Publikationen

Publikationen

Differential Detection of Facial Retouching: A Multi-Biometric Approach
Rathgeb, C.; Satnoianu, C.-I.; Haryanto, N. E.; Bernardo, K.; Busch, C.
IEEE Access, Vol.8, p.106373-106385
[Journal Article]


Touchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Efficient Identification in Large-Scale Vein Recognition Systems Using Spectral Minutiae Representations
Mokroß, B.-A.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Handbook of Vascular Biometrics
[Book Article]


Si­mu­la­tion of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
Mitkovski, A.; Merkle, J.; Rathgeb, C.; Tams, B.; Bernardo, K.; Haryanto, N. E.; Busch, C.
Proc. of 2020 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]


Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption
Kolberg, J.; Drozdowski, P.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]


Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2020), p.1-11
[Conference Proceedings]


Efficient privacy-preserving biometric identification in large-scale multibiometric systems
Drozdowski, P.
[Dissertation]


Can Generative Colourisation Help Face Recognition?
Drozdowski, P.; Fischer, D.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.299-307
[Conference Proceedings]


Multi-biometric Identification with Cascading Database Filtering
Drozdowski, P.; Rathgeb, C.; Mokroß, B.-A.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.2, p.210-222
[Journal Article]


Demographic Bias in Biometrics: A Survey on an Emerging Challenge
Drozdowski, P.; Rathgeb, C.; Dantcheva, A.; Damer, N.; Busch, C.
Trans. on Technology and Society (TTS), Vol.1, p.89-103
[Journal Article]


Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
Bauspieß, P.; Kolberg, J.; Demmler, D.; Krämer, J.; Busch, C.
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]


Peek-a-Boo: I see your smart home activities, even encrypted!
Acar, Abbas; Fereidooni, Hossein; Abera, Tigist; Sikder, Amit Kumsr; Miettinen, Markus; Aksu, Hidayet; Conti, Mauro; Sadeghi, Ahmad-Reza
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]


Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Putz, Florentin; Álvarez, Flor; Classen, Jiska
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.31-41
[Conference Proceedings]


Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation
Nieminen, Raine; Järvinen, Kimmo
IEEE Transactions on Mobile Computing
[Journal Article]


DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and MobileNetworks, p.331-333
[Conference Proceedings]


MPC for Securing Internet Infrastructure
Shrishak, Kris; Shulman, Haya
50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020)
[Conference Proceedings]


Diving into Email Bomb Attack
Schneider, Markus; Shulman, Haya; Sidis, Adi; Sidis, Ravid; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]


Secure Consensus Generation with Distributed DoH
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]


Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN 2020-International Conference on Dependable Systems and Networks
[Conference Proceedings]


The Impact of DNS Insecurity on Time
Jeitner, Philipp; Shulman, Haya; Waidner, Michael
DSN2020 - 50th International Conference on Dependable Systems and Networks
[Conference Proceedings]


DISCO: Sidestepping RPKI's Deployment Barriers
Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security Symposium (NDSS 2020)
[Conference Proceedings]


INVITED: AI Utopia or Dystopia - On Securing AI Platforms
Dessouky, Ghada; Jauernig, Patrick; Mentens, Nele; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
DAC'20-Design Automation Conference 2020
[Conference Proceedings]


Client-oblivious OPRAM
Davies, Gareth T.; Janson, Christian; Martin, Daniel P.
The 22nd International Conference on Information and Communications Security (ICICS 2020)
[Conference Proceedings]


Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Dalskov, Anders; Keller, Marcel; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya
ESORICS 2020-The 25th European Symposium on Research in Computer Security
[Conference Proceedings]


Optimal Transport Layer for Secure Computation
Brandt, Markus; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya
SECRYPT 2020-The 17th International Conference on Security and Cryptography
[Conference Proceedings]


TACAI: An Intermediate Representation Based on Abstract Interpretation
Reif, Michael; Kübler, Florian; Helm, Dominik; Hermann, Ben; Eichberg, Michael; Mezini, Mira
SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis
[Conference Proceedings]


With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design
Dessouky, Ghada; Frassetto, Tommaso; Jauernig, Patrick; Sadeghi, Ahmad-Reza
IEEE Security & Privacy
[Journal Article]


Linear-Complexity Private Function Evaluation is Practical
Holz, Marco; Kiss, Ágnes; Rathee, Deevashwer; Schneider, Thomas
25. European Symposium on Research in Computer Security (ESORICS'20)
[Conference Proceedings]


Limiting the Power of RPKI Authorities
Shrishak, Kris; Shulman, Haya
Proceedings of the Applied Networking Research Workshop (ANRW'20)
[Conference Proceedings]


MP2ML: A mixed-protocol machine learning framework for private inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Mohammad Hossein
ARES 2020: 15th International Conference on Availability, Reliability and Security
[Conference Proceedings]