Publications

Publications

Decision Robustness of Voice Activity Segmentation in Unconstrained Mobile Speaker Recognition Environments
A. Nautsch and R. Bamberger and C. Busch
Proc. of 2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–7
[Conference Proceedings]


Keystroke Biometrics Ongoing Competition
A. Morales and J. Fierrez and R. Tolosana and J. Ortega-Garcia and J. Galbally and others
IEEE Access, Vol.4, p.7736–7746
[Journal Article]


Correlation-resistant fuzzy vault for fingerprints
J. Merkle and M. Butt and U. Korte and C. Busch
Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, p.125–136
[Conference Proceedings]


The I4U Submission to the 2016 NIST Speaker Recognition Evaluation
K.A. Lee and Sun, H. and Sizov, A. and Wang, G. and Nguyen, T.H. and others
Proc. of the NIST SRE workshop
[Conference Proceedings]


Altered fingerprint detection - algorithm performance evaluation
Rudolf Haraksim and Alexandre Anthonioz and Christophe Champod and Martin Olsen and John Ellingsgaard and Christophe Busch
2016 4th Intl. Conf. on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Unlinkable and irreversible biometric template protection based on bloom filters
Marta Gomez-Barrero and Christian Rathgeb and Javier Galbally and Christoph Busch and Julian Fierrez
Information Sciences, Vol.370–371, p.18–32
[Journal Article]


Multi-biometric continuous authentication: A trust model for an asynchronous system
N. Damer and F. Maul and C. Busch
2016 19th Intl. Conf. on Information Fusion (FUSION), p.2192–2199
[Conference Proceedings]


A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes
N. Buchmann and C. Rathgeb and J. Wagner and C. Busch and H. Baier
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]


BIOSIG 2016
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Attack detection in an autonomous entrance system using optical flow
Siegmund, Dirk; Fu, Biying; Samartzidis, Timotheos; Wainakh, Aidmar; Kuijper, Arjan; Braun, Andreas
International Conference on Imaging for Crime Detection and Prevention (ICDP) 2016
[Conference Paper]


Combining low-level features of offline questionnaires for handwriting identification
Siegmund, Dirk; Ebert, Tina; Damer, Naser
International Conference on Image Analysis and Recognition (ICIAR) 2016
[Conference Paper]


Verifying isolation in a mantrap portal via thermal imaging
Siegmund, Dirk; Handtke, David; Kaehm, Olga
International Conference on Systems, Signals and Image Processing (IWSSIP) 2016
[Conference Paper]


Verification of single-person access in a mantrap portal using RGB-D images
Siegmund, Dirk; Wainakh, Aidmar; Braun, Andreas
Workshop de Visão Computacional (WVC) 2016
[Conference Paper]


Multi-biometric continuous authentication. A trust model for an asynchronous system
Damer, Naser; Maul, Fabian; Busch, Christoph
International Conference on Information Fusion (FUSION) 2016
[Conference Paper]


Practical view on face presentation attack detection
Damer, Naser; Dimitrov, Kristiyan
British Machine Vision Conference (BMVC) 2016
[Conference Paper]


Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Gerber, Nina
Mensch und Computer 2016 - Tagungsband
[Conference Proceedings]


A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Cryptology ePrint Archive, p.1-33
[Journal Article]


Security Proofs for Participation Privacy and Stronger Verifiability for Helios
Bernhard, David; Kulyk, Oksana; Volkamer, Melanie
[Report]


LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Fujiwara, Mikio; Geihs, Matthias; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.1-13
[Conference Proceedings]


Post-Quantum Attribute-Based Signatures from Lattice Assumptions
Bansarkhani, Rachid El; El Kaafarani, Ali
Cryptology ePrint Archive, p.1-28
[Journal Article]


Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Wunderer, Thomas
Cryptology ePrint Archive, p.1-35
[Journal Article]


Computational Security of Quantum Encryption
Alagic, Gorjan; Broadbent, Anne; Fefferman, Bill; Gagliardoni, Tommaso; Schaffner, Christian; Jules, Michael St.
Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, p.47-71


Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Workshop on Security and Privacy in Smartphones and Mobile Devices
[Conference Proceedings]


Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Conference Proceedings]


User-Centric Security and Dependability in the Cloud of Clouds
Lacoste, Marc; Sousa, Paulo; Neves, Nuno; Miettinen, Markus; Ramos, Fernando M.V.; Vukolic, Marko; Charmet, Fabien; Yaich, Reda; Oborzynski, Krzysztof; Vernekar, Gitesh
IEEE Cloud Computing Special issue on Cloud Security, p.64-75
[Journal Article]


Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
[Conference Proceedings]


Call graph construction for Java libraries
Reif, Michael; Eichberg, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
[Conference Proceedings]


Variability Modeling of Cryptographic Components (Clafer Experience Report)
Nadi, Sarah; Krüger, Stefan
Tenth International Workshop on Variability Modelling of Software-intensive Systems
[Conference Proceedings]


On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA
Akleylek, Sedat; Dagdelen, Özgür; Tok, Zaliha Yüce
Cryptography and Information Security in the Balkans, p.155-168
[Conference Proceedings]


NetCo: Reliable Routing with Unreliable Routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Conference Proceedings]