Stefan Katzenbeisser mainly investigates Computer security, Cryptography, Theoretical computer science, Encryption and Digital watermarking. His Computer security research includes themes of Mathematical proof, Computer network and Steganography. His Cryptography research is multidisciplinary, incorporating perspectives in Variety, Image, Key and Computer security model.
His Theoretical computer science research is multidisciplinary, relying on both Programming language, Software, Source code and Secure multi-party computation. He is studying Digital Watermarking Alliance, which is a component of Digital watermarking. His Digital Watermarking Alliance research includes elements of Cipher, Information hiding, Steganography tools, Steganalysis and Data Protection Act 1998.
Computer security, Cryptography, Encryption, Digital watermarking and Theoretical computer science are his primary areas of study. In his study, which falls under the umbrella issue of Computer security, Information hiding is strongly linked to Steganography. Cryptography is often connected to Embedded system in his work.
All of his Encryption and Homomorphic encryption and Public-key cryptography investigations are sub-components of the entire Encryption study. His work is dedicated to discovering how Homomorphic encryption, Secure multi-party computation are connected with Source code and other disciplines. The various areas that Stefan Katzenbeisser examines in his Digital watermarking study include Watermark and Multimedia.
His primary areas of investigation include Computer security, Embedded system, Cryptography, Computer network and Dram. Stefan Katzenbeisser combines topics linked to Implementation with his work on Computer security. His work deals with themes such as Physical unclonable function, Software and Robustness, which intersect with Embedded system.
Stefan Katzenbeisser has researched Cryptography in several fields, including Timestamp and State. His research integrates issues of Hash function and Transmission in his study of Computer network. In his study, which falls under the umbrella issue of Encryption, Homomorphic encryption is strongly linked to Secure two-party computation.
His primary areas of study are Computer security, Cryptography, Embedded system, Dram and Computer network. His studies in Computer security integrate themes in fields like Component and Implementation. The Cryptography study combines topics in areas such as Scheme, State and Encryption.
His studies deal with areas such as Physical unclonable function and Network topology as well as Embedded system. His research investigates the link between Dram and topics such as Cryptographic protocol that cross with problems in Compiler and Secure multi-party computation. His Computer network research is multidisciplinary, incorporating elements of Hash function and Robustness.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Information Hiding Techniques for Steganography and Digital Watermarking
Stefan Katzenbeisser;Fabien A. Petitcolas.
Privacy-Preserving Face Recognition
Zekeriya Erkin;Martin Franz;Jorge Guajardo;Stefan Katzenbeisser.
privacy enhancing technologies (2009)
Distributed Attribute-Based Encryption
Sascha Müller;Stefan Katzenbeisser;Claudia Eckert.
international conference on information security and cryptology (2009)
Structure and Anonymity of the Bitcoin Transaction Graph
Micha Ober;Stefan Katzenbeisser;Kay Hamacher.
Future Internet (2013)
PUFs: myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon
Stefan Katzenbeisser;Ünal Kocabaş;Vladimir Rožić;Ahmad-Reza Sadeghi.
cryptographic hardware and embedded systems (2012)
Privacy preserving error resilient dna searching through oblivious automata
Juan Ramón Troncoso-Pastoriza;Stefan Katzenbeisser;Mehmet Celik.
computer and communications security (2007)
Detecting malicious code by model checking
Johannes Kinder;Stefan Katzenbeisser;Christian Schallhart;Helmut Veith.
international conference on detection of intrusions and malware and vulnerability assessment (2005)
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
Zekeriya Erkin;Alessandro Piva;Stefan Katzenbeisser;R. L. Lagendijk.
Eurasip Journal on Information Security (2007)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
Anthony Van Herrewege;Stefan Katzenbeisser;Roel Maes;Roel Peeters.
financial cryptography (2012)
Physically uncloneable functions in the universal composition framework
Christina Brzuska;Marc Fischlin;Heike Schröder;Stefan Katzenbeisser.
international cryptology conference (2011)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: