Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modellbildung, Klassifikation und Bewertung von Algorithmen in der Datenkompression.. University of Marburg, Germany, (1993)Location-based risk assessment for mobile authentication., , , and . UbiComp Adjunct, page 85-88. ACM, (2016)Digital watermarking: what will it do for me? And what it won't!, , , and . SIGGRAPH Abstracts and Applications, page 153-155. ACM, (1999)In Business Today and Tomorrow., , and . Commun. ACM, 41 (7): 66-72 (1998)A concept and system architecture for IT-based Lifelong Learning., , , , , , , , , and . Computers & Graphics, 22 (2-3): 319-393 (1998)How to Protect Multimedia Applications.. IFIP World Conference on Mobile Communications, volume 66 of IFIP Conference Proceedings, page 317-320. Chapman & Hall, (1996)Embedding Robust Labels into Images for Copyright Protection., and . KnowRight, volume 82 of books@ocg.at, page 242-251. Austrian Computer Society, (1995)A generic digital watermarking model., and . Computers & Graphics, 22 (4): 397-403 (1998)Cormorant: towards continuous risk-aware multi-modal cross-device authentication., , , , and . UbiComp/ISWC Adjunct, page 169-172. ACM, (2015)Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT., , , , , and . MoMM, page 384-388. ACM, (2015)