dblp.uni-trier.dewww.uni-trier.de

Stefan Katzenbeisser

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
41EEStefan Katzenbeisser, Klaus Kursawe, Frederic Stumpf: Revocation of TPM Keys. TRUST 2009: 120-132
2008
40EEYun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings Springer 2008
39EEStefan Katzenbeisser, Milan Petkovic: Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. ARES 2008: 889-895
38EESascha Müller, Stefan Katzenbeisser, Claudia Eckert: Distributed Attribute-Based Encryption. ICISC 2008: 20-36
37EEFrederic Stumpf, Andreas Fuchs, Stefan Katzenbeisser, Claudia Eckert: Improving the scalability of platform attestation. STC 2008: 1-10
36EELars Fischer, Stefan Katzenbeisser, Claudia Eckert: Measuring unlinkability revisited. WPES 2008: 105-110
35EEBoris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptography 46(2): 137-166 (2008)
34EEMehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen: Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Transactions on Information Forensics and Security 3(3): 475-487 (2008)
2007
33EEJuan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik: Privacy preserving error resilient dna searching through oblivious automata. ACM Conference on Computer and Communications Security 2007: 519-528
32EEMehmet Utku Celik, Joop Talstra, Aweke N. Lemma, Stefan Katzenbeisser: Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams. ICIP (5) 2007: 489-492
31EESerap Kirbiz, Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser: Forensic Watermarking During AAC Playback. ICME 2007: 1111-1114
30EESomesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IEEE Symposium on Security and Privacy 2007: 179-186
29EEStefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi: Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310
28EEJuan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik, Aweke N. Lemma: A secure multidimensional point inclusion protocol. MM&Sec 2007: 109-120
27EERadu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan Katzenbeisser: NS2: Networked Searchable Store with Correctness. VLDB 2007: 1342-1345
26EESerap Kirbiz, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser: Decode-Time Forensic Watermarking of AAC Bitstreams. IEEE Transactions on Information Forensics and Security 2(4): 683-696 (2007)
25EEMihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith: Software transformations to improve malware detection. Journal in Computer Virology 3(4): 253-265 (2007)
2006
24EEStefan Katzenbeisser, Klaus Kursawe, Joop Talstra: Graceful infringement reactions in DRM systems. Digital Rights Management Workshop 2006: 89-96
23EEAweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen: Secure Watermark Embedding Through Partial Encryption. IWDW 2006: 433-445
22EERichard Bergmair, Stefan Katzenbeisser: Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. Information Hiding 2006: 109-123
21EEAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: A Computational Model for Watermark Robustness. Information Hiding 2006: 145-160
20EEFelix A. Fischer, Markus Holzer, Stefan Katzenbeisser: The influence of neighbourhood and choice on the complexity of finding pure Nash equilibria. Inf. Process. Lett. 99(6): 239-245 (2006)
2005
19 Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings Springer 2005
18 Mauro Barni, Jordi Herrera-Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers Springer 2005
17EEJohannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Detecting Malicious Code by Model Checking. DIMVA 2005: 174-187
16 Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508
15 Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Malware Engineering. Sicherheit 2005: 139-148
14 Jana Dittmann, Andreas Lang, Martin Steinebach, Stefan Katzenbeisser: ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Sicherheit 2005: 189-192
13EEUwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments CoRR abs/cs/0503080: (2005)
2004
12EERichard Bergmair, Stefan Katzenbeisser: Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). ISC 2004: 257-267
11EEMarkus Holzer, Stefan Katzenbeisser, Christian Schallhart: Towards Formal Semantics for ODRL. ODRL Workshop 2004: 137-148
10 Stefan Katzenbeisser, Jana Dittmann: Malicious attacks on media authentication schemes based on invertible watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 838-847
2003
9EEAndré Adelsbach, Stefan Katzenbeisser, Helmut Veith: Watermarking schemes provably secure against copy and ambiguity attacks. Digital Rights Management Workshop 2003: 111-119
8EEAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. IWDW 2003: 355-369
7EEStefan Katzenbeisser: On the Integration of Watermarks and Cryptography. IWDW 2003: 50-60
6EEJana Dittmann, Stefan Katzenbeisser, Nasir D. Memon: Editorial. Multimedia Syst. 9(3): 215 (2003)
5EEAndré Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi: Watermark detection with zero-knowledge disclosure. Multimedia Syst. 9(3): 266-278 (2003)
2001
4 Stefan Katzenbeisser, Scott Craver: Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept. Communications and Multimedia Security 2001
3 Stefan Katzenbeisser: On the Design of Copyright Protection Protocols for Multimedia Distributioni Using Symmetric and Public-Key Watermarking. DEXA Workshop 2001: 815-819
2EEStefan Katzenbeisser, Philipp Tomsich: Applied Information Security for m-Commerce and Digital Television Environments. EC-Web 2001: 166-175
2000
1EEPhilipp Tomsich, Stefan Katzenbeisser: Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property. EC-Web 2000: 38-47

Coauthor Index

1André Adelsbach [5] [8] [9] [21]
2Sumeet Bajaj [27]
3Mauro Barni [18]
4Richard Bergmair [12] [22]
5Bogdan Carbunar [27]
6Mehmet Utku Celik [23] [26] [28] [29] [31] [32] [33] [34] [35]
7Stephen Chenney [30]
8Mihai Christodorescu [25]
9Scott Craver [4]
10Jana Dittmann [6] [10] [14] [16] [19]
11Claudia M. Eckert (Claudia Eckert) [36] [37] [38]
12Felix A. Fischer [20]
13Lars Fischer [36]
14Andreas Fuchs [37]
15Uwe Hermann [13]
16Jordi Herrera-Joancomartí [18]
17Markus Holzer [11] [20]
18Somesh Jha [25] [30]
19Hyoung-Joong Kim [40]
20Johannes Kinder [17] [25]
21Serap Kirbiz [26] [31]
22Klaus Kursawe [24] [41]
23Andreas Lang [14]
24Aweke N. Lemma [23] [26] [28] [31] [32] [34]
25Nasir D. Memon [6]
26Sascha Müller [38]
27Fernando Pérez-González [18]
28Milan Petkovic [39]
29Ahmad-Reza Sadeghi [5] [8] [21] [29]
30Christian Schallhart [11] [13] [15] [16] [17] [30]
31Yun Q. Shi (Yun-Qing Shi) [40]
32Radu Sion [27]
33Boris Skoric [29] [35]
34Martin Steinebach [14]
35Frederic Stumpf [37] [41]
36Joop Talstra [24] [32]
37Philipp Tomsich [1] [2]
38Juan Ramón Troncoso-Pastoriza [28] [33]
39Andreas Uhl [19]
40Michiel van der Veen [23] [34]
41Helmut Veith [9] [13] [15] [16] [17] [25] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)