Information Hiding S Katzenbeisser, FAP Petitcolas Artech House, London, 2000 | 3385* | 2000 |
Privacy-preserving face recognition Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009 | 736 | 2009 |
A survey of steganographic techniques NF Johnson, S Katzenbeisser Information hiding, 43-78, 2000 | 392 | 2000 |
Structure and anonymity of the bitcoin transaction graph M Ober, S Katzenbeisser, K Hamacher Future internet 5 (2), 237-250, 2013 | 389 | 2013 |
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ... Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012 | 352 | 2012 |
Distributed attribute-based encryption S Müller, S Katzenbeisser, C Eckert Information Security and Cryptology–ICISC 2008: 11th International …, 2009 | 322 | 2009 |
Privacy preserving error resilient DNA searching through oblivious automata JR Troncoso-Pastoriza, S Katzenbeisser, M Celik Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 282 | 2007 |
Detecting malicious code by model checking J Kinder, S Katzenbeisser, C Schallhart, H Veith Detection of Intrusions and Malware, and Vulnerability Assessment: Second …, 2005 | 241 | 2005 |
Depreciating motivation and empirical security analysis of chaos-based image and video encryption M Preishuber, T Hütter, S Katzenbeisser, A Uhl IEEE Transactions on Information Forensics and Security 13 (9), 2137-2150, 2018 | 234 | 2018 |
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs A Van Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, ... Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 227 | 2012 |
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing Z Erkin, A Piva, S Katzenbeisser, RL Lagendijk, J Shokrollahi, G Neven, ... EURASIP Journal on Information Security 2007, 1-20, 2007 | 217 | 2007 |
Protecting software through obfuscation: Can it keep pace with progress in code analysis? S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl Acm computing surveys (csur) 49 (1), 1-37, 2016 | 211 | 2016 |
Physically uncloneable functions in the universal composition framework C Brzuska, M Fischlin, H Schröder, S Katzenbeisser Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 186 | 2011 |
Efficiently outsourcing multiparty computation under multiple keys A Peter, E Tews, S Katzenbeisser IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013 | 185 | 2013 |
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes B Škorić, S Katzenbeisser, MU Celik Designs, Codes and Cryptography 46 (2), 137-166, 2008 | 166 | 2008 |
Defining security in steganographic systems S Katzenbeisser, FAP Petitcolas Security and Watermarking of Multimedia Contents IV 4675, 50-56, 2002 | 165 | 2002 |
Secure two-party computations in ANSI C A Holzer, M Franz, S Katzenbeisser, H Veith Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 161 | 2012 |
Strong PUFs: models, constructions, and security proofs U Rührmair, H Busch, S Katzenbeisser Towards Hardware-Intrinsic Security: Foundations and Practice, 79-96, 2010 | 147 | 2010 |
Recyclable pufs: Logically reconfigurable pufs S Katzenbeisser, Ü Kocabaş, V Van Der Leest, AR Sadeghi, GJ Schrijen, ... Journal of Cryptographic Engineering 1, 177-186, 2011 | 145 | 2011 |
Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... Applied Cryptography and Network Security: 8th International Conference …, 2010 | 145 | 2010 |