|
Search the dblp DataBase
André Adelsbach:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:136-147 [Conf]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2005, pp:129-139 [Conf]
- André Adelsbach, Stefan Katzenbeisser, Helmut Veith
Watermarking schemes provably secure against copy and ambiguity attacks. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2003, pp:111-119 [Conf]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Towards multilateral secure digital rights distribution infrastructures. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2005, pp:45-54 [Conf]
- André Adelsbach, Ulrich Greveler
A Broadcast Encryption Scheme with Free-Riders but Unconditional Security. [Citation Graph (0, 0)][DBLP] DRMTICS, 2005, pp:246-257 [Conf]
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Property-Based Broadcast Encryption for Multi-level Security Policies. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:15-31 [Conf]
- André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP] Information Hiding, 1999, pp:117-133 [Conf]
- André Adelsbach, Ahmad-Reza Sadeghi
Zero-Knowledge Watermark Detection and Proof of Ownership. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:273-288 [Conf]
- André Adelsbach, Sebastian Gajek, Jörg Schwenk
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:204-216 [Conf]
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Secure Software Delivery and Installation in Embedded Systems. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:255-267 [Conf]
- André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. [Citation Graph (0, 0)][DBLP] IWDW, 2003, pp:355-369 [Conf]
- André Adelsbach, Ulrich Greveler
Satellite Communication without Privacy - Attacker's Paradise. [Citation Graph (0, 0)][DBLP] Sicherheit, 2005, pp:257-268 [Conf]
- André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
Watermark detection with zero-knowledge disclosure. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2003, v:9, n:3, pp:266-278 [Journal]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 2005, v:11, n:2, pp:143-158 [Journal]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:73-103 [Journal]
- André Adelsbach, Ulrich Greveler
Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:469-484 [Conf]
- André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP] Information Hiding, 2006, pp:145-160 [Conf]
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
Overcoming the obstacles of zero-knowledge watermark detection. [Citation Graph (0, 0)][DBLP] MM&Sec, 2004, pp:46-55 [Conf]
- André Adelsbach, Jörg Schwenk
Key-assignment strategies for CPPM. [Citation Graph (0, 0)][DBLP] MM&Sec, 2004, pp:107-115 [Conf]
- André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP] T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:1-34 [Journal]
Methodology to Align Business and IT Policies: Use Case from an IT Company. [Citation Graph (, )][DBLP]
ANOCAST: Rethinking Broadcast Anonymity in the Case of Wireless Communication. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|