default search action
Thomas Winkler 0002
Person information
- affiliation: University of Klagenfurt, Institute of Networks and Embedded Systems, Austria
Other persons with the same name
- Thomas Winkler — disambiguation page
- Thomas Winkler 0001 — GlobalFoundries Dresden, Germany
- Thomas Winkler 0003 — Fraunhofer Institute for Intelligent Analysis and Information Systems (IAIS), Sankt Augustin, Germany
- Thomas Winkler 0004 — University of Lübeck, Institute for Multimedia and Interactive Systems, Germany
- Thomas Winkler 0005 — avaso GmbH, Munich
- Thomas Winkler 0006 — Technische Hochschule Magdeburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j6]Ádám Erdélyi, Thomas Winkler, Bernhard Rinner:
Privacy protection vs. utility in visual data - An objective evaluation framework. Multim. Tools Appl. 77(2): 2285-2312 (2018) - 2015
- [c19]Thomas Winkler, Bernhard Rinner:
Secure embedded visual sensing in end-user applications with TrustEYE.M4. ISSNIP 2015: 1-6 - 2014
- [j5]Thomas Winkler, Bernhard Rinner:
Security and Privacy Protection in Visual Sensor Networks: A Survey. ACM Comput. Surv. 47(1): 2:1-2:42 (2014) - [c18]Ádám Erdélyi, Tibor Barat, Patrick Valet, Thomas Winkler, Bernhard Rinner:
Adaptive cartooning for privacy protection in camera networks. AVSS 2014: 44-49 - [c17]Thomas Winkler, Ádám Erdélyi, Bernhard Rinner:
TrustEYE.M4: Protecting the sensor - Not the camera. AVSS 2014: 159-164 - [c16]Bernhard Rinner, Thomas Winkler:
Privacy-protecting Smart Cameras. ICDSC 2014: 40:1-40:5 - [c15]Thomas Winkler, Bernhard Rinner:
Demo: TrustEYE.M4 - A novel Platform for Secure Visual Sensor Network Applications. ICDSC 2014: 45:1-45:3 - [c14]Ádám Erdélyi, Thomas Winkler, Bernhard Rinner:
Multi-Level Cartooning for Context-Aware Privacy Protection in Visual Sensor Networks. MediaEval 2014 - 2013
- [c13]Thomas Winkler, Bernhard Rinner:
Sensor-level security and privacy protection by embedding video content analysis. DSP 2013: 1-6 - [c12]Ádám Erdélyi, Thomas Winkler, Bernhard Rinner:
Serious Fun: Cartooning for Privacy Protection. MediaEval 2013 - [p1]Thomas Winkler, Bernhard Rinner:
Privacy and Security in Video Surveillance. Intelligent Multimedia Surveillance 2013: 37-66 - 2012
- [j4]Thomas Winkler, Bernhard Rinner:
User-centric privacy awareness in video surveillance. Multim. Syst. 18(2): 99-121 (2012) - [j3]Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore W. Hong:
Specification and Standardization of a Java Trusted Computing API. Softw. Pract. Exp. 42(8): 945-965 (2012) - 2011
- [j2]Thomas Winkler:
Vertrauenswürdige Videoüberwachung - Sichere intelligente Kameras mit Trusted Computing. Datenschutz und Datensicherheit 35(11): 797-801 (2011) - [j1]Thomas Winkler, Bernhard Rinner:
Securing Embedded Smart Cameras with Trusted Computing. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - 2010
- [c11]Thomas Winkler, Bernhard Rinner:
TrustCAM: Security and Privacy-Protection for an Embedded Smart Camera Based on Trusted Computing. AVSS 2010: 593-600 - [c10]Thomas Winkler, Bernhard Rinner:
A systematic approach towards user-centric privacy and security for smart camera networks. ICDSC 2010: 133-141 - [c9]Thomas Winkler, Bernhard Rinner:
User-Based Attestation for Trustworthy Visual Sensor Networks. SUTC/UMC 2010: 74-81
2000 – 2009
- 2009
- [c8]Thomas Winkler, Bernhard Rinner:
Applications of trusted computing in pervasive smart camera networks. WESS 2009 - [c7]Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore W. Hong:
Towards platform-independent trusted computing. STC 2009: 61-66 - [c6]Wolfgang Schriebl, Thomas Winkler, Andreas Starzacher, Bernhard Rinner:
A pervasive smart camera network architecture applied for multi-camera object classification. ICDSC 2009: 1-8 - [c5]Thomas Winkler, Bernhard Rinner:
Pervasive Smart Camera Networks exploiting heterogeneous wireless Channels. PerCom 2009: 1-4 - 2008
- [c4]Bernhard Rinner, Thomas Winkler, Wolfgang Schriebl, Markus Quaritsch, Wayne H. Wolf:
The evolution from single to pervasive smart cameras. ICDSC 2008: 1-10 - [c3]Tobias Vejda, Ronald Toegl, Martin Pirker, Thomas Winkler:
Towards Trust Services for Language-Based Virtual Machines for Grid Computing. TRUST 2008: 48-59 - 2007
- [c2]Kurt Dietrich, Martin Pirker, Tobias Vejda, Ronald Toegl, Thomas Winkler, Peter Lipp:
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. TGC 2007: 156-168 - 2005
- [c1]Michael Bramberger, Markus Quaritsch, Thomas Winkler, Bernhard Rinner, Helmut Schwabach:
Integrating multi-camera tracking into a dynamic task allocation system for smart cameras. AVSS 2005: 474-479
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint