Publications
Publications
Personalized face reference from video: Key-face selection and feature-level fusion
Damer, Naser; Samartzidis, Timotheos; Nouak, Alexander
International Workshop on Face and Facial Expression Recognition from Real World Videos (FFER) 2014
[Conference Paper]
Weighted integration of neighbors distance ratio in multi-biometric fusion
Damer, Naser; Nouak, Alexander
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2015
[Conference Paper]
Fuzzy logic and multi-biometric fusion
Maul, Fabian; Damer, Naser
International Conference on Pattern Recognition Applications and Methods (ICPRAM) 2015
[Conference Paper]
Robust 2D face recognition under different illuminations using binarized partial face features: Towards protecting ID documents
Butt, Moazzam; Alkhatib, Wael
International Workshop on Computational Forensics (IWCF) 2012
[Conference Paper]
Stream ciphers in the IoT: Grain and Trivium
Lennart Diedrich, Lulzim Murati, Alex Wiesmaier
Comparing Lightweight Hash Functions — PHOTON \& Quark
Schmidt, Larissa; Meuser, Tobias; Wiesmaier, Alexander
Block ciphers PRESENT and SEA in comparison
Tobias Kußmaul, Johannes Löffer, Alex Wiesmaier
Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
44th International Conference on Parallel Processing (ICPP 2015)
[Conference Proceedings]
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
Cryptology ePrint Archive, p.1-19
[Journal Article]
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Alkim, Erdem; Bindel, Nina; Buchmann, Johannes; Dagdelen, Özgür; Schwabe, Peter
Cryptology ePrints Archive, p.1-24
[Journal Article]
IoT: Challenges, Projects, Architectures
Gazis, "Vangelis; Goertz, Manuel; Huber, Marco; Leonardi, Alessandro; Mathioudakis, Kostas; Wiesmaier, Alexander; Zeiger", Florian
"18th International Conference on Intelligence in Next Generation Networks (ICIN)", p.145-147
[Conference Proceedings]
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, M.; Buchmann, J.; Cabarcas, D.; Weinert, C.; Wiesmaier, A.
Computer \& Security (Journal), Vol.50, p.16-32
[Journal Article]
Security Perspectives for Collaborative Data Acquisition in the Internet of Things
Gazis, Vangelis; Cordero, Carlos Garcia; Vasilomanolakis, Emmanouil; Kikiras, Panayotis; Wiesmaier, Alex
Internet of Things. IoT Infrastructures — IoT360 / SaSeIoT 2014, p.271-282
A View on Privacy \& Trust in IoT
Daubert, J.; Wiesmaier, A.; Kikiras, P.
IEEE ICC 2015 — First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), p.2665-2670
[Conference Proceedings]
A Survey of Technologies for the Internet of Things
Gazis, Vangelis; Goertz, Manuel; Huber, Marco; Leonardi, Alessandro; Mathioudakis, Kostas; Vasilomanolakis, Emmanouil; Wiesmaier, Alexander; Zeiger, Florian
2015 International Wireless Communications \& Mobile Computing Conference (IWCMC), p.1090-1095
[Conference Proceedings]
Decision-making criteria for cyber security adoption: Internet of Things privacy and cyber security issues
Lukavchenko, Alexandra; Rajasekaran, Hariharan; Wiesmaier, Alexander; Kikiras, Panayotis
10th Future Security Conference 2015 (Future Security 2015), p.245-252
[Conference Proceedings]
End-2-End Privacy Architecture for IoT
Funke, S.; Daubert, J.; Wiesmaier, A.; Kikiras, P.; Mühlhäuser, M.
Third IEEE Conference on Communications and Network Security (CNS 2015), p.705-706
[Conference Proceedings]
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Datenschutz und Datensicherheit, Vol.39, p.383-387
[Journal Article]
Towards Bloom Filter-based Indexing of Iris Biometric Data
Rathgeb, C.; Breitinger, F.; Baier, H.; Busch, C.
2015 Intl. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]
TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks
Tancreti, Matthew; Sundaram, Vinaitheerthan; Bagchi, Saurabh; Eugster, Patrick
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, p.286-297
[Conference Proceedings]
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award)
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
[Conference Proceedings]
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths
Lerch, Johannes; Späth, Johannes; Bodden, Eric; Mezini, Mira
Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.619-629
[Conference Proceedings]
Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, Nadarajah
Financial Cryptography and Data Security
[Conference Proceedings]
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case
Nguyen, The An Binh; Englert, Frank; Farr, Simon; Gottron, Christian; Böhnstedt, Doreen; Steinmetz, Ralf
International Workshop on Pervasive Networks for Emergency Management (PerNEM)
[Conference Proceedings]
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot
Hasan, T.; Kikiras, Panayotis; Leonardi, Alessandro; Ziekow, Holger; Daubert, Jörg
Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), p.1-10
[Conference Proceedings]
A View on Privacy & Trust in IoT
Daubert, Jörg; Wiesmaier, Alexander; Kikiras, Panayotis
IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), p.2665-2670
[Conference Proceedings]
A probabilistic kernel method for human mobility prediction with smartphones
Do, Trinh Minh Tri; Dousse, Olivier; Miettinen, Markus; Gatica-Perez, Daniel
Pervasive and Mobile Computing, p.13-28
[Journal Article]
End-2-End Privacy Architecture for IoT
Funke, Sebastian; Daubert, Jörg; Wiesmaier, Alexander; Kikiras, Panayotis; Mühlhäuser, Max
IEEE Conference on Communications and Network Security (CNS)
[Conference Proceedings]
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Fehr, Victoria; Fischlin, Marc
IACR Cryptology ePrint Archive, p.765
[Journal Article]
An Automatic Inference of Minimal Security Types
Bollmann, Dominik; Lortz, Steffen; Mantel, Heiko; Starostin, Artem
Proceedings of the 11th International Conference on Information Systems Security (ICISS)
[Conference Proceedings]