Use of chaotic dynamical systems in cryptography R Schmitz Journal of the Franklin Institute 338 (4), 429-441, 2001 | 163 | 2001 |
Breaking e-banking CAPTCHAs S Li, SAH Shah, MAU Khan, SA Khayam, AR Sadeghi, R Schmitz Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 94 | 2010 |
A novel anti-phishing framework based on honeypots S Li, R Schmitz 2009 eCrime Researchers Summit, 1-13, 2009 | 84 | 2009 |
A new approach to commutative watermarking-encryption R Schmitz, S Li, C Grecos, X Zhang Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International …, 2012 | 38 | 2012 |
On the security of PAS (predicate-based authentication service) S Li, HJ Asghar, J Pieprzyk, AR Sadeghi, R Schmitz, H Wang 2009 Annual Computer Security Applications Conference, 209-218, 2009 | 29 | 2009 |
hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers S Li, AR Sadeghi, S Heisrath, R Schmitz, JJ Ahmad Financial Cryptography and Data Security: 15th International Conference, FC …, 2012 | 26 | 2012 |
Security mechanisms in UMTS S Pütz, R Schmitz, T Martin Datenschutz und Datensicherheit 25 (6), 1-10, 2001 | 26 | 2001 |
Secure interoperation between 2G and 3G mobile radio networks S Putz, R Schmitz IET Digital Library, 2000 | 22 | 2000 |
Kompendium Medieninformatik: Medienpraxis R Schmitz Springer, 2007 | 21 | 2007 |
Towards robust invariant commutative watermarking-encryption based on image histograms R Schmitz, S Li, C Grecos, X Zhang International Journal of Multimedia Data Engineering and Management (IJMDEM …, 2014 | 16 | 2014 |
Authentication schemes for third generation mobile radio systems S Putz, R Schmitz, F Tonsing Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio …, 1998 | 15 | 1998 |
Breaking randomized linear generation functions based virtual password system S Li, SA Khayam, AR Sadeghi, R Schmitz 2010 IEEE International Conference on Communications, 1-6, 2010 | 13 | 2010 |
Sichere Systeme: Konzepte, Architekturen und Frameworks W Kriha, R Schmitz Springer Science & Business Media, 2009 | 13 | 2009 |
Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche W Kriha, R Schmitz Springer-Verlag, 2008 | 13 | 2008 |
Towards more robust commutative watermarking-encryption of images R Schmitz, S Li, C Grecos, X Zhang 2013 IEEE International Symposium on Multimedia, 283-286, 2013 | 10 | 2013 |
Public key cryptography: A dynamical systems perspective R Schmitz 2008 Second International Conference on Emerging Security Information …, 2008 | 8 | 2008 |
Use of SHDM in commutative watermarking encryption R Schmitz EURASIP Journal on Information Security 2021 (1), 1, 2021 | 7 | 2021 |
Commutative Watermarking‐Encryption of Audio Data with Minimum Knowledge Verification R Schmitz, J Gruber Advances in Multimedia 2017 (1), 5879257, 2017 | 6 | 2017 |
On randomness testing in physical layer key agreement M Göhring, R Schmitz 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 733-738, 2015 | 6 | 2015 |
Kompendium Medieninformatik: Mediennetze R Schmitz, R Kiefer, J Maucher, J Schulze, T Suchy Springer Science & Business Media, 2006 | 6 | 2006 |