Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2017AuthentiCap - a touchless vehicle authentication and personalization system
Frank, Sebastian; Kuijper, Arjan
Conference Paper
2016Cloud standards
Ziegler, Wolfgang; Edmonds, Andy; Metsch, Thijs; Richardson, Alexis; Harsh, Piyush; Kershaw, Philip; Sill, Alan; Carlson, Mark A.; Heneveld, Alex; Atonescu, Alexandru-Florian; Bohnert, Thomas Michael
Book Article
2016Multi-biometric continuous authentication. A trust model for an asynchronous system
Damer, Naser; Maul, Fabian; Busch, Christoph
Conference Paper
2016Preventing pass-the-hash and similar impersonation attacks in enterprise infrastructures
Oberle, Alexander; Larbig, Pedro; Marx, Ronald; Weber, Frank G.; Scheuermann, Dirk; Fages, Daniel; Thomas, Fabien
Conference Paper
2015Multi-biometric continuous authentication
Maul, Fabian
: Busch, Christoph; Damer, Naser (Betreuer)
Master Thesis
2014Privacy preserved duplicate check using multi-biometric fusion
Butt, Moazzam; Damer, Naser; Rathgeb, Christian
Conference Paper
2013Privacy by design for biometric authentication solutions
Schütz, Philip; Friedewald, Michael
Abstract
2013Was man weiss, was man hat, was man ist
Nouak, Alexander
Journal Article
2012Biometrie auf Smartcards
Henniger, Olaf
Conference Paper
2012N-ary tree based key distribution in a network as a service provisioning model
Kannan, A.; Maguire, G.Q.; Sharma, A.; Fusenig, V.; Schoo, P.
Conference Paper
2011Addressing security issues in the autonomic Future Internet
Rebahi, Y.; Tcholtchev, N.; Chaparadza, R.; Merekoulias, V.N.
Conference Paper
2011Trends in eID security public sector view
Eckert, C.; Herfert, M.; Waldmann, U.
Book Article
2010Assistenz mit rechtsverbindlicher und sicherer Daten-Aggregation für den Zugriff auf ad-hoc integrierbare Leitungsnetzbezogene GeoGovernment-Services
Rüh, Christian
: Flach, Guntram (Betreuer); Audersch, Stefan (Betreuer)
Master Thesis
2010Efficient one-pass entity authentication based on ECC for constrained devices
Heyszl, J.; Stumpf, F.
Conference Paper
2010Template protection for 3D face recognition
Zhou, Xuebing; Kuijper, Arjan; Busch, Christoph
Book Article
2010Template protection for biometric gait data
Nickel, Claudia; Zhou, Xuebing; Busch, Christoph
Conference Paper
2009Information security
Euting, T.; Weimert, B.
Book Article
2009Visual passwords on community photo collections
Koch, Sebastian
: Goesele, Michael (Betreuer); Katzenbeisser, Stefan (Betreuer)
Bachelor Thesis
20083-D face recognition for unattended access control
Busch, Christoph; Nouak, Alexander
Journal Article
20083-D-Gesichtserkennung für die unbeaufsichtigte Grenzkontrolle
Busch, Christoph; Nouak, Alexander
Conference Paper
2006Facing the future of biometrics
Busch, C.
Journal Article
2006How to fend off shoulder surfing
Roth, V.; Richter, K.
Journal Article
2006Human-computer interaction and security
Richter, K.; Roth, V.
Book Article
2006Identification and recognition of audio streams using perceptual hashing
Corvera Vargas, J.
: Schmucker, M. (Prüfer)
Thesis
2006A Mobile service architecture utilising trusted computing
Kuntze, Nicolai; Schmidt, Andreas U.
Presentation
2006Trusted Computing in Mobile Action
Kuntze, Nicolai; Schmidt, Andreas U.
Conference Paper
2005Biometrie
Euting, T.
Journal Article
2005Secure service provisioning framework (SSPF) for IP multimedia systems and next generation mobile networks
Sher, Muhammad; Magedanz, Thomas
Conference Paper
2004Bodycheck: Authentisierung durch Biometrie
Busch, C.; Daum, H.; Rabung, E.
Journal Article
2004A PIN-entry method resilient against shoulder surfing
Roth, V.; Richter, K.; Freidinger, R.
Conference Paper
2004Reversible watermarking of 2D-vector data
Voigt, M.; Yang, B.; Busch, C.
Conference Paper
2004RFID-Technologie
Euting, T.
Journal Article
2004Towards certificate-based authentication for future mobile communications
Giessler, E.; Schneider, M.; Bayarou, K.M.; Haisch, M.K.D.; Hunter, B.; Rohr, S.; Ilyas, M.; Enzmann, M.
Conference Paper, Journal Article
2004Zurechenbarkeit von Aktionen in virtuellen Welten
Henniger, Olaf; Scheuermann, Dirk; Schneider, Björn; Struif, Bruno; Waldmann, Ulrich; Ulrich, Reiner; Franke, Katrin; Schneider, Jan; Daum, Henning
Report
2003Authentifizierungs- und Identifizierungsverfahren
Euting, T.
Journal Article
2003Evaluierung von Gesichtserkennungssystemen - Projekt BioFace
Busch, C.; Daum, H.; Graf, F.
Conference Paper
2003PKI-Unterstützung für mobile Endgeräte durch Server-Delegierung
Ebinger, P.; Jalali-Sohi, M.
Conference Paper
2003ReEncryption - Ein Konzept für den umfassenden Dokumentenschutz
Wolthusen, S.; Prediger, F.
Conference Paper
2002Development of security protocols and new approaches to application servie providing for mobile devices
Schwalm, S.
: Jalali-Sohi, M. (Prüfer)
Thesis
2002New security protocols and approaches to application service providing for mobile devices on internet
Jalali-Sohi, M.; Schwalm, S.
Conference Paper
2002Watermarking protocols for authentication and ownership protection based on timestamps and holograms
Dittmann, J.; Steinebach, M.; Ferri, L.C.
Conference Paper
2001Design and implementation of a transparent cryptographic security layer into the transport layer
Leyer, T.
: Nagel, U. (Prüfer); Wolthusen, S. (Prüfer)
Thesis
2000Digital signatures for interactive web services
Hirsch, C.
Report
1998Konzeption eines Firewallsystems für WWW-basierte Informationssysteme
Berger, A.; Pagnia, H.
Book Article
1997W3Gate - use and abuse
Bogen, M.; Hansen, G.; Lenz, M.
Conference Paper
1996Management of a public key certification infrastructure - experiences from the DeTeBerkom project BMSec
Gehrke, M.; Hetschold, T.
Journal Article
1979A new system for authentication of voice
Hoefker, U.; Jesorsky, P.; Kriener, B.; Talmi, M.; Wesseling, D.
Conference Paper