Now showing 1 - 10 of 69
No Thumbnail Available
Publication

Verfahren zur Diensteerkennung und Diensteinformationsbereitstellung im Vergleich

2002 , Kirchner, H. , Schönfeld, W. , Steinmetz, R.

No Thumbnail Available
Publication

Verfahren zur Diensteerkennung und Diensteinformationsbereitstellung im Vergleich

2002 , Kirchner, H. , Schönfeld, W. , Steinmetz, R.

No Thumbnail Available
Publication

A price communication protocol for multi-service internet

2001 , Heckmann, O. , Darlagiannis, V. , Karsten, M. , Steinmetz, R.

No Thumbnail Available
Publication

Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000

2001 , Hollick, M. , Rosenow, W. , Bormuth, T. , Steinmetz, R.

No Thumbnail Available
Publication

Modeling IP-based mobility management

2002 , Schönfeld, W. , Meissner, A. , Kirchner, H. , Steinmetz, R.

No Thumbnail Available
Publication

Biometric hash based on statistical features of online signatures

2002 , Vielhauer, C. , Steinmetz, R. , Mayerhöfer, A.

This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verification systems are threshold-based true-false decisions, based on a comparison between test sample signals and sets of reference signals, our system responds to a signature input with a biometric hash vector, which is calculated based on an individual interval matrix. Especially for applications, which require key management strategies (e.g. e-Commerce, smart cards), hash values are of great interest, as keys can be derived directly from the hash value, whereas a verification decision can only grant or refuse access to a stored key. Further, our new approach does not require storage of templates for reference signatures, thus increases the security of the system. In our prototype implementation, the generated biometric hash values are calculated on a pen-based PDA and used for key generation f or a future secure data communication between a PDA and a server by encryption. First tests show that the system is actually able to generate stable biometric hash values of the users and although the system was exposed to skilled forgeries, no test person was able to reproduce another subject's hash vector. During tests, we were able to tune the system to a FAR of 0% at a FRR level of 7.05%.

No Thumbnail Available
Publication

A security model for multicast group integrity management

2001 , Hollick, M. , Meissner, A. , Wolf, L. , Steinmetz, R.

No Thumbnail Available
Publication

Biometric authentication for ID cards with hologram watermarks

2002 , Croce Ferri, L. , Mayerhöfer, A. , Frank, M. , Vielhauer, C. , Steinmetz, R.

No Thumbnail Available
Publication

Security Issues in Group Integrity Management for Multimedia Multicasting

2001 , Meissner, A. , Wolf, L. , Hollick, M. , Steinmetz, R.

No Thumbnail Available
Publication

Security Goals for Service Discovery in Ad-hoc Environments

2001 , Hollick, M. , Steinmetz, R.