Publications

Publications

Vulnerability Assessment and Detection of Makeup Presentation Attacks
C. Rathgeb and P. Drozdowski and D. Fischer and C. Busch
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Efficient Identification in Large-Scale Vein Recognition Systems Using Spectral Minutiae Representations
B.-A. Mokroß and P. Drozdowski and C. Rathgeb and C. Busch
Handbook of Vascular Biometrics
[Book Article]


Efficient privacy-preserving biometric identification in large-scale multibiometric systems
P. Drozdowski
[Dissertation]


Multi-biometric Identification with Cascading Database Filtering
P. Drozdowski and C. Rathgeb and B.-A. Mokroß and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.2, p.210–222
[Journal Article]


Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
P. Bauspieß and J. Kolberg and D. Demmler and J. Krämer and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]


Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
Campos, Fabio and Kannwischer, Matthias J and Meyer, Michael and Onuki, Hiroshi and Stöttinger, Marc
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), p.57–65
[Conference Proceedings]


Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Campos, Fabio and Jellema, Lars and Lemmen, Mauk and Müller, Lars and Sprenkels, Amber and Viguier, Benoit
International Conference on Cryptology and Network Security (CANS), p.526–545
[Conference Proceedings]


LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Campos, Fabio and Kohlstadt, Tim and Reith, Steffen and Stöttinger, Marc
International Conference on Cryptology in Africa (AFRICACRYPT), p.258–277
[Conference Proceedings]


API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]


Benchmark Performance for the Sussex-Huawei Locomotion and Transportation Recognition Challenge 2018
Lin Wang and Hristijan Gjoreski and Mathias Ciliberto and Sami Mekki and Stefan Valentin and Daniel Roggen
Human Activity Sensing - Corpus and Applications, p.153–170


Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and Albert Sunny and Liang Zhao and Eitan Altman and Dimitrios Tsilimantos and Francesco De Pellegrini and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
Rachid El Azouzi and Krishna V. Acharya and Sudheer Poojary and Albert Sunny and Majed Haddad and Eitan Altman and Dimitrios Tsilimantos and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


From click to playback: a dataset to study the response time of mobile YouTube
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Tobias Hoßfeld and Dimitrios Tsilimantos and Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys 2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]


Enforcing Bitrate-Stability for Adaptive Streaming Traffic in Cellular Networks
Albert Sunny and Rachid El Azouzi and Afaf Arfaoui and Eitan Altman and Sudheer Poojary and Dimitrios Tsilimantos and Stefan Valentin
IEEE Trans. Netw. Serv. Manag., Vol.16, p.1812–1825
[Journal Article]


Enabling Reproducible Research in Sensor-Based Transportation Mode Recognition With the Sussex-Huawei Dataset
Lin Wang and Hristijan Gjoreski and Mathias Ciliberto and Sami Mekki and Stefan Valentin and Daniel Roggen
IEEE Access, Vol.7, p.10870–10891
[Journal Article]


Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Markus Heinrich and Tsvetoslava Vateva-Gurova and Tolga Arul and Stefan Katzenbeisser and Neeraj Suri and Henk Birkholz and Andreas Fuchs and Christoph Krauß and Maria Zhdanova and Don Kuzhiyelil and Sergey Tverdyshev and Christian Schlehuber
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]


Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Grundrechtsschutz im Smart Car: Kommunikation, Sicherheit und Datenschutz im vernetzten Fahrzeug, p.227–244
[Book Article]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]


Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Rolf Huesmann and Alexander Zeier and Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]


API Usability of Stateful Signature Schemes
Alexander Zeier and Alexander Wiesmaier and Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]


Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Vivian Ives Philipp Erbenich and Daniel Träder and Andreas Heinemann and Meltem Nural
HAISA, p.179–188
[Conference Proceedings]


Datenschutz muss benutzbar sein
Andreas Heinemann and Tobias Straub
Datenschutz und Datensicherheit, Vol.43, p.7–12
[Journal Article]


Relevant features for Gender Classification in NIR Periocular Images
I. Viedma and J. Tapia and A. Iturriaga and C. Busch
arXiv e-prints
[Journal Article]


Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
A. Treiber and A. Nautsch and J. Kolberg and T. Schneider and C. Busch
Speech Communication, Vol.114, p.60–71
[Journal Article]


Detection of Face Morphing Attacks based on PRNU Analysis
U. Scherhag and L. Debiasi and C. Rathgeb and C. Busch and A. Uhl
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Face Recognition Systems under Morphing Attacks: A Survey
U. Scherhag and C. Rathgeb and J. Merkle and R. Breithaupt and C. Busch
IEEEAccess
[Journal Article]


Impact and Detection of Facial Beautification in Face Recognition: An Overview
C. Rathgeb and A. Dantcheva and C. Busch
IEEE Access, Vol.7, p.152667–152678
[Journal Article]


Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]


Preserving Privacy in Speaker and Speech Characterisation
A. Nautsch and A. Jiménez and A. Treiber and J. Kolberg and C. Jasserand and others
Computer Speech & Language, Vol.58, p.441–480
[Journal Article]


Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]