Stefan Katzenbeisser
Stefan Katzenbeisser
Professor, Chair of Computer Engineering, University of Passau
Verified email at - Homepage
Cited by
Cited by
Information Hiding
S Katzenbeisser, FAP Petitcolas
Artech House, London, 2000
Privacy-preserving face recognition
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
A survey of steganographic techniques
NF Johnson, S Katzenbeisser
Information hiding, 43-78, 2000
Structure and anonymity of the bitcoin transaction graph
M Ober, S Katzenbeisser, K Hamacher
Future internet 5 (2), 237-250, 2013
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
Distributed attribute-based encryption
S Müller, S Katzenbeisser, C Eckert
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
Privacy preserving error resilient DNA searching through oblivious automata
JR Troncoso-Pastoriza, S Katzenbeisser, M Celik
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005
Depreciating motivation and empirical security analysis of chaos-based image and video encryption
M Preishuber, T Hütter, S Katzenbeisser, A Uhl
IEEE Transactions on Information Forensics and Security 13 (9), 2137-2150, 2018
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
A Van Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, ...
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ...
EURASIP Journal on Information Security 2007, 1-20, 2007
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
Acm computing surveys (csur) 49 (1), 1-37, 2016
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
Defining security in steganographic systems
S Katzenbeisser, FAP Petitcolas
Security and Watermarking of Multimedia Contents IV 4675, 50-56, 2002
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B Škorić, S Katzenbeisser, MU Celik
Designs, Codes and Cryptography 46 (2), 137-166, 2008
Secure two-party computations in ANSI C
A Holzer, M Franz, S Katzenbeisser, H Veith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Recyclable pufs: Logically reconfigurable pufs
S Katzenbeisser, Ü Kocabaş, V Van Der Leest, AR Sadeghi, GJ Schrijen, ...
Journal of Cryptographic Engineering 1, 177-186, 2011
Strong PUFs: models, constructions, and security proofs
U Rührmair, H Busch, S Katzenbeisser
Towards Hardware-Intrinsic Security: Foundations and Practice, 79-96, 2010
The system can't perform the operation now. Try again later.
Articles 1–20