Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Andreas Westfeld
@inproceedings{DBLP:conf/sicherheit/Westfeld14, author = {Andreas Westfeld}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Angriffe auf eine Spreizspektrummethode f{\"{u}}r Audio-Steganographie}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {217--227}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20044}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/WestfeldWFP13, author = {Andreas Westfeld and J{\"{u}}rgen Wurzer and Christian Fabian and Ernst Piller}, editor = {Bart De Decker and Jana Dittmann and Christian Kraetzer and Claus Vielhauer}, title = {Pit Stop for an Audio Steganography Algorithm}, booktitle = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8099}, pages = {123--134}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40779-6\_10}, doi = {10.1007/978-3-642-40779-6\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/WestfeldWFP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GoljanW09, author = {Miroslav Goljan and Andreas Westfeld}, title = {Secure Steganography in Multimedia Content}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/257131}, doi = {10.1155/2009/257131}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GoljanW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Westfeld09, author = {Andreas Westfeld}, editor = {Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Fast Determination of Sensitivity in the Presence of Countermeasures in {BOWS-2}}, booktitle = {Information Hiding, 11th International Workshop, {IH} 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5806}, pages = {89--101}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04431-1\_7}, doi = {10.1007/978-3-642-04431-1\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Westfeld09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BasW09, author = {Patrick Bas and Andreas Westfeld}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Two key estimation techniques for the broken arrows watermarking scheme}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {1--8}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597819}, doi = {10.1145/1597817.1597819}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BasW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Westfeld08, author = {Andreas Westfeld}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Generic Adoption of Spatial Steganalysis to Transformed Domain}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {161--177}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_12}, doi = {10.1007/978-3-540-88961-8\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Westfeld08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Westfeld08, author = {Andreas Westfeld}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {A regression-based restoration technique for automated watermark removal}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {215--220}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411364}, doi = {10.1145/1411328.1411364}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Westfeld08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld08, author = {Andreas Westfeld}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Steganalyse von JPEG-Dateien}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {219--232}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21478}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld08a, author = {Andreas Westfeld}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Von Bogensch{\"{u}}tzen und digitalen Wasserzeichen}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {595--599}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21516}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Westfeld07, author = {Andreas Westfeld}, title = {A Workbench for the {BOWS} Contest}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/64521}, doi = {10.1155/2007/64521}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Westfeld07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LeeWL07, author = {Kwangsoo Lee and Andreas Westfeld and Sangjin Lee}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Generalised Category Attack - Improving Histogram-Based Attack on {JPEG} {LSB} Embedding}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {378--391}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_25}, doi = {10.1007/978-3-540-77370-2\_25}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LeeWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/UllerichW07, author = {Christian Ullerich and Andreas Westfeld}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Stefan Katzenbeisser}, title = {Weaknesses of {MB2}}, booktitle = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou, China, December 3-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5041}, pages = {127--142}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-92238-4\_11}, doi = {10.1007/978-3-540-92238-4\_11}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/UllerichW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/Westfeld07, author = {Andreas Westfeld}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Tackling {BOWS} with the sensitivity attack}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007}, series = {{SPIE} Proceedings}, volume = {6505}, pages = {65051A}, publisher = {{SPIE}}, year = {2007}, url = {https://doi.org/10.1117/12.704706}, doi = {10.1117/12.704706}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/Westfeld07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Westfeld06, author = {Andreas Westfeld}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, title = {Steganography for Radio Amateurs - {A} {DSSS} Based Approach for Slow Scan Television}, booktitle = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, series = {Lecture Notes in Computer Science}, volume = {4437}, pages = {201--215}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74124-4\_14}, doi = {10.1007/978-3-540-74124-4\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Westfeld06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/Westfeld06, author = {Andreas Westfeld}, editor = {Yun{-}Qing Shi and Byeungwoo Jeon}, title = {Steganalysis in the Presence of Weak Cryptography and Encoding}, booktitle = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4283}, pages = {19--34}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922841\_3}, doi = {10.1007/11922841\_3}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/Westfeld06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LeeWL06, author = {Kwangsoo Lee and Andreas Westfeld and Sangjin Lee}, editor = {Yun{-}Qing Shi and Byeungwoo Jeon}, title = {Category Attack for {LSB} Steganalysis of {JPEG} Images}, booktitle = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4283}, pages = {35--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922841\_4}, doi = {10.1007/11922841\_4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LeeWL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Westfeld06, author = {Andreas Westfeld}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Lessons from the {BOWS} contest}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {208--213}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161403}, doi = {10.1145/1161366.1161403}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Westfeld06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld06, author = {Andreas Westfeld}, editor = {Jana Dittmann}, title = {Steganographie f{\"{u}}r den Amateurfunk}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {119--130}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24764}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/BohmeW05, author = {Rainer B{\"{o}}hme and Andreas Westfeld}, title = {Feature-based encoder classification of compressed audio streams}, journal = {Multim. Syst.}, volume = {11}, number = {2}, pages = {108--120}, year = {2005}, url = {https://doi.org/10.1007/s00530-005-0195-2}, doi = {10.1007/S00530-005-0195-2}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mms/BohmeW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld05, author = {Andreas Westfeld}, editor = {Hannes Federrath}, title = {Nutzung der Nachbarkorrelation f{\"{u}}r Steganalyse mit erh{\"{o}}hter Zuverl{\"{a}}ssigkeit}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {53--64}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28400}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/Westfeld05, author = {Andreas Westfeld}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Space filling curves in steganalysis}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings}, series = {Proceedings of {SPIE}}, volume = {5681}, pages = {28--37}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.587280}, doi = {10.1117/12.587280}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/Westfeld05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BohmeW04, author = {Rainer B{\"{o}}hme and Andreas Westfeld}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {Breaking Cauchy Model-Based {JPEG} Steganography with First Order Statistics}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {125--140}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_8}, doi = {10.1007/978-3-540-30108-0\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BohmeW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BohmeW04, author = {Rainer B{\"{o}}hme and Andreas Westfeld}, editor = {Jessica J. Fridrich}, title = {Exploiting Preserved Statistics for Steganalysis}, booktitle = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3200}, pages = {82--96}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30114-1\_7}, doi = {10.1007/978-3-540-30114-1\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/BohmeW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BohmeW04, author = {Rainer B{\"{o}}hme and Andreas Westfeld}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Statistical characterisation of {MP3} encoders for steganalysis}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {25--34}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022437}, doi = {10.1145/1022431.1022437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BohmeW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Westfeld02, author = {Andreas Westfeld}, editor = {Fabien A. P. Petitcolas}, title = {Detecting Low Embedding Rates}, booktitle = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2578}, pages = {324--339}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36415-3\_21}, doi = {10.1007/3-540-36415-3\_21}, timestamp = {Sun, 02 Oct 2022 16:07:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/Westfeld02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Westfeld01, author = {Andreas Westfeld}, editor = {Ira S. Moskowitz}, title = {{F5-A} Steganographic Algorithm}, booktitle = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2137}, pages = {289--302}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45496-9\_21}, doi = {10.1007/3-540-45496-9\_21}, timestamp = {Wed, 16 Mar 2022 23:55:28 +0100}, biburl = {https://dblp.org/rec/conf/ih/Westfeld01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vis/LehmannW01, author = {Sebastian Lehmann and Andreas Westfeld}, editor = {Dirk Fox and Marit K{\"{o}}hntopp and Andreas Pfitzmann}, title = {Kapselung ausf{\"{u}}hrbarer Bin{\"{a}}rdateien slcaps: Implementierung von Capabilitys f{\"{u}}r Linux}, booktitle = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel}, pages = {19--35}, publisher = {Vieweg+Teubner Verlag}, year = {2001}, url = {https://doi.org/10.1007/978-3-663-05918-9\_2}, doi = {10.1007/978-3-663-05918-9\_2}, timestamp = {Thu, 17 Nov 2022 13:36:41 +0100}, biburl = {https://dblp.org/rec/conf/vis/LehmannW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vis/Westfeld01, author = {Andreas Westfeld}, editor = {Dirk Fox and Marit K{\"{o}}hntopp and Andreas Pfitzmann}, title = {{F5} - ein steganographischer Algorithmus Hohe Kapazit{\"{a}}t trotz verbesserter Angriffe}, booktitle = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel}, pages = {241--255}, publisher = {Vieweg+Teubner Verlag}, year = {2001}, url = {https://doi.org/10.1007/978-3-663-05918-9\_17}, doi = {10.1007/978-3-663-05918-9\_17}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vis/Westfeld01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Westfeld00, author = {Andreas Westfeld}, title = {Prinzipien sicherer Steganographie}, school = {Dresden University of Technology, Germany}, year = {2000}, url = {https://d-nb.info/960393439}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Westfeld00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ife/PfitzmannSWWWZ99, author = {Andreas Pfitzmann and Alexander Schill and Andreas Westfeld and Guntram Wicke and Gritta Wolf and Jan Z{\"{o}}llner}, title = {{SSONET:} Systemunterst{\"{u}}tzung f{\"{u}}r mehrseitige Sicherheit in offenen Datennetzen}, journal = {Inform. Forsch. Entwickl.}, volume = {14}, number = {2}, pages = {95--108}, year = {1999}, url = {https://doi.org/10.1007/s004500050129}, doi = {10.1007/S004500050129}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ife/PfitzmannSWWWZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WestfeldP99, author = {Andreas Westfeld and Andreas Pfitzmann}, editor = {Andreas Pfitzmann}, title = {Attacks on Steganographic Systems}, booktitle = {Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1768}, pages = {61--76}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719724\_5}, doi = {10.1007/10719724\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/WestfeldP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/PfitzmannSWWWZ99, author = {Andreas Pfitzmann and Alexander Schill and Andreas Westfeld and Guntram Wicke and Gritta Wolf and Jan Z{\"{o}}llner}, editor = {Ralf Steinmetz}, title = {Flexible mehrseitige Sicherheit f{\"{u}}r verteilte Anwendungen}, booktitle = {Kommunikation in Verteilten Systemen, ITG/GI-Fachtagung, Darmstadt, 2.-5. M{\"{a}}rz 1999}, series = {Informatik Aktuell}, pages = {132--143}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-642-60111-8\_13}, doi = {10.1007/978-3-642-60111-8\_13}, timestamp = {Fri, 15 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kivs/PfitzmannSWWWZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/PfitzmannSWWWZ98, author = {Andreas Pfitzmann and Alexander Schill and Andreas Westfeld and Guntram Wicke and Gritta Wolf and Jan Z{\"{o}}llner}, editor = {Winfried Lamersdorf and Michael Merz}, title = {A Java-Based Distributed Platform for Multilateral Security}, booktitle = {Trends in Distributed Systems for Electronic Commerce, International {IFIP/GI} Working Conference, TREC'98, Hamburg, Germany, June 3-5, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1402}, pages = {52--64}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053401}, doi = {10.1007/BFB0053401}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/ifip/PfitzmannSWWWZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WestfeldW98, author = {Andreas Westfeld and Gritta Wolf}, editor = {David Aucsmith}, title = {Steganography in a Video Conferencing System}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {32--47}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_3}, doi = {10.1007/3-540-49380-8\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/WestfeldW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZollnerFKPPWWW98, author = {Jan Z{\"{o}}llner and Hannes Federrath and Herbert Klimant and Andreas Pfitzmann and Rudi Piotraschke and Andreas Westfeld and Guntram Wicke and Gritta Wolf}, editor = {David Aucsmith}, title = {Modeling the Security of Steganographic Systems}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {344--354}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_24}, doi = {10.1007/3-540-49380-8\_24}, timestamp = {Fri, 15 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ZollnerFKPPWWW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/vi/97/0002FPWWW97, author = {Jan Z{\"{o}}llner and Hannes Federrath and Andreas Pfitzmann and Andreas Westfeld and Guntram Wicke and Gritta Wolf}, editor = {G{\"{u}}nter M{\"{u}}ller and Kai Rannenberg and Manfred Reitenspie{\ss} and Helmut Stiegler}, title = {{\"{U}}ber die Modellierung steganographischer Systeme}, booktitle = {Verl{\"{a}}{\ss}liche IT-Systeme - Zwischen Key Escrow und elektronischem Geld}, series = {DuD-Fachbeitr{\"{a}}ge}, pages = {211--223}, publisher = {Vieweg+Teubner Verlag}, year = {1997}, url = {https://doi.org/10.1007/978-3-322-86842-8\_15}, doi = {10.1007/978-3-322-86842-8\_15}, timestamp = {Fri, 15 May 2020 14:07:09 +0200}, biburl = {https://dblp.org/rec/books/vi/97/0002FPWWW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.