Search results for: Stefan Katzenbeisser
EURASIP Journal on Information Security > 2019 > 2019 > 1 > 1-14
Formal Methods in System Design > 2017 > 51 > 2 > 308-331
IEEE Security & Privacy > 2017 > 15 > 5 > 10 - 12
Digital Investigation > 2016 > 18 > S > S76-S86
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1578 - 1591
Lecture Notes in Computer Science > Computer Security – ESORICS 2009 > Network Security II > 120-135
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Public Key Encryption > 20-36
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Randomness and Its Use > 51-70
Lecture Notes in Computer Science > Information Security Applications > Anonymity/Authentication/Access Control > 296-308
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Full Papers > 63-77
Lecture Notes in Computer Science > Information Hiding > Video Watermarking by Using Geometic Warping Without Visible Artifacts > 145-160