Search

Your search keyword '"Uhl, Andreas"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Uhl, Andreas" Remove constraint Author: "Uhl, Andreas" Topic information systems applications (incl.internet) Remove constraint Topic: information systems applications (incl.internet)
47 results on '"Uhl, Andreas"'

Search Results

1. Selective Encryption for Hierarchical MPEG.

2. Compression of Encrypted Visual Data.

3. Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).

4. XML Signatures in an Enterprise Service Bus Environment.

5. How to Make a Federation Manageable.

6. Experience XML Security.

7. Trustworthy Verification and Visualisation of Multiple XML-Signatures.

8. Integrating XML Linked Time-Stamps in OASIS Digital Signature Services.

9. Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.

10. Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication.

11. Assessment of Palm OS Susceptibility to Malicious Code Threats.

12. Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets.

13. A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks.

14. Polymorphic Code Detection with GA Optimized Markov Models.

15. Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.

16. Multimodal Biometrics for Voice and Handwriting.

17. Decentralised Access Control in 802.11 Networks.

18. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics.

19. Using XACML for Privacy Control in SAML-Based Identity Federations.

20. Privacy-Preserving Electronic Health Records.

21. Video Surveillance: A Distributed Approach to Protect Privacy.

22. Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.

23. A Graph-Theoretic Approach to Steganography.

24. On Reversibility of Random Binning Techniques: Multimedia Perspectives.

25. Selective Image Encryption Using JBIG.

26. Puzzle - A Novel Video Encryption Algorithm.

27. A Key Embedded Video Codec for Secure Video Multicast.

28. Signature Amortization Using Multiple Connected Chains.

29. Rights and Trust in Multimedia Information Management.

30. Identity Based DRM: Personal Entertainment Domain.

31. Effective Protection Against Phishing and Web Spoofing.

32. Self-healing Key Distribution Schemes with Sponsorization.

33. An Instruction Set Extension for Fast and Memory-Efficient AES Implementation.

34. Fast Contract Signing with Batch Oblivious Transfer.

35. Some Critical Aspects of the PKIX TSP.

36. Digital Signatures Based on Invertible Watermarks for Video Authentication.

37. Personal Rights Management- Enabling Privacy Rights in Digital Online Content.

38. Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting.

39. Motivations for a Theoretical Approach to WYSIWYS.

40. An Architecture for Secure Policy Enforcement in E-Government Services Deployment.

41. Semantically Extended Digital Watermarking Model for Multimedia Content.

42. A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.

43. Applying LR Cube Analysis to JSteg Detection.

44. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.

45. Efficient Key Distribution for Closed Meetings in the Internet.

46. Flexible Traitor Tracing for Anonymous Attacks.

47. INVUS: INtelligent VUlnerability Scanner.

Catalog

Books, media, physical & digital resources