This paper investigates possibilities to develop adaptive steganographic algorithms in general and especially for images as possible cover data. We exploit <i>dithering</i> as a means to gain image information that can be used by adaptive steganographic algorithms. First, we point out general possibilities for using this process for steganography and… (More)
Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We… (More)
Dagmar Schönfeld und Dogan Kesdogan.
With the increasing popularity of Component-Based Software Engineering, considering non-functional properties like QoS and security becomes an ever-important challenge. Both issues are crosscutting concerns that benefit from a separated consideration as aspects. The interference of both is a non-trivial problem that has to be dealt with at various levels… (More)