Search - IFIP Open Digital Library Access content directly

Filter your results

10 results
authFullName_s : Jana Dittmann
Image document

E-Learning of IT Security Threats: A Game Prototype for Children

Jana Fruth , Carsten Schulze , Marleen Rohde , Jana Dittmann
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.162-172, ⟨10.1007/978-3-642-40779-6_14⟩
Conference papers hal-01492818v1

Communications and Multimedia Security

Bart De Decker , Jana Dittmann , Christian Kraetzer , Claus Vielhauer
Springer, LNCS-8099, 2013, Lecture Notes in Computer Science, 978-3-642-40778-9. ⟨10.1007/978-3-642-40779-6⟩
Books hal-01492838v1
Image document

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries

Karl Kümmel , Tobias Scheidat , Claus Vielhauer , Jana Dittmann
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers hal-01540894v1
Image document

Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature

Ronny Merkel , Jana Dittmann , Claus Vielhauer
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.59-71, ⟨10.1007/978-3-642-24712-5_5⟩
Conference papers hal-01596193v1
Image document

Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans

Andrey Makrushin , Tobias Kiertscher , Robert Fischer , Stefan Gruhn , Claus Vielhauer , et al.
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.89-98, ⟨10.1007/978-3-642-32805-3_7⟩
Conference papers hal-01540887v1
Image document

Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans

Mario Hildebrandt , Andrey Makrushin , Kun Qian , Jana Dittmann
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.200-203, ⟨10.1007/978-3-642-40779-6_18⟩
Conference papers hal-01492822v1
Image document

Security Warnings for Children’s Smart Phones: A First Design Approach

Jana Dittmann , Jana Fruth , Ronny Merkel
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.241-243, ⟨10.1007/978-3-642-24712-5_24⟩
Conference papers hal-01596186v1
Image document

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

Karl Kümmel , Claus Vielhauer , Tobias Scheidat , Dirk Franke , Jana Dittmann
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers hal-01056380v1
Image document

Statistical Detection of Malicious PE-Executables for Fast Offline Analysis

Ronny Merkel , Tobias Hoppe , Christian Kraetzer , Jana Dittmann
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.93-105, ⟨10.1007/978-3-642-13241-4_10⟩
Conference papers hal-01056387v1
Image document

Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications

Mario Hildebrandt , Jennifer Sturm , Jana Dittmann , Claus Vielhauer
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.204-206, ⟨10.1007/978-3-642-40779-6_19⟩
Conference papers hal-01492823v1