Search

Your search keyword '"Uhl, Andreas"' showing total 62 results

Search Constraints

Start Over You searched for: Author "Uhl, Andreas" Remove constraint Author: "Uhl, Andreas" Topic computer science Remove constraint Topic: computer science
62 results on '"Uhl, Andreas"'

Search Results

1. Towards a distant viewing of depicted materials in medieval paintings

2. Handbook of Vascular Biometrics

3. A High-Quality Finger Vein Dataset Collected Using a Custom-Designed Capture Device

4. Shallow CNNs for the Reliable Detection of Facial Marks

5. FEERCI: A Package for Fast Non-Parametric Confidence Intervals for Equal Error Rates in Amortized O(m log n)

6. Comparison of Compression Algorithms' Impact on Iris Recognition Accuracy.

7. Selective Encryption for Hierarchical MPEG.

8. Compression of Encrypted Visual Data.

9. Transparent Image Encryption Using Progressive JPEG.

10. Lightweight Protection of Visual Data Using High-Dimensional Wavelet Parametrization.

11. Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations.

12. Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).

13. XML Signatures in an Enterprise Service Bus Environment.

14. How to Make a Federation Manageable.

15. Experience XML Security.

16. Trustworthy Verification and Visualisation of Multiple XML-Signatures.

17. Integrating XML Linked Time-Stamps in OASIS Digital Signature Services.

18. Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.

19. Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication.

20. Assessment of Palm OS Susceptibility to Malicious Code Threats.

21. Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets.

22. A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks.

23. Polymorphic Code Detection with GA Optimized Markov Models.

24. Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.

25. Multimodal Biometrics for Voice and Handwriting.

26. Decentralised Access Control in 802.11 Networks.

27. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics.

28. Using XACML for Privacy Control in SAML-Based Identity Federations.

29. Privacy-Preserving Electronic Health Records.

30. Video Surveillance: A Distributed Approach to Protect Privacy.

31. Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.

32. A Graph-Theoretic Approach to Steganography.

33. On Reversibility of Random Binning Techniques: Multimedia Perspectives.

34. Selective Image Encryption Using JBIG.

35. Puzzle - A Novel Video Encryption Algorithm.

36. A Key Embedded Video Codec for Secure Video Multicast.

37. Signature Amortization Using Multiple Connected Chains.

38. Rights and Trust in Multimedia Information Management.

39. Identity Based DRM: Personal Entertainment Domain.

40. Effective Protection Against Phishing and Web Spoofing.

41. Self-healing Key Distribution Schemes with Sponsorization.

42. An Instruction Set Extension for Fast and Memory-Efficient AES Implementation.

43. Fast Contract Signing with Batch Oblivious Transfer.

44. Active contours methods with respect to Vickers indentations.

45. A survey on JPEG2000 encryption.

46. Some Critical Aspects of the PKIX TSP.

47. Digital Signatures Based on Invertible Watermarks for Video Authentication.

48. Personal Rights Management- Enabling Privacy Rights in Digital Online Content.

49. Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting.

50. Motivations for a Theoretical Approach to WYSIWYS.

Catalog

Books, media, physical & digital resources