Publications

Key-Assignment Strategies for CPPM.

2004 - Jörg Schwenk, Andre Adelsbach,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 107 - 115, © ACM, 2004. [PDF]

Key-As­si­gnment Stra­te­gies for CPPM

2004 - Andre Adelsbach, Jörg Schwenk

ACM Mul­ti­me­dia and Se­cu­ri­ty Work­shop

Moderne Verfahren der Kryptographie

2004 - Jörg Schwenk, Klaus-Dieter Wolfenstetter, Albrecht, Beutelsbacher

[Amazon]

Overcoming the Obstacles of Zero-Knowledge Watermark Detection.

2004 - Ahmad-Reza Sadeghi, Andre Adelsbach, Markus Rohe,

ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, pp. 46 - 55, © ACM, 2004.

Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.

2004 - Jörg Schwenk, Mark Manulis,

In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005. [Springer Link] [PDF] [Bibtex]
Page: