Publications 2008

[1] L.C. Alewijnse, C.E. van den Heuvel, R.D. Stoel, and Katrin Franke. Analysis of the signing process I: forensic investigation of perceived signature complexity. In Proceedings of the 19th International Symposium on the Forensic Sciences (ANZFSS), Melbourne, Australia, 6-9 October , 2008.
[2] Freddy L. Andreassen and Einar Snekkenes. Security and privacy awareness of home PC users in Norway. In Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), July 8-9, Plymount, UK, 2008 , pages 56-68, 2008.
[3] Patrick Bours and Kirsi Helkala. Face recognition using separate layers of the RGB image. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Special Session on Biometrics - From Sensors to Standardization, August 15-17, 2008, Harbin, China. , pages 1035-1042. IEEE Press, 2008.
[ http ]
[4] J. Breebaart, Christoph Busch, J. Grave, and E. Kindt. A Reference Architecture for Biometric Template Protection based on Pseudo Identities. In Proceedings BIOSIG2008, GI-LNI , 2008.
[5] Christoph Busch and G. Canon. Encyclopedia of Biometric Recognition , chapter Biometric Data Interchange Format Standards. Springer, 2008.
[6] Christoph Busch. Gesichtserkennung beim biometrischen Reisepass. eGovernment – Entwicklungsstufen einer demokratischen Wissensgesellschaft , 2008.
[7] N. Delvaux, H. Chabanne, J. Bringer, B. Kindarji, P. Lindeberg, J. Mdgren, J. Breebaart, T. Akkermans, M. van der Veen, R. Vedhuis, E. Kindt, K. Simoens, Christoph Busch, Patrick Bours, Davrondzhon Gafurov, Bian Yang, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos. Pseudo Identities based on Fingerprint Characteristics. In Proceedings of the IEEE IIH-MSP 2008, Harbin - China , pages 1063-1068, 2008.
[ http ]
[8] Katrin Franke and S.N. Srihari. Computational Forensics - IWCF 2008 , chapter Computational Forensics: An Overview, pages 1-10. LNCS 5158. Springer Verlag, 2008.
[9] Katrin Franke. Computational Forensics - IWCF 2008 , chapter Stroke-morphology analysis using super-imposed writing movements, pages 204-217. LNCS 5158. Springer Verlag, 2008.
[10] T. Franssen, X. Zhou, and Christoph Busch. Fuzzy Vault for 3D Face Recognition Systems. In Proceedings of the IEEE IIH-MSP 2008, Harbin - China , pages 1069-1074, 2008.
[ http ]
[11] Davrondzhon Gafurov and Einar Snekkenes. Arm Swing as a Weak Biometric for Unobtrusive User Authentication. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Special Session on Biometrics - From Sensors to Standardization, August 15-17, 2008, Harbin, China , pages 1080-1087. IEEE Press, 2008.
[ http ]
[12] Davrondzhon Gafurov and Einar Snekkenes. Towards Understanding the Uniqueness of Gait Biometric. In Proceedings of the International Conference Automatic Face and Gesture Recognition , September 17-19, 2008, Amsterdam, The Netherlands . IEEE Press, 2008.
[13] Kirsi Helkala and Einar Snekkenes. A method for ranking authentication products. In Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), July 8-9, Plymount, UK , pages 80-93, 2008.
[14] Yuhua Jiao, Mingyu Li, Bian Yang, and Xiamu Niu. Compressed Domain Robust Hashing for AAC audio. In Proceedings of the International Conference on Multimedia & Expo, June 23-26, Hannover, Germany , pages 1545-1548. IEEE Press, 2008.
[ http ]
[15] T. Kevenaar, M. van der Veen, X. Zhou, and Christoph Busch. DuD – Datenschutz und Datensicherheit , chapter Privacy for Biometric Identification Information. 2008.
[16] M. Koppen and Katrin Franke. A Color Morphology Based on Pareto- Dominace Relation and Hypervolume Measure. In Proceedings of IS&T's Fourth European Conference on Color in Graphics, Imaging and Vision (CGIV), Terrassa, Spain. , 2008.
[17] Slobodan Petrovic and Katrin Franke. Computational Forensics , chapter Constrained Edit Distance in Digital Forensic Search. Studies in Computational Intelligence series. Springer Verlag, 2008.
[18] Slobodan Petrovic and Katrin Franke. A Fast Indexless Digital Forensics Search Procedure. In Proceedings of the 10th Spanish National Conference on Cryptology and Information Security, Salamanca, Spain , pages 263-269, 2008.
[19] Slobodan Petrovic and Katrin Franke. A New Two-Stage Search Procedure for Misuse Detection. International Journal of Security and Its Applications. , 2008. In Press.
[20] Slobodan Petrovic and Sverre Bakke. Application of q-gram distance in digital forensic search. In Proceedings of 2008 International Workshop on Computational Forensics (IWCF 2008), Washington D.C. August , volume 5158 of Lecture Notes in Computer Science , pages 159-168. Springer Verlag, 2008.
[21] Slobodan Petrovic and Sverre Bakke. Improving the efficiency of misuse detection by means of the q-gram distance. In Proceedings of the 4th International Conference on Information Assurance and Security, Naples, Italy, September , pages 205-208. IEEE Computer Society Press, 2008.
[ http ]
[22] Jose M. Sarriegi and Jose J. Gonzalez. Conceptualising social engineering attacks through system archetypes. Int. J. System of Systems Engineering, , 1(1/2):111-127, 2008.
[23] S.N. Srihari and Katrin Franke, editors. Proceedings of Computational Forensics: Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8 , volume 5158 of Lecture Notes in Computer Science (LNCS) . Springer Verlag, 2008.
[24] R.D. Stoel, C.E. van den Heuvel, Katrin Franke, and L.C. Alewijnse. Analysis of the signing process II: Statistical modeling of data from subjective comparison methods in forensics. In Proceedings of the 19th International Symposium on the Forensic Sciences (ANZFSS), Australia. 6-9 October , 2008.
[25] Stokar von Neuforn and Katrin Franke. Social Computing, Behavioral Modeling, and Prediction , chapter Reading Between the Lines: Human-centered Classification of Communication Patterns and Intentions. Springer Verlag, 2008.
[26] Chik How Tan. On the Security of Provably Secure Multi-receiver ID-based Signcryption Scheme. IEICE Trans. on Fundamentals , E91-A(7):1836-1838, July 2008.
[27] Chik How Tan. Secure Public-key Encryption Scheme Without Random Oracles. Information Science , 178:3435-3442, 2008.
[28] Chik How Tan. Insider-secure Signcryption KEM/Tag-KEM Schemes Without Random Oracles. In Proceedings of the 2nd International Workshop on Advances in Information Security, part of International Conference on Availability, Reliability and Security 2008 (ARES 2008) , pages 1275-1281. IEEE, 2008.
[ http ]
[29] Z. Wang, S. Chen, Christoph Busch, and X. Niu. Performance Evaluation of Fingerprint Enhancement Algorithms. In Proceedings IEEE Congress on Image and Signal Processing (CISP) , volume 3, pages 389-393, 2008.
[ http ]
[30] Knut Wold and Chik How Tan. Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings. In Proceedings of International Conference on Recofigurable computing and FPGAs (ReConFig’08), . IEEE, 2008.
[31] Chongqing Zhou, Xiamu Niu, Jianghua Ding, and Bian Yang. JPEG Encryption with File Size Preservation. In Proceedings of the International Conference on Intelligent Information Hiding and Mutimedia Signal Processing, August 15-17, Harbin, China , pages 308-311. IEEE Press, 2008.
[ http ]
[32] Kirsi Helkala. An educational tool for password quality measurements. In Proceedings of Norwegian Information Security Conference ( Norsk Informasjonssikkerhetkonferanse) (NISK2008 ) , pp. 69-80, Tapir Akademisk Forlag, 2008.
[33] I. Naumann, G. Hogben, R. Benito, R. Dean, L. Fritsch, J. Gould, J. Hoepman, S. Lazar, H. Leitold, G. Pote, H. Roßnagel, A. v. Schwedler, D. Vitali, F. Zimmermann, A. Årnes. Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID). By the European Network and information Security Agency (ENISA)
[ http ]
[34] Halvor Borgen, Patrick Bours and Stephen Wolthusen. Visible-spectrum biometric retina recognition. In 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 1056-1062, 2008