default search action
Ulrike Korte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Steffen Schwalm, Ulrike Korte, Mario Engel, Detlef Hühnlein, Tomasz Kusber:
Elektronische Bewahrung und Archivierung gemäß eIDAS. Datenschutz und Datensicherheit (dud) 48(7): 431-436 (2024) - 2023
- [j7]Christian Rathgeb, Johannes Merkle, Benjamin Tams, Matthias Neu, Ulrike Korte:
Multi-biometrische Kryptosysteme. Datenschutz und Datensicherheit 47(1): 31-36 (2023) - [c19]Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu:
Multi-Biometric Fuzzy Vault based on Face and Fingerprints. IJCB 2023: 1-10 - [i2]Christian Rathgeb, Benjamin Tams, Johannes Merkle, Vanessa Nesterowicz, Ulrike Korte, Matthias Neu:
Multi-Biometric Fuzzy Vault based on Face and Fingerprints. CoRR abs/2301.06882 (2023) - 2022
- [j6]Tomasz Kusber, Steffen Schwalm, Ulrike Korte, Mario Engel:
Langfristige Beweissicherheit und Vertrauenswürdigkeit digitaler Unterlagen. Datenschutz und Datensicherheit 46(1): 32-39 (2022) - 2021
- [c18]Tomasz Kusber, Steffen Schwalm, Ulrike Korte, Kalinda Schamburger:
Records Management and Long-Term Preservation of Evidence in DLT. Open Identity Summit 2021: 131-142 - 2020
- [c17]Tomasz Kusber, Steffen Schwalm, Kalinda Shamburger, Ulrike Korte:
Criteria for trustworthy digital transactions - Blockchain/DLT between eI-DAS, GDPR, Data and Evidence Preservation. Open Identity Summit 2020: 49-60
2010 – 2019
- 2019
- [j5]Detlef Hühnlein, Ulrike Korte, Andreas Kühne, Andrea Röck:
Neue APIs für das eIDAS-Ökosystem. Datenschutz und Datensicherheit 43(4): 198-202 (2019) - [j4]Jawad Ahmad, Detlef Hühnlein, Ulrike Korte:
Sichere Digitalisierung mit TR-RESISCAN und TR-ESOR. Datenschutz und Datensicherheit 43(4): 203-208 (2019) - 2017
- [c16]Johannes Merkle, Benjamin Tams, Benjamin Dieckmann, Ulrike Korte:
Xtarp: Improving the Tented Arch Reference Point Detection Algorithm. BIOSIG 2017: 71-82 - 2016
- [c15]Matthias Neu, Ulrike Korte, Markus Ullmann:
Improvement of Fuzzy Vault for Multiple Fingerprints with Angles. BIOSIG 2016: 233-240 - [c14]Moazzam Butt, Johannes Merkle, Ulrike Korte, Christoph Busch:
Correlation-resistant fuzzy vault for fingerprints. Sicherheit 2016: 125-136 - 2015
- [c13]Benjamin Tams, Johannes Merkle, Christian Rathgeb, Johannes Wagner, Ulrike Korte, Christoph Busch:
Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features. BIOSIG 2015: 121-132 - 2013
- [c12]Steffen Schwalm, Ulrike Korte, Detlef Hühnlein:
Vertrauenswürdige und beweiswerterhaltende elektronische Langzeitspeicherung auf Basis von DIN 31647 und BSI TR-03125. GI-Jahrestagung 2013: 550-566 - 2012
- [c11]Johannes Merkle, Tom A. M. Kevenaar, Ulrike Korte:
Multi-modal and multi-instance fusion for biometric cryptosystems. BIOSIG 2012: 1-6 - [c10]Detlef Hühnlein, Silke Jandt, Ulrike Korte, Maxi Nebel, Astrid Schumacher:
Anwendung der TR-RESISCAN und TR-ESOR im Gesundheitswesen. GI-Jahrestagung 2012: 1635-1650 - 2011
- [j3]Christoph Busch, Ulrike Korte, Sebastian Abt, Christian Böhm, Ines Färber, Sergej Fries, Johannes Merkle, Claudia Nickel, Alexander Nouak, Alexander Opel, Annahita Oswald, Thomas Seidl, Bianca Wackersreuther, Peter Wackersreuther, Xuebing Zhou:
Biometric Template Protection - Ein Bericht über das Projekt BioKeyS. Datenschutz und Datensicherheit 35(3): 183-191 (2011) - [c9]Christian Böhm, Ines Färber, Sergej Fries, Ulrike Korte, Johannes Merkle, Annahita Oswald, Thomas Seidl, Bianca Wackersreuther, Peter Wackersreuther:
Efficient Database Techniques for Identification with Fuzzy Vault Templates. BIOSIG 2011: 115-126 - [c8]Christian Böhm, Ines Färber, Sergej Fries, Ulrike Korte, Johannes Merkle, Annahita Oswald, Thomas Seidl, Bianca Wackersreuther, Peter Wackersreuther:
Filtertechniken für geschützte biometrische Datenbanken. BTW 2011: 379-389 - 2010
- [c7]Tom A. M. Kevenaar, Ulrike Korte, Johannes Merkle, Matthias Niesing, Heinrich Ihmor, Christoph Busch, Xuebing Zhou:
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems. BIOSIG 2010: 45-56 - [c6]Johannes Merkle, Matthias Niesing, Michael Schwaiger, Heinrich Ihmor, Ulrike Korte:
Performance of the Fuzzy Vault for Multiple Fingerprints. BIOSIG 2010: 57-72 - [c5]Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou:
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien. Sicherheit 2010: 1-12 - [i1]Johannes Merkle, Heinrich Ihmor, Ulrike Korte, Matthias Niesing, Michael Schwaiger:
Performance of the Fuzzy Vault for Multiple Fingerprints (Extended Version). CoRR abs/1008.0807 (2010)
2000 – 2009
- 2009
- [j2]Ulrike Korte, Johannes Merkle, Matthias Niesing:
Datenschutzfreundliche Authentisierung mit Fingerabdrücken - Konzeption und Implementierung eines Template Protection Verfahrens - ein Erfahrungsbericht. Datenschutz und Datensicherheit 33(5): 289-294 (2009) - [j1]Stefanie Fischer-Dieskau, Ulrike Korte, Detlef Hühnlein:
Die Technische Richtlinie zur vertrauenswürdigen elektronischen Langzeitspeicherung (TR-VELS) - Anforderungen und technische Vorgaben. Datenschutz und Datensicherheit 33(11): 673-677 (2009) - [c4]Detlef Hühnlein, Ulrike Korte, Lucie Langer, Alexander Wiesmaier:
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. NTMS 2009: 1-5 - 2008
- [c3]Ulrike Korte, Michael Krawczak, Johannes Merkle, Rainer Plaga, Matthias Niesing, Carsten Tiemann, A. J. Han Vinck, Ulrich Martini:
A Cryptographic Biometric Authentication System based on Genetic Fingerprints. Sicherheit 2008: 263-276 - 2007
- [c2]Ulrike Korte, Rainer Plaga:
Cryptographic protection of biometric templates: Chance, challenges and applications. BIOSIG 2007: 33-45 - 2006
- [c1]Detlef Hühnlein, Ulrike Korte:
Rechtliche Rahmenbedingungen der elektronischen Rechnung. Sicherheit 2006: 256-269
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint