Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2021Innovation and Covid-19: Food for Thought on the Future of Innovation
Bauer, Wilhelm; Edler, Jakob; Lauster, Michael; Martin, Alexander; Morszeck, Thomas H.; Posselt, Thorsten; Weissenberger-Eibl, Marion A.; Grill, Bernhard; Heuberger, Albert; Riedel, Oliver; Spath, Dieter; Schimpf, Sven; Bantes, René; Herrmann, Florian; Growitsch, Christian; Klages, Tina; Kroll, Henning; Pflaum, Alexander; Worms, Diana
Report
2020Privacy and identity management. Data for better living: AI and privacy
: Friedewald, Michael (Editor); Önen, Melek (Editor); Lievens, Eva (Editor); Krenn, Stephan (Editor); Fricker, Samuel (Editor)
Conference Proceedings
2020Secure IT without vulnerabilities and back doors
Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre
Journal Article
2017Data residency challenges and opportunities for standardization
Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char
Report
2017Datenpotenziale sicher nutzen
Reis, Claudia; Jung, Christian; Ochs, Michael A.
Journal Article
2016Authentication and searchable symmetric encryption for cloud-based storage of geospatial data
Hiemenz, Benedikt
: Kuijper, Arjan (1. Gutachten); Krämer, Michel (Betreuer)
Master Thesis
2016Datennutzungskontrolle mit IND2UCE
Jung, Christian; Feth, Denis
Book Article
2016Verwundbarkeitsprüfungen mit Shodan
Simon, Kai; Moucha, Cornelius
Journal Article
2015Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf
Journal Article
2015Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf
Report
2015New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf
Journal Article
2015New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf
Report
2015Secure cloud-based risk assessment for urban areas
Frese, Sven
: Kuijper, Arjan (1. Gutachter); Krämer, Michel (2. Gutachter)
Master Thesis
2014Ambient Assisted Living. 6. AAL-Kongress 2013
: Wichert, Reiner (Editor); Klausing, Helmut (Editor)
Conference Proceedings
2014Biometrie: Technik, Mythen, Praxisbeispiele
Nouak, Alexander
Journal Article
2014Protecting sensitive law enforcement agencies data - data security in the cloud
Jakoby, A.; Müller, Wilmuth; Vagts, H.
Conference Paper
2013Die Gesichtsauflösung in der Informationstechnologie. Wenn Maschinen erkennen sollen
Nouak, Alexander
Book Article
2013Was man weiss, was man hat, was man ist
Nouak, Alexander
Journal Article
2012Ambient Assisted Living. 5. AAL-Kongress 2012
: Wichert, Reiner (Editor); Eberhardt, Birgid (Editor)
Conference Proceedings
2010Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien
Busch, Christoph; Abt, Sebastian; Nickel, Claudia; Korte, Ulrike; Zhou, Xuebing
Conference Paper
2010Ethical implications of digitised medical and biometric data
Siew, S.-T.; Mohd-Nor, R.; Swartzman, S.; Lim, T.; Cox, B.; Yeo, A.W.; Menevidis, Z.
Conference Paper
2009Feature correlation attack on biometric privacy protection schemes
Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan
Conference Paper
2009Grundlagen der Technik
Audersch, Stefan; Flach, Guntram; Peters, Jan
Book Article
2009Sicherer Produktdatenaustausch durch Enterprise Rights Management
Lukas, Uwe von
Journal Article
2009Sicherheit und Datenschutz
Laue, Philip; Maidl, Monika; Peters, Jan
Book Article
2008Digital watermarking for NURBS-based 3D CAD models
Funk, Wolfgang
: Encarnação, José L. (Referent); Macq, Benoit (Referent)
Dissertation
2008Template protection for PCA-LDA-based 3D face recognition systems
Hartung, Daniel
Conference Paper
2007Shining light on the dark side of ambient intelligence
Wright, D.; Gutwirth, S.; Friedewald, M.
Journal Article
2007Template protection for PCA-LDA-based 3D face recognition systems
Hartung, Daniel
: Zhou, Xuebing (Betreuer)
Thesis
2007Towards unattended and privacy protected border control
Busch, Christoph; Nouak, Alexander; Zhou, Xuebing; Veen, Michiel van der; Deravi, Farzin; Suchier, Jean-Marc
Conference Paper
2006Datenschutzgerechtes Workflow Management bei Mehrfachanträgen in ämterübergreifenden Verwaltungsprozessen
Audersch, S.; Laue, P.
Conference Paper
2005A hash-based scheme for the protection of users' information in biometric systems
Han, Qui; Li, Qiong; Gonzalez, Yuridia; Niu, Xiamu
Journal Article
2002A telecooperation management system for secure data conferencing in distributed product development processes
Krause, F.L.; Jansen, H.; Schultz, R.; Gärtner, H.
Conference Paper
1999Sicherheitstechnologie in der Telemedizin
Busch, C.; Hüttinger, S.; Krannig, A.
Book Article
1998In business. Today and tomorrow
Zhao, J.; Koch, E.; Luo, C.
Journal Article