Publications

Publications

Zur Benutzbarkeit der AusweisApp2
Willomitzer, Jörg; Heinemann, Andreas; Margraf, Marian
Mensch & Computer Workshopband
[Conference Proceedings]


Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises
Kostic, Sandra; Heinemann, Andreas; Margraf, Marian
GI-Jahrestagung, p.519-527
[Conference Proceedings]


Workshop: Nutzerzentrierte Sicherheit - NzS 2016
Heinemann, Andreas; Lange, Steffen; Margraf, Marian; Willomitzer, Jörg
GI-Jahrestagung, p.485-486
[Conference Proceedings]


Ludo - kids playing Distributed Denial of Service
Steinberger, J.; Santanna, J.; Spatharas, E.; Amler, H.; Breuer, N.; others
TERENA Networking Conf. (TNC16)
[Conference Proceedings]


Collaborative DDoS defense using flow-based security event information
Steinberger, J.; Kuhnert, B.; Sperotto, A.; Baier, H.; Pras, A.
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, p.516-522
[Conference Proceedings]


A Binarization Scheme for Face Recognition Based on Multi-Scale Block Local Binary Patterns
Schlett, T.; Rathgeb, C.; Busch, C.
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]


Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features
Scherhag, U.; Nautsch, A.; Rathgeb, C.; Busch, C.
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH), p.2209-2213
[Conference Proceedings]


How to apply Binarized Statistical Image Features to Near-Infrared Iris Recognition effectively
Rathgeb, C.; Struck, F.; Busch, C.
Sixth Intl. Conf. on Image Processing Theory, Tools and Applications (IPTA 2016)
[Conference Proceedings]


TripleA: Accelerated accuracy-preserving alignment for iris-codes
Rathgeb, C.; Hofbauer, H.; Uhl, A.; Busch, C.
2016 Intl. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]


Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection
Paulini, M.; Rathgeb, C.; Nautsch, A.; Reichau, H.; Reininger, H.; Busch, C.
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.291-296
[Conference Proceedings]


Robustness of Quality-based Score Calibration of Speaker Recognition Systems with respect to low-SNR and short-duration conditions
Nautsch, A.; Saeidi, R.; Rathgeb, C.; Busch, C.
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.358-365
[Conference Proceedings]


Towards PLDA-RBM based speaker recognition in mobile environment: Designing stacked/deep PLDA-RBM systems
Nautsch, A.; Hao, H.; Stafylakis, T.; Rathgeb, C.; Busch, C.
Proc. of 2016 IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP), p.5055-5059
[Conference Proceedings]


HDA NIST SRE 16 Systems (CRISP \& I4U)
Nautsch, A.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Proc. of the NIST SRE workshop
[Conference Proceedings]


Decision Robustness of Voice Activity Segmentation in Unconstrained Mobile Speaker Recognition Environments
Nautsch, A.; Bamberger, R.; Busch, C.
Proc. of 2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-7
[Conference Proceedings]


Correlation-resistant fuzzy vault for fingerprints
Merkle, J.; Butt, M.; Korte, U.; Busch, C.
Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, p.125-136
[Conference Proceedings]


The I4U Submission to the 2016 NIST Speaker Recognition Evaluation
Lee, K.A.; Sun, H.; Sizov, A.; Wang, G.; Nguyen, T.H.; others
Proc. of the NIST SRE workshop
[Conference Proceedings]


Altered fingerprint detection - algorithm performance evaluation
Haraksim, Rudolf; Anthonioz, Alexandre; Champod, Christophe; Olsen, Martin; Ellingsgaard, John; Busch, Christophe
2016 4th Intl. Conf. on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Multi-biometric continuous authentication: A trust model for an asynchronous system
Damer, N.; Maul, F.; Busch, C.
2016 19th Intl. Conf. on Information Fusion (FUSION), p.2192-2199
[Conference Proceedings]


A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes
Buchmann, N.; Rathgeb, C.; Wagner, J.; Busch, C.; Baier, H.
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]


BIOSIG 2016
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Workshop on Security and Privacy in Smartphones and Mobile Devices
[Conference Proceedings]


Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Conference Proceedings]


Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
[Conference Proceedings]


Call graph construction for Java libraries
Reif, Michael; Eichberg, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
[Conference Proceedings]


Variability Modeling of Cryptographic Components (Clafer Experience Report)
Nadi, Sarah; Krüger, Stefan
Tenth International Workshop on Variability Modelling of Software-intensive Systems
[Conference Proceedings]


On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA
Akleylek, Sedat; Dagdelen, Özgür; Tok, Zaliha Yüce
Cryptography and Information Security in the Balkans, p.155-168
[Conference Proceedings]


NetCo: Reliable Routing with Unreliable Routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference Proceedings]


Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Noon, Hon Bin; Shulman, Haya
International Cryptology Conference (CRYPTO)
[Conference Proceedings]


Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Asokan, N.; Huang, Jialin; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza
[Conference Proceedings]


LoT: a Reputation-based Trust System for Long-term Archiving
Vigil, Martín; Demirel, Denise; Habib, Sheikh Mahbub; Hauke, Sascha; Buchmann, Johannes; Mühlhäuser, Max
SECURWARE 2016, p.262-270
[Conference Proceedings]