Publikationen

Publikationen

PROPYLA: Privacy Preserving Long-Term Secure Storage
Geihs, Matthias; Karvelas, Nikolaos; Katzenbeisser, Stefan; Buchmann, Johannes
SCC Workshop @ AsiaCCS 2018
[Conference Proceedings]


Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Fischlin, Marc; Harasser, Patrick
Applied Cryptography and Network Security - ACNS 2018, p.202-220
[Conference Proceedings]


Towards Secure Distributed Trust Management on a Global Scale
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Mühlhäuser, Max
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy
[Conference Proceedings]


Estimate all the {LWE, NTRU} schemes!
Albrecht, Martin R.; Curtis, Benjamin R.; Deo, Amit; Davidson, Alex; Player, Rachel; Postlethwaite, Eamonn W.; Virdia, Fernando; Wunderer, Thomas
SCN 2018
[Conference Proceedings]


Towards Practical RAM based Secure Computation
Buescher, Niklas; Weber, Alina; Katzenbeisser, Stefan
European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


IMIX: In-Process Memory Isolation EXtension
Frassetto, Tommaso; Jauernig, Patrick; Liebchen, Christopher; Sadeghi, Ahmad-Reza
Proceedings of the 27th USENIX Security Symposium, p.83-97
[Conference Proceedings]


Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications
Kumar, Manish; Anagnostopoulos, Nikolaos Athanasios; Fan, Yufan; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]


Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Tehranipoor, Fatemeh; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]


VoiceGuard: Secure and Private Speech Processing
Brasser, Ferdinand; Frassetto, Tommaso; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Weinert, Christian
Interspeech 2018
[Conference Proceedings]


HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
Büscher, Niklas; Demmler, Daniel; Katzenbeisser, Stefan; Kretzmer, David; Schneider, Thomas
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.847-861
[Conference Proceedings]


Anti-Forensic Capacity and Detection Rating of Hiding Data in the ext4 Filesystem
Göbel, Thomas; Baier, Harald
14th Annual IFIP WG 11.9 International Conference on Digital Forensics
[Conference Proceedings]


Neighbor distance ratios and dynamic weighting in multi-biometric fusion
Damer, Naser; Alkhatib, Wael; Braun, Andreas; Kuijper, Arjan
Iberian Conference on Pattern Recognition and Image Analysis (IbPRIA) 2017
[Conference Paper]


Opportunities for biometric technologies in smart environments
Henniger, Olaf; Damer, Naser; Braun, Andreas
European Conference on Ambient Intelligence (AmI) 2017
[Conference Paper]


Indexing of single and multi-instance iris data based on LSH-forest and rotation invariant representation
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Computer Analysis of Images and Patterns (CAIP) 2017
[Conference Paper]


Trust the biometric mainstream: Multi-biometric fusion and score coherence
Damer, Naser; Rhaibani, Chadi Izzou; Braun, Andreas; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 2017
[Conference Paper]


Talis - a design study for a wearable device to assist people with depression
Siegmund, Dirk; Hörr, Oliver; Chiesa, Laura; Gabler, Frank; Braun, Andreas; Kuijper, Arjan
Annual Computer Software and Applications Conference (COMPSAC) 2017
[Conference Paper]


Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
International Joint Conference on Computer Vision and Computer Graphics Theory and Applications (VISIGRAPP) 2017
[Conference Paper]


TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Frieß, Tamara; Mühlhäuser, Max
26th USENIX Security Symposium
[Conference Proceedings]


Constrained PET Composition for Measuring Enforced Privacy
Funke, Sebastian; Wiesmaier, Alexander; Daubert, Jörg
Proceedings of the 12th International Conference on Availability, Reliability and Security, p.1-16
[Conference Proceedings]


On Using TLS to Secure In-Vehicle Networks
Zelle, Daniel; Krauß, Christoph; Strauß, Hubert; Schmidt, Karsten
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


Runtime Firmware Product Lines using TPM2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Proceedings of the 32th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]


A Privacy-aware Data Access System for Automotive Applications
Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Lange, Benjamin; Mauthofer, Sebastian; Walter, Jonas; Abendroth, Bettina; Robrahn, Rasmus; von Pape, Thilo; Decke, Hendrik
15th Embedded Security in Cars (escar)
[Conference Proceedings]


Design and Implementation Aspects of Mobile Derived Identities
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
Open Identity Summit, p.147-152
[Conference Proceedings]


Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting
Scherhag, U.; Nautsch, A.; Rathgeb, C.; Gomez-Barrero, M.; Veldhuis, R. N. J.; Spreeuwers, Luuk; Schils, Maikel; Maltoni, Davide; Grother, Patrick; Marcel, Sebastien; Breithaupt, Ralph; Ramachandra, Raghavendra; Busch, Christoph
Intl. Conf. of the Biometrics Special Interest Group BIOSIG 2017, p.1-7
[Conference Proceedings]


On the Vulnerability of Face Recognition Systems Towards Morphed Face Attacks
Scherhag, U.; Raghavendra, R.; Raja, K. B.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Improvement of Iris Recognition Based on Iris-Code Bit-Error Pattern Analysis
Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Conference Proceedings]


On the Feasibility of Creating Morphed Iris-Codes
Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017)
[Conference Proceedings]


Scale-level score fusion of steered pyramid features for cross-spectral periocular verification
Raja, K. B.; Raghavendra, R.; Busch, C.
20th Intl. Conf. on Information Fusion, FUSION 2017, p.1-7
[Conference Proceedings]


Robust Verification With Subsurface Fingerprint Recognition Using Full Field Optical Coherence Tomography
Raja, K. B.; Auksorius, E.; Raghavendra, R.; Boccara, A. C.; Busch, C.
2017 IEEE Conf. on Computer Vision and Pattern Recognition Workshops CVPR, p.646-654
[Conference Proceedings]


Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
Nautsch, A.; Steen, S. T.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]