Publikationen
Publikationen
Sicherheitsaspekte und Vergleich der Blockchiffren LED und TEA
Pauer, Christof; Appel, Michael; Wiesmaier, Alex
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 \& WG-8
Patrick Jattke, Matthias Senker, Alex Wiesmaier
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
Lennart Dietrich, Matthias Senker, Lulzim Murati, Patrick Jattke, Alex Wiesmaier
ECDSA and QUARTZ in Comparison with RSA
Patrick Lieb, Markus Schmidt, Alex Wiesmaier
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i
René Röpke, Timo Thräm, Johannes Wagener, Alex Wiesmaier
Security aspects and comparison of block ciphers LED and TEA
Pauer, Christof; Appel, Michael; Wiesmaier, Alex
A comparison of block ciphers SIMON, SPECK, and KATAN
Andreas Bossert, Steven Cooper, Alex Wiesmaier
Block ciphers for the IoT — SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared
Appel, Michael; Bossert, Andreas; Cooper, Steven; Kußmaul, Tobias; Löffler, Johannes; Pauer, Christof; Wiesmaier, Alexander
On the Security \& Privacy of Internet of Things Architectures and Systems
Vasilomanolakis, Emmanouil; Daubert, Jörg; Luthra, Manisha; Gazis, Vangelis; Wiesmaier, Alex; Kikiras, Panayotis
2015 International Workshop on Secure Internet of Things (SIoT), p.49-57
[Conference Proceedings]
Advanced Remote Firmware Upgrades Using TPM 2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]
Evaluation of Lightweight TPMs for Automotive Software Updates over the Air
Petri, Richard; Springer, Markus; Zelle, Daniel; McDonald, Ira; Fuchs, Andreas; Krauß, Christoph
4th Embedded Security in Cars (escar) USA
[Conference Proceedings]
Zur Benutzbarkeit der AusweisApp2
Willomitzer, Jörg; Heinemann, Andreas; Margraf, Marian
Mensch & Computer Workshopband
[Conference Proceedings]
Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises
Kostic, Sandra; Heinemann, Andreas; Margraf, Marian
GI-Jahrestagung, p.519-527
[Conference Proceedings]
Workshop: Nutzerzentrierte Sicherheit - NzS 2016
Heinemann, Andreas; Lange, Steffen; Margraf, Marian; Willomitzer, Jörg
GI-Jahrestagung, p.485-486
[Conference Proceedings]
In Whom Do We Trust - Sharing Security Events
Steinberger, J.; Kuhnert, B.; Sperotto, A.; Baier, H.; Pras, A.
Management and Security in the Age of Hyperconnectivity, p.111-124
Ludo - kids playing Distributed Denial of Service
Steinberger, J.; Santanna, J.; Spatharas, E.; Amler, H.; Breuer, N.; others
TERENA Networking Conf. (TNC16)
[Conference Proceedings]
Collaborative DDoS defense using flow-based security event information
Steinberger, J.; Kuhnert, B.; Sperotto, A.; Baier, H.; Pras, A.
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, p.516-522
[Conference Proceedings]
A Binarization Scheme for Face Recognition Based on Multi-Scale Block Local Binary Patterns
Schlett, T.; Rathgeb, C.; Busch, C.
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]
Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features
Scherhag, U.; Nautsch, A.; Rathgeb, C.; Busch, C.
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH), p.2209-2213
[Conference Proceedings]
Unlinkable improved multi-biometric iris fuzzy vault
Rathgeb, C.; Tams, B.; Wagner, J.; Busch, C.
EURASIP Journal on Information Security, Vol.2016, p.26
[Journal Article]
Effects of image compression on ear biometrics
Rathgeb, C.; Pflug, A.; Wagner, J.; Busch, C.
IET Biometrics, Vol.5, p.252-261
[Journal Article]
How to apply Binarized Statistical Image Features to Near-Infrared Iris Recognition effectively
Rathgeb, C.; Struck, F.; Busch, C.
Sixth Intl. Conf. on Image Processing Theory, Tools and Applications (IPTA 2016)
[Conference Proceedings]
Design Decisions for an Iris Recognition SDK
Rathgeb, C.; Uhl, A.; Wild, P.; Hofbauer, H.
Handbook of Iris Recognition, p.359-396
TripleA: Accelerated accuracy-preserving alignment for iris-codes
Rathgeb, C.; Hofbauer, H.; Uhl, A.; Busch, C.
2016 Intl. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]
DDoS 3.0 - How Terrorists Bring Down the Internet
Pras, A.; Santanna, J.; Steinberger, J.; Sperotto, A.
Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, p.1-4
Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection
Paulini, M.; Rathgeb, C.; Nautsch, A.; Reichau, H.; Reininger, H.; Busch, C.
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.291-296
[Conference Proceedings]
Finger image quality assessment features - definitions and evaluation
Olsen, M.; Šmida, V.; Busch, C.
IET Biometrics, Vol.5, p.47-64
[Journal Article]
Robustness of Quality-based Score Calibration of Speaker Recognition Systems with respect to low-SNR and short-duration conditions
Nautsch, A.; Saeidi, R.; Rathgeb, C.; Busch, C.
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.358-365
[Conference Proceedings]
Towards PLDA-RBM based speaker recognition in mobile environment: Designing stacked/deep PLDA-RBM systems
Nautsch, A.; Hao, H.; Stafylakis, T.; Rathgeb, C.; Busch, C.
Proc. of 2016 IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP), p.5055-5059
[Conference Proceedings]
HDA NIST SRE 16 Systems (CRISP \& I4U)
Nautsch, A.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Proc. of the NIST SRE workshop
[Conference Proceedings]