


default search action
14th Communications and Multimedia Security 2013: Magdeburg, Germany
- Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer:

Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings. Lecture Notes in Computer Science 8099, Springer 2013, ISBN 978-3-642-40778-9
Research Papers
- Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl:

Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons. 3-17 - Benedikt Driessen, Markus Dürmuth

:
Achieving Anonymity against Major Face Recognition Algorithms. 18-33 - Jan Vossaert, Jorn Lapon

, Bart De Decker, Vincent Naessens:
Client-Side Biometric Verification Based on Trusted Computing. 34-49 - Geoffrey Ottoy, Jorn Lapon

, Vincent Naessens, Bart Preneel
, Lieven De Strycker
:
Dedicated Hardware for Attribute-Based Credential Verification. 50-65 - Y. Sreenivasa Rao

, Ratna Dutta:
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption. 66-81
Work in Progress
- Andreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel:

Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack. 85-94 - Huajian Liu, Yiyao Li, Martin Steinebach:

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion. 95-104 - Boris Assanovich, William Puech

, Iuliia Tkachenko
:
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors. 105-112 - Hieu Cuong Nguyen, Stefan Katzenbeisser:

Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine. 113-122 - Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller:

Pit Stop for an Audio Steganography Algorithm. 123-134 - Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf:

Robust Hash Algorithms for Text. 135-144 - Marcel Eckert, Igor Podebrad, Bernd Klauer:

Hardware Based Security Enhanced Direct Memory Access. 145-151 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:

Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity. 152-161 - Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann:

E-Learning of IT Security Threats: A Game Prototype for Children. 162-172 - Gábor György Gulyás, Sándor Imre

:
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation. 173-184 - Xiaofeng Xia:

An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models. 185-194
Extended Abstracts
- Matthias Trojahn, Florian Arndt, Frank Ortmeier:

Authentication with Time Features for Keystroke Dynamics on Touchscreens. 197-199 - Mario Hildebrandt, Andrey Makrushin

, Kun Qian, Jana Dittmann:
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans. 200-203 - Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer:

Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications. 204-206 - Edward Caprin, Yan Zhang:

SocACL: An ASP-Based Access Control Language for Online Social Networks. 207-210 - Konstantinos Raftopoulos

, Klimis S. Ntalianis, Paraskevi K. Tzouveli
, Nicolas Tsapatsoulis
, Aleatha Parker-Wood, Marin Ferecatu:
Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton. 211-214
Keynotes
- Sabah A. Jassim:

Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries. 217-232 - Sachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer

:
Trustworthy Software Development. 233-247

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














