Publications

Publications

Constrained PET Composition for Measuring Enforced Privacy
S. Funke and A. Wiesmaier and J. Daubert
Proceedings of the 12th International Conference on Availability, Reliability and Security, p.16:1–16:10
[Conference Proceedings]


On Using TLS to Secure In-Vehicle Networks
Daniel Zelle and Christoph Krauß and Hubert Strauß and Karsten Schmidt
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


Selbstdatenschutz im vernetzten Fahrzeug - Eine Datenschutzloesung unter Berücksichtigung der technischen, rechtlichen und Nutzeranforderungen
Christoph Krauß and Rasmus Robrahn and Thilo von Pape and Daniel Zelle
Datenschutz und Datensicherheit, Vol.41, p.217-222
[Journal Article]


Runtime Firmware Product Lines using TPM2.0
Andreas Fuchs and Christoph Krauß and Jürgen Repp
Proceedings of the 32th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]


A Privacy-aware Data Access System for Automotive Applications
Christian Plappert and Daniel Zelle and Christoph Krauß and Benjamin Lange and Sebastian Mauthofer and Jonas Walter and Bettina Abendroth and Rasmus Robrahn and Thilo von Pape and Hendrik Decke
15th Embedded Security in Cars (escar)
[Conference Proceedings]


Design and Implementation Aspects of Mobile Derived Identities
Daniel Träder and Alexander Zeier and Andreas Heinemann
CoRR, Vol.abs/1707.06505
[Journal Article]


Design and Implementation Aspects of Mobile Derived Identities
Daniel Träder and Alexander Zeier and Andreas Heinemann
Open Identity Summit, p.147–152
[Conference Proceedings]


Alle reden über Blockchain
Rüdiger Grimm and Andreas Heinemann
Datenschutz und Datensicherheit, Vol.41, p.469
[Journal Article]


Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting
U. Scherhag and A. Nautsch and C. Rathgeb and M. Gomez-Barrero and R. N. J. Veldhuis and Luuk Spreeuwers and Maikel Schils and Davide Maltoni and Patrick Grother and Sebastien Marcel and Ralph Breithaupt and Raghavendra Ramachandra and Christoph Busch
Intl. Conf. of the Biometrics Special Interest Group BIOSIG 2017, p.1–7
[Conference Proceedings]


On the Vulnerability of Face Recognition Systems Towards Morphed Face Attacks
U. Scherhag and R. Raghavendra and K. B. Raja and M. Gomez-Barrero and C. Rathgeb and C. Busch
5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Iris biometric template protection
C. Rathgeb and J. Wagner and C. Busch
Iris and Periocular Biometric Recognition, p.317–340


Improvement of Iris Recognition Based on Iris-Code Bit-Error Pattern Analysis
C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–6
[Conference Proceedings]


Fundamentals in iris recognition
C. Rathgeb and C. Busch
Iris and Periocular Biometric Recognition, p.1–28


On the Feasibility of Creating Morphed Iris-Codes
C. Rathgeb and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017)
[Conference Proceedings]


Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems
C. Rathgeb and N. Buchmann and H. Hofbauer and H. Baier and A. Uhl and C. Busch
IET Biometrics
[Journal Article]


Scale-level score fusion of steered pyramid features for cross-spectral periocular verification
K. B. Raja and R. Raghavendra and C. Busch
20th Intl. Conf. on Information Fusion, FUSION 2017, p.1–7
[Conference Proceedings]


Robust Verification With Subsurface Fingerprint Recognition Using Full Field Optical Coherence Tomography
K. B. Raja and E. Auksorius and R. Raghavendra and A. C. Boccara and C. Busch
2017 IEEE Conf. on Computer Vision and Pattern Recognition Workshops CVPR, p.646–654
[Conference Proceedings]


Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
A. Nautsch and S. T. Steen and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
A. Nautsch and D. Meuwly and D. Ramos and J. Lindh and C. Busch
IEEE Signal Processing Letters, Vol.24, p.1552–1556
[Journal Article]


da/sec ASVspoof2017 Submission
Nautsch, A. and Scherhag, U. and Isadskiy, S. and Rathgeb, C. and Busch, C.
Prof. of the ASVspoof evaluation
[Conference Proceedings]


Biometric template protection based on Bloom filters and honey templates
E. Martiri and M. Gomez-Barrero and B. Yang and C. Busch
IET Biometrics, Vol.6, p.19–26
[Journal Article]


The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016
K. A. Lee and V. Hautamäki and T. Kinnunen and A. Larcher and C. Zhang and others
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH)
[Conference Proceedings]


Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection
M. Gomez-Barrero and J. Galbally and A. Morales and J. Fierrez
IEEE Access, Vol.5, p.8606–8619
[Journal Article]


Biometrie symmetry: Implications on template protection
M. Gomez-Barrero and C. Rathgeb and K. B. Raja and R. Raghavendra and C. Busch
25th European Signal Processing Conf. EUSIPCO 2017, p.941–945
[Conference Proceedings]


Biometric Symmetry: Implications on Template Protection
M. Gomez-Barrero and C. Rathgeb and K. B. Raja and R. Raghavendra and C. Busch
Proc. European Signal Processing Conf. (EUSIPCO)
[Conference Proceedings]


Standardisierung von Biometric Template Protection: Aktueller Status und Bewertung der Verknüpfbarkeit
M. Gomez-Barrero and C. Rathgeb and C. Busch
Datenschutz und Datensicherheit, Vol.41, p.422–426
[Journal Article]


Multi-Biometric Template Protection Based on Homomorphic Encryption
M. Gomez-Barrero and E. Maiorana and J. Galbally and P. Campisi and J. Fierrez
Pattern Recognition, Vol.67, p.149–163
[Journal Article]


Standardisierung von Biometric Template Protection
M. Gomez-Barrero and C. Rathgeb and C. Busch
Datenschutz und Datensicherheit, Vol.41, p.422–426
[Journal Article]


Is Your Biometric System Robust to Morphing Attacks?
M. Gomez-Barrero and C. Rathgeb and U. Scherhag and C. Busch
Proc. 5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy
J. Galbally and M. Gomez-Barrero and A. Ross
Proc. Int. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]