47 results on '"Steinmetz, Ralf"'
Search Results
2. Erratum to: Communications and Multimedia Security Issues of the New Century
3. Life-Cycle Considerations for Wide-Area Distribution of Multimedia Data
4. Framework for personalized and adaptive game-based training programs in health sport
5. An approach to pricing of connectionless network services
6. Concepts for Resource Reservation in Advance
7. Human Perception of Audio-Visual Skew
8. Designing collaborative multiplayer serious games: Escape from Wilson Island—A multiplayer 3D serious game for collaborative learning in teams
9. Virtual context based services for multiplayer online games to facilitate community participation
10. Adapting the User Context in Realtime: Tailoring Online Machine Learning Algorithms to Ambient Computing
11. Erratum to: Communications and Multimedia Security Issues of the New Century
12. Vulnerabilities and Security Limitations of Current IP Telephony Systems
13. An approach to pricing of connectionless network services
14. A Secure Authentication Infrastructure for Mobile Communication Services over the Internet
15. A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System
16. Tree-Based Multicast Key Agreement
17. Fingerprints for Copyright Protection
18. Secure Service Centered Networking for Nomadic Usage : Position Paper
19. Blind Compressed-Domain Watermarking for MPEG-Encoded Videos
20. Using Raw Speech as a Watermark, Does it Work?
21. A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks
22. Secure Internet Phone : Design and Implementation
23. Gaussian Pixel Weighting Marks in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval
24. Secure Meeting Scheduling with Agenta
25. Virtual Hidden Network
26. Security for the core network of third generation mobile systems
27. Transferability in Coin Systems with Observers
28. Secure Ilearning
29. ACLA: A Framework for Access Control List (ACL) Analysis and Optimization
30. Optimization of Watermarking Performances Using Error Correcting Codes and Repetition
31. Transparent Access to Encrypted Data Using Operating System Network Stack Extensions
32. Asynchronous Large-Scale Certification Based on Certificate Verification Trees
33. Copyright Protection Protocols Based on Asymmetric Watermarking : The Ticket Concept
34. Large Scale Distributed Watermarking of Multicast Media Through Encryption
35. Software Security Assessment through Specification Mutations and Fault Injection
36. Collecting Randomness from the Net
37. Conditional and User Specific Access to Services and Resources using Annotation Watermarks
38. An Elliptic Curve Random Number Generator
39. A Modified Chaotic Cryptographic Method
40. Encryption System Based On Neural Network
41. Theoretic Performance Analysis of a Watermarking System Based on Bernoulli Chaotic Sequences
42. Quantization Watermarking in the JPEG2000 Coding Pipeline
43. Scalable Detection of Perceptual Watermarks in JPEG2000 Images
44. XML Electronic Signatures : Application according to the international standard XML Signature Syntax and Processing
45. An Integrated Secure Web Architecture For Protected Mobile Code Distribution : Watermarking, Obfuscation, Encryption, Digital Signatures and Smart Cards Together Strong against Software Piracy
46. What You See Is What You Sign : Trustworthy Display of XML Documents for Signing and Verification
47. Secure and Anonymous Multicast Framework
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.