What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Andreas Uhl
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ih
Forensic Recognition of Codec-Specific Image Compression Artefacts.
Michael Häfner
Aleksandar Radovic
Moritz Langer
Stefan Findenig
Andreas Uhl
2023
conf/ih
On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition.
Simon Kirchgasser
Christof Kauba
Bernhard Prommegger
Fabio Monticelli
Andreas Uhl
2023
conf/ih
First Learning Steps to Recognize Faces in the Noise.
Lukas Lamminger
Heinz Hofbauer
Andreas Uhl
2023
conf/ih
Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts.
Andreas Vorderleitner
Jutta Hämmerle-Uhl
Andreas Uhl
2021
journals/compsec
A Tokenless Cancellable Scheme for Multimodal Biometric Systems.
Ming Jie Lee
Andrew Beng Jin Teoh
Andreas Uhl
Shiuan-Ni Liang
Zhe Jin
2021
conf/ih
Towards Match-on-Card Finger Vein Recognition.
Michael Linortner
Andreas Uhl
2021
conf/ih
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations.
Andrey Makrushin
Christof Kauba
Simon Kirchgasser
Stefan Seidlitz
Christian Kraetzer
Andreas Uhl
Jana Dittmann
2021
conf/ih
PRNU-based Deepfake Detection.
Florian Lugstein
Simon Baier
Gregor Bachinger
Andreas Uhl
2019
journals/tifs
Age, Sex, and Pathology Effects on Stability of Electroencephalographic Biometric Features Based on Measures of Interaction.
Yvonne Höller
Arne C. Bathke
Andreas Uhl
2018
journals/tifs
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption.
Mario Preishuber
Thomas Hütter
Stefan Katzenbeisser
Andreas Uhl
2018
conf/ih
Applicability of No-Reference Visual Quality Indices for Visual Security Assessment.
Heinz Hofbauer
Andreas Uhl
2018
conf/ih
Real or Fake: Mobile Device Drug Packaging Authentication.
Rudolf Schraml
Luca Debiasi
Andreas Uhl
2018
conf/ih
Do EEG-Biometric Templates Threaten User Privacy?
Yvonne Höller
Andreas Uhl
2016
conf/ih
Image Segmentation Based Visual Security Evaluation.
Christof Kauba
Stefan Mayer
Andreas Uhl
2016
conf/icics
Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS.
Martin Draschl
Jutta Hämmerle-Uhl
Andreas Uhl
2016
conf/icics
Weaknesses in Security Considerations Related to Chaos-Based Image Encryption.
Thomas Hütter
Mario Preishuber
Jutta Hämmerle-Uhl
Andreas Uhl
2014
conf/ih
Slice groups for post-compression region of interest encryption in SVC.
Andreas Unterweger
Andreas Uhl
2013
conf/ih
Towards standardised fingerprint matching robustness assessment: the StirMark toolkit - cross-database comparisons with minutiae-based matching.
Jutta Hämmerle-Uhl
Michael Pober
Andreas Uhl
2013
conf/ih
Region of interest signalling for encrypted JPEG images.
Dominik Engel
Andreas Uhl
Andreas Unterweger
2013
conf/ih
Non-invertible and revocable iris templates using key-dependent wavelet transforms.
Jutta Hämmerle-Uhl
Elias Pschernig
Andreas Uhl
2011
conf/ih
Watermarking as a Means to Enhance Biometric Systems: A Critical Survey.
Jutta Hämmerle-Uhl
Karl Raab
Andreas Uhl
2009
conf/sec
Custom JPEG Quantization for Improved Iris Recognition Accuracy.
Gerald Stefan Kostmajer
Herbert Stögner
Andreas Uhl
2008
journals/tifs
An Analysis of Lightweight Encryption Schemes for Fingerprint Images.
Dominik Engel
Elias Pschernig
Andreas Uhl
Coauthors
Aleksandar Radovic
(1)
Andreas Uhl
(23)
Andreas Unterweger
(2)
Andreas Vorderleitner
(1)
Andrew Beng Jin Teoh
(1)
Andrey Makrushin
(1)
Arne C. Bathke
(1)
Bernhard Prommegger
(1)
Christian Kraetzer
(1)
Christof Kauba
(3)
Dominik Engel
(2)
Elias Pschernig
(2)
Fabio Monticelli
(1)
Florian Lugstein
(1)
Gerald Stefan Kostmajer
(1)
Gregor Bachinger
(1)
Heinz Hofbauer
(2)
Herbert Stögner
(1)
Jana Dittmann
(1)
Jutta Hämmerle-Uhl
(6)
Karl Raab
(1)
Luca Debiasi
(1)
Lukas Lamminger
(1)
Mario Preishuber
(2)
Martin Draschl
(1)
Michael Häfner
(1)
Michael Linortner
(1)
Michael Pober
(1)
Ming Jie Lee
(1)
Moritz Langer
(1)
Rudolf Schraml
(1)
Shiuan-Ni Liang
(1)
Simon Baier
(1)
Simon Kirchgasser
(2)
Stefan Findenig
(1)
Stefan Katzenbeisser
(1)
Stefan Mayer
(1)
Stefan Seidlitz
(1)
Thomas Hütter
(2)
Yvonne Höller
(2)
Zhe Jin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to