Publications

Publications

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
Nautsch, A.; Meuwly, D.; Ramos, D.; Lindh, J.; Busch, C.
IEEE Signal Processing Letters, Vol.24, p.1552-1556
[Journal Article]


da/sec ASVspoof2017 Submission
Nautsch, A.; Scherhag, U.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Prof. of the ASVspoof evaluation
[Conference Proceedings]


Biometric template protection based on Bloom filters and honey templates
Martiri, E.; Gomez-Barrero, M.; Yang, B.; Busch, C.
IET Biometrics, Vol.6, p.19-26
[Journal Article]


The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016
Lee, K. A.; Hautamäki, V.; Kinnunen, T.; Larcher, A.; Zhang, C.; others
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH)
[Conference Proceedings]


Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection
Gomez-Barrero, M.; Galbally, J.; Morales, A.; Fierrez, J.
IEEE Access, Vol.5, p.8606-8619
[Journal Article]


Biometrie symmetry: Implications on template protection
Gomez-Barrero, M.; Rathgeb, C.; Raja, K. B.; Raghavendra, R.; Busch, C.
25th European Signal Processing Conf. EUSIPCO 2017, p.941-945
[Conference Proceedings]


Biometric Symmetry: Implications on Template Protection
Gomez-Barrero, M.; Rathgeb, C.; Raja, K. B.; Raghavendra, R.; Busch, C.
Proc. European Signal Processing Conf. (EUSIPCO)
[Conference Proceedings]


Standardisierung von Biometric Template Protection: Aktueller Status und Bewertung der Verknüpfbarkeit
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]


Multi-Biometric Template Protection Based on Homomorphic Encryption
Gomez-Barrero, M.; Maiorana, E.; Galbally, J.; Campisi, P.; Fierrez, J.
Pattern Recognition, Vol.67, p.149-163
[Journal Article]


Standardisierung von Biometric Template Protection
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]


Is Your Biometric System Robust to Morphing Attacks?
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, U.; Busch, C.
Proc. 5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy
Galbally, J.; Gomez-Barrero, M.; Ross, A.
Proc. Int. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Altered Fingerprint Detection
Ellingsgaard, J.; Busch, C.
Handbook of Biometrics for Forensic Science, p.85-123


SIC-Gen: A Synthetic Iris-Code Generator
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Conference Proceedings]


Multi-Iris Indexing and Retrieval: Fusion Strategies for Bloom Filter-based Search Structures
Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017), p.1-8
[Conference Proceedings]


Towards Pre-alignment of Near-infrared Iris Images
Drozdowski, P.; Rathgeb, C.; Hofbauer, H.; Wagner, J.; Uhl, A.; Busch, C.
Intl. Joint Conf. on Biometrics (IJCB), p.1-8
[Conference Proceedings]


Bloom Filter-based Search Structures for Indexing and Retrieving Iris-Codes
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.7, p.260-268
[Journal Article]


Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Buchmann, N.; Rathgeb, C.; Baier, H.; Busch, C.; Margraf, M.
41st IEEE Annual Computer Software and Applications Conf. COMPSAC 2017, p.744-748
[Conference Proceedings]


Combining multiple iris texture features for unconstrained recognition in visible wavelengths
Andersen-Hoppe, E.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1-6
[Conference Proceedings]


ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]


Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]


Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]


“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]


Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
[Conference Proceedings]


HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Cryptography and Security
[Journal Article]


Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
Wiegärtner, Daniel; Reuter, Christian; Müller, Claudia
Mensch & Computer 2017 - Workshopband, p.609-614
[Conference Proceedings]


DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
Reuter, Christian; Wiegärtner, Daniel; Müller, Claudia
Mensch & Computer 2017: Tagungsband, p.295-298
[Conference Proceedings]


Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe
Reuter, Christian; Spielhofer, Thomas
Technological Forecasting and Social Change (TFSC), p.168-180
[Journal Article]


Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]