Publications

Publications

Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]


SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]


Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]


Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]


Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]


Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]


General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.13, p.1406-1420
[Journal Article]


Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
[Journal Article]


Ethical guidelines for nudging in information security & privacy
Renaud, Karen; Zimmermann, Verena
International Journal of Human-Computer Studies (IJHCS), p.22-35
[Journal Article]


Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), p.680-685
[Journal Article]


Guidelines For Ethical Nudging in Password Authentication
Renaud, Karen; Zimmermann, Verena
South African Institute Of Electrical Engineers (SAIEE), p.102-118
[Journal Article]


Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards
Heidt, Margareta
European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
[Journal Article]


When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Dessouky, Ghada; Gens, David; Haney, Patrick; Persyn, Garrett; Kanuparthi, Arun K.; Khattri, Hareesh; Fung, Jason M.; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
Cryptography and Security
[Journal Article]


Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines
Kaufhold, Marc-André; Gizikis, Alexis; Reuter, Christian; Habdank, Matthias; Grinko, Margarita
Journal of Contingencies and Crisis Management (JCCM), p.198-213
[Journal Article]


A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Gil Dantas, Yuri; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Journal Article]


Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
Riebe, Thea; Nordmann, Alfred; Reuter, Christian
Wissenschaft & Frieden, p.60-61
[Journal Article]


Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.v-viii
[Journal Article]


Human-computer interaction and social media in safety-critical Systems – Editorial
Reuter, Christian; Mentler, Tilo
Journal of Contingencies and Crisis Management (JCCM), p.2-3
[Journal Article]


Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Spielhofer, Thomas
Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, p.64-66
[Journal Article]


Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail
Reuter, Christian; Leopold, Inken
Media in Action: An Interdisciplinary Journal on Cooperative Media, p.99-134
[Journal Article]


Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
BBK Bevölkerungsschutz, p.22-24
[Journal Article]


Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics
Reuter, Christian; Kaufhold, Marc-André
Journal of Contingencies and Crisis Management (JCCM), p.41-57
[Journal Article]


Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research
Reuter, Christian; Hughes, Amanda Lee; Kaufhold, Marc-André
International Journal on Human-Computer Interaction (IJHCI), p.280-294
[Journal Article]


Editorial of the Special Issue on Social Media in Crisis Management
Reuter, Christian; Hughes, Amanda Lee; Hiltz, Starr Roxanne; Imran, Muhammad; Plotnick, Linda
International Journal on Human-Computer Interaction (IJHCI), p.277-279
[Journal Article]


Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.1-19
[Journal Article]


A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas
Journal of Mathematical Cryptology (JMC)
[Journal Article]


M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
[Report, Journal Article]


Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng; Krämer, Juliane; Hu, Yu-pu; Buchmann, Johannes
Frontiers of Information Technology & Electronic Engineering, p.1348-1369
[Journal Article]


DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Dang, Minh Hoang; Asokan, N.; Sadeghi, Ahmad-Reza
CoRR
[Journal Article]


OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep
IEEE Internet Computing, p.1-1
[Journal Article]