default search action
14th Communications and Multimedia Security 2013: Magdeburg, Germany
- Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer:
Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings. Lecture Notes in Computer Science 8099, Springer 2013, ISBN 978-3-642-40778-9
Research Papers
- Jutta Hämmerle-Uhl, Michael Pober, Andreas Uhl:
Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons. 3-17 - Benedikt Driessen, Markus Dürmuth:
Achieving Anonymity against Major Face Recognition Algorithms. 18-33 - Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Client-Side Biometric Verification Based on Trusted Computing. 34-49 - Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven De Strycker:
Dedicated Hardware for Attribute-Based Credential Verification. 50-65 - Y. Sreenivasa Rao, Ratna Dutta:
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption. 66-81
Work in Progress
- Andreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel:
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack. 85-94 - Huajian Liu, Yiyao Li, Martin Steinebach:
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion. 95-104 - Boris Assanovich, William Puech, Iuliia Tkachenko:
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors. 105-112 - Hieu Cuong Nguyen, Stefan Katzenbeisser:
Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine. 113-122 - Andreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller:
Pit Stop for an Audio Steganography Algorithm. 123-134 - Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf:
Robust Hash Algorithms for Text. 135-144 - Marcel Eckert, Igor Podebrad, Bernd Klauer:
Hardware Based Security Enhanced Direct Memory Access. 145-151 - Takayuki Yamada, Seiichi Gohshi, Isao Echizen:
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity. 152-161 - Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann:
E-Learning of IT Security Threats: A Game Prototype for Children. 162-172 - Gábor György Gulyás, Sándor Imre:
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation. 173-184 - Xiaofeng Xia:
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models. 185-194
Extended Abstracts
- Matthias Trojahn, Florian Arndt, Frank Ortmeier:
Authentication with Time Features for Keystroke Dynamics on Touchscreens. 197-199 - Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann:
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans. 200-203 - Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer:
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications. 204-206 - Edward Caprin, Yan Zhang:
SocACL: An ASP-Based Access Control Language for Online Social Networks. 207-210 - Konstantinos Raftopoulos, Klimis S. Ntalianis, Paraskevi K. Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu:
Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton. 211-214
Keynotes
- Sabah A. Jassim:
Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries. 217-232 - Sachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer:
Trustworthy Software Development. 233-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.