Author of the publication

Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors.

, , , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 78800S. SPIE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache., , , and . Sicherheit, volume P-128 of LNI, page 315-327. GI, (2008)A semantic framework for a better understanding, investigation and prevention of organized financial crime., , , , , and . Sicherheit, volume P-256 of LNI, page 55-66. GI, (2016)ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties., , , and . IH&MMSec, page 91-96. ACM, (2015)Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles., , , and . MM&Sec, page 33-40. ACM, (2011)Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT)., , , , , , , and . Sicherheit, volume P-345 of LNI, page 265-269. Gesellschaft für Informatik e.V., (2024)Digital Forensics in Industrial Control Systems., , , and . SAFECOMP, volume 11698 of Lecture Notes in Computer Science, page 128-136. Springer, (2019)Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump., , , and . GI Jahrestagung, volume P-154 of LNI, page 1619-1633. GI, (2009)Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor., , , , , and . DSP, page 1-6. IEEE, (2011)Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective., , , , , , , , and . ARES, page 135:1-135:12. ACM, (2022)Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics., , and . IH&MMSec, page 107-112. ACM, (2022)