Publikationen
Publikationen
Preserving Privacy in Speaker and Speech Characterisation
Nautsch, A.; Jiménez, A.; Treiber, A.; Kolberg, J.; Jasserand, C.; others
Computer Speech \& Language, Vol.58, p.441-480
[Journal Article]
Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
Mandalapu, H.; Raghavendra, R.; Busch, C.
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]
Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Kolberg, J.; Bauspieß, P.; Gomez-Barrero, M.; Rathgeb, C.; Dürmuth, M.; Busch, C.
IEEE Workshop on Information Forensics and Security (WIFS), p.1-6
On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
González-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]
Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
González-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Pérez-Suárez, A.; Busch, C.
arXiv preprint
[Journal Article]
Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Proc. Int. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]
Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection
Gomez-Barrero, M.; Busch, C.
Proc. of the Norwegian Information Security Conf. (NISC)
[Conference Proceedings]
Light Fields for Face Analysis
Galdi, C.; Chiesa, V.; Busch, C.; Correia, P. Lobato; Dugelay, J.-L.; Guillemot, C.
IEEE Sensors Journal, Vol.19, p.2687
[Journal Article]
Computational Workload in Biometric Identification Systems: An Overview
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.8, p.351-368
[Journal Article]
Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1-5
[Conference Proceedings]
On the Application of Homomorphic Encryption to Face Identification
Drozdowski, P.; Buchmann, N.; Rathgeb, C.; Margraf, M.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, L.; Damer, N.; Moseguí-Saladié, A.; Rathgeb, C.; Scherhag, U.; Busch, C.; Kirchbuchner, F.; Uhl, A.
Image Analysis and Processing (ICIAP), p.345-356
[Conference Proceedings]
Standards for Biometric Presentation Attack Detection
Busch, C.
Handbook of Biometric Anti-Spoofing, p.503-514
eContracting: Case Study - Face Recognition in the Biometric Passport
Busch, C.
eDemocracy and eGovernment
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Stebila, Douglas
[Report]
LARA - A Design Concept for Lattice-based Encryption
Bansarkhani, Rachid El
FC 2019: 23rd International Conference on Financial Cryptography and Data Security
[Conference Proceedings]
Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, Vol.18, p.197-216
[Journal Article]
Post-Quantum Cryptography and its Application to the IoT
Krämer, Juliane
Informatik Spektrum, p.343-344
[Journal Article]
Science peace security ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
Interdisciplinary Conference on Technical Peace and Security Research
[Conference Proceedings]
Language-integrated privacy-aware distributed queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.167
[Journal Article]
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
IEEE Transactions on Software Engineering
[Journal Article]
Automated Refactoring to Reactive Programming
Köhler, Mirco; Salvaneschi, Guido
ASE2019
[Conference Proceedings]
Post-Quantum Cryptography in Embedded Systems
Krämer, Juliane; Marzougui, Soundes
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
[Conference Proceedings]
Can an online service predict gender?: on the state-of-the-art in gender identification from texts
Krüger, Stefan; Hermann, Ben
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering
[Conference Proceedings]
Zero-Interaction Security - Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications, p.16-21
[Journal Article]
Long-term integrity protection of genomic data
Buchmann, Johannes; Geihs, Matthias; Hamacher, Kay; Katzenbeisser, Stefan; Stammler, Sebastian
EURASIP Journal on Information Security, p.16
[Journal Article]
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
IET Information Security
[Journal Article]
Environment-Assisted Quantum Transport in a 10-qubit Network
Maier, Christine; Brydges, Tiff; Jurcevic, Petar; Trautmann, Nils; Hempel, Cornelius; Lanyon, Ben P.; Hauke, Philipp; Blatt, Rainer; Roos, Christian F.
PHYSICAL REVIEW LETTERS, p.50501
[Journal Article]
Optical scheme for cryptographic commitments with physical unclonable keys
Nikolopoulos, Georgios M.
Optical Express, p.29367-29379
[Journal Article]