default search action
Roland Schmitz
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j8]Roland Schmitz:
Use of SHDM in commutative watermarking encryption. EURASIP J. Inf. Secur. 2021(1): 1 (2021)
2010 – 2019
- 2017
- [j7]Roland Schmitz, Jan Gruber:
Commutative Watermarking-Encryption of Audio Data with Minimum Knowledge Verification. Adv. Multim. 2017: 5879257:1-5879257:10 (2017) - [c22]Sophie Tu, Bin Zhou, Da Wei Huang, Roland Schmitz, George Wright, Louis Staudt, Calvin A. Johnson:
A Random Forest Model for Detecting Somatic Mutations from Unpaired Cancer Samples. AMIA 2017 - 2015
- [c21]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy. ACIVS 2015: 474-485 - [c20]Matthias Goehring, Roland Schmitz:
On randomness testing in physical layer key agreement. WF-IoT 2015: 733-738 - 2014
- [j6]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms. Int. J. Multim. Data Eng. Manag. 5(4): 36-52 (2014) - 2013
- [c19]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Towards More Robust Commutative Watermarking-Encryption of Images. ISM 2013: 283-286 - 2012
- [c18]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
A New Approach to Commutative Watermarking-Encryption. Communications and Multimedia Security 2012: 117-130 - 2011
- [j5]Roland Schmitz, Shujun Li:
Neue Entwicklungen in der e-Banking Security. Prax. Inf.verarb. Kommun. 34(4): 176-184 (2011) - [c17]Shujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz, Junaid Jameel Ahmad:
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers. Financial Cryptography 2011: 235-249 - 2010
- [c16]Shujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking e-banking CAPTCHAs. ACSAC 2010: 171-180 - [c15]Shujun Li, Ahmad-Reza Sadeghi, Roland Schmitz:
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. Financial Cryptography 2010: 429 - [c14]Shujun Li, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking Randomized Linear Generation Functions Based Virtual Password System. ICC 2010: 1-6
2000 – 2009
- 2009
- [c13]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-Based Authentication Service). ACSAC 2009: 209-218 - [c12]Shujun Li, Roland Schmitz:
A novel anti-phishing framework based on honeypots. eCrime 2009: 1-13 - [i1]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-based Authentication Service). IACR Cryptol. ePrint Arch. 2009: 476 (2009) - 2008
- [c11]Roland Schmitz:
Public Key Cryptography: A Dynamical Systems Perspective. SECURWARE 2008: 209-212 - 2001
- [j4]Stefan Pütz, Roland Schmitz:
UMTS Sicherheitsdienste. Datenschutz und Datensicherheit 25(4) (2001) - [j3]Stefan Pütz, Roland Schmitz, Tobias Martin:
Security Mechanisms in UMTS. Datenschutz und Datensicherheit 25(6) (2001) - [j2]Roland Schmitz:
Use of chaotic dynamical systems in cryptography. J. Frankl. Inst. 338(4): 429-441 (2001) - [c10]Roland Schmitz:
Security for the core network of third generation mobile systems. Communications and Multimedia Security 2001 - [c9]Stefan Pütz, Roland Schmitz, Tobias Martin:
On the Security of the UMTS System. VIS 2001: 87-106 - 2000
- [j1]Ernst-Günter Giessmann, Roland Schmitz:
Zum Gültigkeitsmodell für elektronische Signaturen nach SigG und X.509. Datenschutz und Datensicherheit 24(7) (2000)
1990 – 1999
- 1999
- [c8]Stefan Pütz, Roland Schmitz, Benno Tietz:
Secure Transport of Authentication Data in Third Generation Mobile Phone Networks. CQRE 1999: 142-152 - 1998
- [c7]Andreas Böhm, Matthias Huwer, Wolfgang Oberndorfer, Roland Schmitz, Stefan Uellner:
Teleseminare über ISDN-basierte Videokonferenzsysteme. D-CSCW 1998: 283-296 - [c6]Markus Backstrom, Erik Bergersen, Hilde Hafnor, Heinz Brüggemann, Kevin Fogarty, Carlo Corte, Johan Opsommer, Pauli Ristola, Jussi Tarvainen, Roland Schmitz, Stefan Uellner:
CSCW Tools for Teleworkers and Members of Distributed Teams. EUROMEDIA 1998: 167-176 - [c5]Andreas Böhm, Roland Schmitz, Stefan Uellner, Wolfgang Orth, Jörg Rahmer:
A Reference Model for Model-Based Configuration of Telecooperation Systems. HICSS (5) 1998: 432- - [c4]Andreas Böhm, Wolfgang Oberndorfer, Roland Schmitz, Stefan Uellner:
Teleseminars via ISDN technical set-up and user reactions. PDP 1998: 225-229 - [c3]Stefan Pütz, Roland Schmitz, Friedrich Tönsing:
Authentication schemes for third generation mobile radio systems. PIMRC 1998: 126-130 - 1997
- [c2]Andreas Böhm, Roland Schmitz, Stefan Uellner:
Kundenspezifische interaktive Konfiguration von Telekommunikationssystemen. GI Jahrestagung 1997: 436-445 - 1996
- [c1]Andreas Böhm, Wolfgang Oberndorfer, Roland Schmitz, Stefan Uellner:
CSCW - Werkzeuge für Forscher und Manager in europaweiten Telekommunikationsprojekten. Herausforderung Telekooperation 1996: 123-137
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint