Publications

Publications

Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
Osorio-Roig, D.; Drozdowski, P.; Rathgeb, C.; Morales-González, A.; Garea-Llano, E.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-6
[Conference Proceedings]


Towards Multi-Modal Finger Presentation Attack Detection
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Proc. UBIO, p.547-552
[Conference Proceedings]


Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures
Drozdowski, P.; Garg, S.; Rathgeb, C.; Gomez-Barrero, M.; Chang, D.; Busch, C.
European Signal Processing Conf. (EUSIPCO), p.1-5
[Conference Proceedings]


Database Binning and Retrieval in Multi-Fingerprint Identification Systems
Drozdowski, P.; Fischer, D.; Rathgeb, C.; Schiel, C.; Busch, C.
Intl. Workshop on Information Forensics and Security (WIFS), p.1-7
[Conference Proceedings]


Detection of Glasses in Near-infrared Ocular Images
Drozdowski, P.; Struck, F.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometrics (ICB), p.1-7
[Conference Proceedings]


Score Fusion Strategies in Single-Iris Dual-Probe Recognition Systems
Drozdowski, P.; Wiegand, N.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometric Engineering and Applications (ICBEA), p.13-17
[Conference Proceedings]


Benchmarking Binarisation Schemes for Deep Face Templates
Drozdowski, P.; Struck, F.; Rathgeb, C.; Busch, C.
Intl. Conf. on Image Processing (ICIP), p.1-5
[Conference Proceedings]


PRNU Variance Analysis for Morphed Face Image Detection
Debiasi, L.; Scherhag, U.; Rathgeb, C.; Uhl, A.; Busch, C.
in Proc. of 9th Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS 2018)
[Conference Proceedings]


PRNU-based Detection of Morphed Face Images
Debiasi, L.; Scherhag, U.; Rathgeb, C.; Uhl, A.; Busch, C.
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]


Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
[Conference Proceedings]


Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]


Off-path Attacks Against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
[Conference Proceedings]


Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
HotNets '18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]


Towards a Cloud-based System for Software Protection and Licensing
Schaad, Andreas; Grohmann, Bjoern; Winzenried, Oliver; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, p.698-702
[Conference Proceedings]


‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes
Zimmermann, Verena; Bennighof, Merve; Edel, Miriam; Hofmann, Oliver; Jung, Judith; Wick, Melina von
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]


The Quest to Replace Passwords Revisited – Rating Authentication Schemes
Zimmermann, Verena; Gerber, Nina; Kleboth, Marius; Preuschen, Alexandra von; Schmidt, Konstantin; Mayer, Peter
Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), p.38-48
[Conference Proceedings]


Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie
International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


Collective Attestation: for a Stronger Security in Embedded Networks
Ibrahim, Ahmad
IEEE
[Conference Proceedings]


The Future of IoT Security: Special Session
Mohan, Sibin; Asplund, Mikael; Bloom, Gedare; Sadeghi, Ahmad-Reza; Ibrahim, Ahmad; Salajageh, Negin; Griffioen, Paul; Sinopoli, Bruno
International Conference on Embedded Software (EMSOFT 2018), 2018
[Conference Proceedings]


Securing Embedded Networks Through Secure Collective Attestation
Ibrahim, Ahmad
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018
[Conference Proceedings]


One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
[Conference Proceedings]


Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
[Conference Proceedings]


The Influence of SME Constraints in an Organizational IT Security Context
Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
[Conference Proceedings]


Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java
Reif, Michael; Eichberg, Michael; Kübler, Florian; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.107-112
[Conference Proceedings]


Lattice Based Modularization of Static Analyses
Eichberg, Michael; Kübler, Florian; Helm, Dominik; Reif, Michael; Salvaneschi, Guido; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.113-118
[Conference Proceedings]


ELSA: Efficient Long-Term Secure Storage of Large Datasets
Geihs, Matthias; Buchmann, Johannes
Information Security and Cryptology- ICISC 2018, p.269-286
[Conference Proceedings]


Coalition-Resistant Peer Rating for Long-Term Confidentiality
Traverso, Giulia; Butin, Denis; Buchmann, Johannes; Palesandro, Alex
PST 2018 - 16th Annual Conference on Privacy, Security and Trust
[Conference Proceedings]


SocialML: EUD im Maschine Learning zur Analyse sozialer Medien
Scholl, Simon; Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André
Mensch und Computer 2018 Tagungsband, p.443-446
[Conference Proceedings]


From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
Riebe, Thea; Pätsch, Katja; Kaufhold, Marc-André; Reuter, Christian
Mensch und Computer 2018: Workshopband MuC 2018, p.595-603
[Conference Proceedings]


Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel; Bayer, Markus; Hartung, Daniel; Kaygusuz, Cemal
Mensch und Computer 2018: Workshopband MuC 2018, p.623-632
[Conference Proceedings]