Publikationen
Publikationen
A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes
Buchmann, N.; Rathgeb, C.; Wagner, J.; Busch, C.; Baier, H.
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]
BIOSIG 2016
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Attack detection in an autonomous entrance system using optical flow
Siegmund, Dirk; Fu, Biying; Samartzidis, Timotheos; Wainakh, Aidmar; Kuijper, Arjan; Braun, Andreas
International Conference on Imaging for Crime Detection and Prevention (ICDP) 2016
[Conference Paper]
Combining low-level features of offline questionnaires for handwriting identification
Siegmund, Dirk; Ebert, Tina; Damer, Naser
International Conference on Image Analysis and Recognition (ICIAR) 2016
[Conference Paper]
Verifying isolation in a mantrap portal via thermal imaging
Siegmund, Dirk; Handtke, David; Kaehm, Olga
International Conference on Systems, Signals and Image Processing (IWSSIP) 2016
[Conference Paper]
Verification of single-person access in a mantrap portal using RGB-D images
Siegmund, Dirk; Wainakh, Aidmar; Braun, Andreas
Workshop de Visão Computacional (WVC) 2016
[Conference Paper]
Multi-biometric continuous authentication. A trust model for an asynchronous system
Damer, Naser; Maul, Fabian; Busch, Christoph
International Conference on Information Fusion (FUSION) 2016
[Conference Paper]
Practical view on face presentation attack detection
Damer, Naser; Dimitrov, Kristiyan
British Machine Vision Conference (BMVC) 2016
[Conference Paper]
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Gerber, Nina
Mensch und Computer 2016 - Tagungsband
[Conference Proceedings]
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Fujiwara, Mikio; Geihs, Matthias; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.1-13
[Conference Proceedings]
Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Workshop on Security and Privacy in Smartphones and Mobile Devices
[Conference Proceedings]
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Conference Proceedings]
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
[Conference Proceedings]
Call graph construction for Java libraries
Reif, Michael; Eichberg, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
[Conference Proceedings]
Variability Modeling of Cryptographic Components (Clafer Experience Report)
Nadi, Sarah; Krüger, Stefan
Tenth International Workshop on Variability Modelling of Software-intensive Systems
[Conference Proceedings]
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA
Akleylek, Sedat; Dagdelen, Özgür; Tok, Zaliha Yüce
Cryptography and Information Security in the Balkans, p.155-168
[Conference Proceedings]
NetCo: Reliable Routing with Unreliable Routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference Proceedings]
Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Noon, Hon Bin; Shulman, Haya
International Cryptology Conference (CRYPTO)
[Conference Proceedings]
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Asokan, N.; Huang, Jialin; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza
[Conference Proceedings]
LoT: a Reputation-based Trust System for Long-term Archiving
Vigil, Martín; Demirel, Denise; Habib, Sheikh Mahbub; Hauke, Sascha; Buchmann, Johannes; Mühlhäuser, Max
SECURWARE 2016, p.262-270
[Conference Proceedings]
Towards a Unified Security Model for Physically Unclonable Functions
Sadeghi, Ahmad-Reza; Armknecht, Frederik
CT-RSA - Cryptographers' Track at the RSA Conference
[Conference Proceedings]
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input
Müller, Florian; Günther, Sebastian; Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Mühlhäuser, Max
CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
[Conference Proceedings]
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected
Cam-Winget, Nancy; Sadeghi, Ahmad-Reza; Jin, Yier
53rd Design Automation Conference (DAC)
[Conference Proceedings]
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective
Brasser, Ferdinand; Rasmussen, Kasper; Sadeghi, Ahmad-Reza; Tsudik, Gene
Proceedings of the 53nd Annual Design Automation Conference
[Conference Proceedings]
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Heuser, Stephan; Negro, Marco; Pendyala, Praveen Kumar; Sadeghi, Ahmad-Reza
Financial Crypto 2016
[Conference Proceedings]
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks
Daubert, Jörg; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), p.738-744
[Conference Proceedings]
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques
Rasthofer, Siegfried; Arzt, Steven; Miltenberger, Marc; Bodden, Eric
Network and Distributed System Security Symposium 2016, p.1-15
[Conference Proceedings]
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs
Mariano, Artur; Bischof, Christian
PDP2016
[Conference Proceedings]
Efficiency Comparison of Various Approaches in E-Voting Protocols
Kulyk, Oksana; Volkamer, Melanie
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, p.209-233
[Conference Proceedings]
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Kulyk, Oksana; Gerber, Paul; Reinheimer, Benjamin; Renaud, Karen; Volkamer, Melanie
NDSS Workshop on Usable Security (USEC)
[Conference Proceedings]


