Wireless Communication. [Citation Graph (, )][DBLP]


Search in 0.000secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002