Search results for: André Adelsbach
Lecture Notes in Computer Science > Information Security Practice and Experience > Intrusion Detection > 204-216
Lecture Notes in Computer Science > Communications and Multimedia Security > Multimedia Security > 129-139
Lecture Notes in Computer Science > Information Security Practice and Experience > Applications and Case Studies > 255-267
Lecture Notes in Computer Science > Information Hiding > Video Watermarking by Using Geometic Warping Without Visible Artifacts > 145-160
Lecture Notes in Computer Science > Information Security and Privacy > Cryptographic Applications > 136-147
Lecture Notes in Computer Science > Digital Rights Management. Technologies, Issues, Challenges and Systems > Supporting Cryptographic Technology > 246-257
Lecture Notes in Computer Science > Information Hiding > 273-288
Lecture Notes in Computer Science > Digital Watermarking > VII: DRM II > 355-369
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Key Management and Distributed Cryptography > 15-31
Lecture Notes in Computer Science > Computer Security – ESORICS 2007 > Security Architecture and Secure Components II > 469-484