Publications

Publications

LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Dessouky, Ghada; Abera, Tigist; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18)
[Conference Proceedings]


A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Dantas, Yuri Gil; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]


Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Degabriele, Jean Paul; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2018, p.519-550
[Conference Proceedings]


"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Kulyk, Oksana; Hilt, Annika; Gerber, Nina; Volkamer, Melanie
3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018
[Conference Proceedings]


Helping john to make informed decisions on using social login
Karegar, Farzaneh; Gerber, Nina; Volkamer, Melanie; Fischer-Hübner, Simone
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, p.1165-1174
[Conference Proceedings]


Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, Marco; Henhapl, Birgit; Gerber, Nina
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]


Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Gerber, Nina; Gerber, Paul; Volkamer, Melanie
Computers & Security, p.226-261
[Journal Article]


IoT Stream Processing Tutorial
Strohbach, M.; Wiesmaier, A.; Mittelbach, A.
[Report]


Web Application for Privacy-Preserving Scheduling
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Conference Proceedings]


Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]


A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems
Birkholz, Henk; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Suri, Neeraj; Vateva-Gurova, Tsvetoslava; Schlehuber, Christian
4th International Workshop on MILS: Architecture and Assurance for Secure Systems, (MILS@DSN 2018)
[Conference Proceedings]


Anonymous Charging and Billing of Electric Vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES, p.1-22
[Conference Proceedings]


The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Von Pape, Thilo; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES, p.1-24
[Conference Proceedings]


Open Source Value Chains for Addressing Security Issues Efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]


Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
Sicherheit, p.183-196
[Conference Proceedings]


Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
Tolosana, R.; Gomez-Barrero, M.; Kolberg, J.; Morales, A.; Busch, C.; Ortega-Garcia, J.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]


Sex-Prediction from Periocular Images across Multiple Sensors and Spectra
Tapia, J.; Rathgeb, C.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-7
[Conference Proceedings]


Multi-spectral Iris Segmentation in Visible Wavelengths
Schlett, T.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-5
[Conference Proceedings]


Performance Variation of Morphed Face Image Detection Algorithms across different Datasets
Scherhag, U.; Rathgeb, C.; Busch, C.
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]


Morph detection from single face images: a multi-algorithm fusion approach
Scherhag, U.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometric Engineering and Applications 2018 (ICBEA), p.1-7
[Conference Proceedings]


Towards detection of morphed face images in electronic travel documents
Scherhag, U.; Rathgeb, C.; Busch, C.
13th IAPR Workshop on Document Analysis Systems (DAS), p.1-6
[Conference Proceedings]


Detecting Morphed Face Images Using Facial Landmarks
Scherhag, U.; Budhrani, D.; Gomez-Barrero, M.; Busch, C.
Intl. Conf. on Image and Signal Processing (ICISP)
[Conference Proceedings]


SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]


Multi-sample Compression of Iris Images using High Efficiency Video Coding
Rathgeb, C.; Schlett, T.; Buchmann, N.; Baier, H.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-6
[Conference Proceedings]


Visible Wavelength Iris Segmentation: A Multi-Class Approach using Fully Convolutional Neuronal Networks
Osorio-Roig, D.; Rathgeb, C.; Gomez-Barrero, M.; Morales-Gonzalez, A.; Garea-Llano, E.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
Osorio-Roig, D.; Drozdowski, P.; Rathgeb, C.; Morales-González, A.; Garea-Llano, E.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-6
[Conference Proceedings]


Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]


Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]


Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]


Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]