Author of the publication

AR.Drone: security threat analysis and exemplary attack to track persons.

, , , , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 8301 of SPIE Proceedings, page 83010G. SPIE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties., , , and . IH&MMSec, page 91-96. ACM, (2015)Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities., , , and . MM&Sec, page 185-194. ACM, (2008)Introduction to multimedia and security: protecting the media of the future - securing the future of the media., , and . MM&Sec, page 1-2. ACM, (2001)Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video., and . Verläßliche IT-Systeme, Vieweg+Teubner Verlag, (1997)Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen, , and . Informatik-Spektrum, 28 (6): 453--461 (2005/12//)Virtual Communities: Trust, Identity, Participation, and Technology, , and . Computational Visualistics, Media Informatics, and Virtual Communities, volume 11 of Bildwissenschaft, Deutscher Universitätsverlag, Wiesbaden, (2003)On the Need of Data Management in Automotive Systems., , , , and . BTW, volume P-144 of LNI, page 217-226. GI, (2009)Design and evaluation of security multimedia warnings for children's smartphones., , , , and . Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems, volume 8304 of SPIE Proceedings, page 83040B. SPIE, (2012)Supporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling., , , , , , , , and . GI-Jahrestagung, volume P-314 of LNI, page 1759-1769. Gesellschaft für Informatik, Bonn, (2021)Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario., , , , and . MM&Sec, page 93-102. ACM, (2011)