Olaf Henniger

Learn More
In this paper, we present an algorithm for generating test purpose descriptions in form of MSC's from a given labeled event structure that represents the behavior of a system of asynchronously communicating extended finite state machines. The labeled event structure is a non-interleaving behavior model describing the behavior of a system in terms of the(More)
This paper addresses the problem of evaluating the quality of handwritten signatures used for biometric authentication. It is shown that some signature samples yield significantly worse performance than other samples from the same person. Thus, the importance of good reference samples is emphasized. We also give some examples of features that are related to(More)
The software running on electronic devices is regularly updated , these days. A vehicle consists of many such devices, but is operated in a completely different manner than consumer devices. Update operations are safety critical in the automotive domain. Thus, they demand for a very well secured process. We propose an on-board security architecture which(More)
This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card. They are not only usable for storing biometric reference data, but biometric user authentication methods can also be performed on card in order to protect security-relevant functions or data on(More)
This paper presents equipment and procedures for on-card (in-situ) performance testing of biometric on-card comparison implementations using pre-existing databases of biometric samples. A DTW-based on-line signature on-card comparison implementation serves as an example test object. The test results presented are false match rates and false non-match rates(More)
Control and data flow aspects of a distributed system can be identified through the analysis of control and data dependencies that exist not only within processes, but also across process boundaries. This paper proposes a non-interleaving model that exposes the intra-process as well as inter-process control and data dependencies in a specification of a(More)
This paper investigates the extraction of a reproducible bit string referred to as biometric key from biometric data. This is difficult due to the natural variability of biometric data. If the biometric-key generation process were sufficiently resistant against attacks, a biometric key may be used e.g. as basis for the generation of application-specific(More)