Publications
Publications
Texture-based Presentation Attack Detection for Automatic Speaker Verification
L. J. Gonzalez-Soler and J. Patino and M. Gomez-Barrero and M. Todisco and C. Busch and N. Evans
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]
Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]
Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2020), p.1–11
[Conference Proceedings]
Reversing the irreversible: A survey on inverse biometrics
M. Gomez-Barrero and J. Galbally
Computers & Security, Vol.90
[Journal Article]
Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
M. Gomez-Barrero and J. Kolberg and C. Busch
Datenschutz und Datensicherheit - DuD, Vol.44, p.26–31
[Journal Article]
A Novel Approach for Generating Synthetic Datasets for Digital Forensics
T. Göbel and T. Schäfer and J Hachenberger and J. Türr and H. Baier
Advances in Digital Forensics XVI, p.73–93
Can Generative Colourisation Help Face Recognition?
P. Drozdowski and D. Fischer and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.299–307
[Conference Proceedings]
Demographic Bias in Biometrics: A Survey on an Emerging Challenge
P. Drozdowski and C. Rathgeb and A. Dantcheva and N. Damer and C. Busch
Trans. on Technology and Society (TTS), Vol.1, p.89–103
[Journal Article]
Demographic Bias: A Challenge for Fingervein Recognition Systems?
P. Drozdowski and B. Prommegger and G. Wimmer and R. Schraml and C. Rathgeb and A. Uhl and C. Busch
European Signal Processing Conf. (EUSIPCO), p.825–829
[Conference Proceedings]
PRNU-based Detection of Facial Retouching
C. Rathgeb and A. Botaljov and F. Stockhardt and S. Isadskiy and L. Debiasi and A.Uhl and C. Busch
IET Biometrics, Vol.9, p.154–164
[Journal Article]
Plastic Surgery: An Obstacle for Deep Face Recognition?
C. Rathgeb and D. Dogan and F. Stockhardt and M. De Marsico and C. Busch
Proc. 15th IEEE Computer Society Workshop on Biometrics (CVPRW), p.806–807
[Conference Proceedings]
Vulnerability Assessment and Detection of Makeup Presentation Attacks
C. Rathgeb and P. Drozdowski and D. Fischer and C. Busch
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Efficient Identification in Large-Scale Vein Recognition Systems Using Spectral Minutiae Representations
B.-A. Mokroß and P. Drozdowski and C. Rathgeb and C. Busch
Handbook of Vascular Biometrics
[Book Article]
Efficient privacy-preserving biometric identification in large-scale multibiometric systems
P. Drozdowski
[Dissertation]
Multi-biometric Identification with Cascading Database Filtering
P. Drozdowski and C. Rathgeb and B.-A. Mokroß and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.2, p.210–222
[Journal Article]
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
P. Bauspieß and J. Kolberg and D. Demmler and J. Krämer and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
Campos, Fabio and Kannwischer, Matthias J and Meyer, Michael and Onuki, Hiroshi and Stöttinger, Marc
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), p.57–65
[Conference Proceedings]
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Campos, Fabio and Jellema, Lars and Lemmen, Mauk and Müller, Lars and Sprenkels, Amber and Viguier, Benoit
International Conference on Cryptology and Network Security (CANS), p.526–545
[Conference Proceedings]
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Campos, Fabio and Kohlstadt, Tim and Reith, Steffen and Stöttinger, Marc
International Conference on Cryptology in Africa (AFRICACRYPT), p.258–277
[Conference Proceedings]
Aimes: Advanced computation and I/O methods for earth-system simulations
Kunkel, Julian; Jumah, Nabeeh; Novikova, Anastasiia; Ludwig, Thomas; Yashiro, Hisashi; Maruyama, Naoya; Wahib, Mohamed; Thuburn, John
[Book Article]
A Characterization of Data Exchange between Visual Analytics Tools
Nonnemann, Lars; Schumann, Heidrun; Urban, Bodo; Aehnelt, Mario; Schulz, Hans-Jörg
International Conference Information Visualisation (IV) 2020
[Conference Paper]
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK
Oesch, Sean; Abu-Salma, Ruba; Krämer, Juliane; Wu, Justin; Diallo, Oumar; Ruoti, Scott
Annual Computer Security Applications Conference (ACSAC 2020)
[Conference Proceedings]
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Mantel, Heiko; Scheidel, Lukas; Schneider, Thomas; Weber, Alexandra; Weinert, Christian; Weißmantel, Tim
19. International Conference on Cryptology And Network Security (CANS'20)
[Conference Proceedings]
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
Krüger, Stefan; Ali, Karim; Bodden, Eric
International Symposium on Code Generation and Optimization
[Conference Proceedings]
V0LTpwn: Attacking x86 Processor Integrity from Software
Kenjar, Zijo; Frassetto, Tommaso; Gens, David; Franz, Michael; Sadeghi, Ahmad-Reza
arXiv
[Conference Proceedings]
Fuzzy Asymmetric Password-Authenticated Key Exchange
Erwig, Andreas; Hesse, Julia; Orlt, Maximilian; Riahi, Siavash
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020)
[Conference Proceedings]
CryptoSPN: Privacy-preserving Sum-Product Network Inference
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
24th European Conference on Artificial Intelligence (ECAI'20)
[Conference Proceedings]
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]
Enclave Computing on RISC-V: A Brighter Future for Security?
Dessouky, Ghada; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020
[Conference Proceedings]
Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]


