Publications
Publications
Wie stellen sich Nutzende ihren Privatsphäre-Assistenten vor?
Stöver, Alina; Hahn, Sara; Althaus, Simon; Zimmer, Ephraim; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.633-636
[Journal Article]
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Alnahawi, Nouri; Schmitt, Nicolai; Wiesmaier, Alexander; Zok, Chiara-Marie
ACM Trans. Embed. Comput. Syst., Vol.23
[Journal Article]
Presentation Attack Detection using iris periocular visual spectrum images
Valenzuela, A.; Tapia, J.; Chang, V.; Busch, C.
Expert Systems with Applications
[Journal Article]
Impact of Occlusion Masks on Gender Classification from Iris Texture
Tapia, J.; Yanez, C.; Perez, C.; Busch, C.
IET Biometrics
[Journal Article]
Toward Synthetic Physical Fingerprint Targets
Strobl, L. Ruzicka and. B.; Bergmann, S.; Nolden, G.; Michalsky, T.; Domscheit, C.; Priesnitz, J.; Blümel, F.; Kohn, B.; Heitzinger, C.
Sensors, Vol.24
[Journal Article]
Privacy-preserving Multi-biometric Indexing based on Frequent Binary Patterns
Osorio-Roig, D.; Gonzalez-Soler, L. J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security (TIFS), Vol.19, p.4835-4850
[Journal Article]
An Overview of Privacy-Enhancing Technologies in Biometric Recognition
Melzi, P.; Rathgeb, C.; Tolosana, R.; Vera, R.; Busch, C.
ACM Computing Surveys (CSUR)
[Journal Article]
FRCSyn-onGoing: Benchmarking and comprehensive evaluation of real and synthetic data to improve face recognition systems
Melzi, P.; Tolosana, R.; Vera-Rodriguez, R.; Kim, M.; Rathgeb, C.
ScienceDirect - Information Fusion
[Journal Article]
Open-Set: ID Card Presentation Attack Detection using Neural Style transfer
Markham, R. P.; Espin, J. M.; Nieto-Hidalgo, M.; Tapia, J.
IEEE Access
[Journal Article]
On the Potential of Algorithm Fusion for Demographic Bias Mitigation in Face Recognition
Kolberg, J.; Schäfer, Y.; Rathgeb, C.; Busch, C.
IET Biometrics
[Journal Article]
Towards minimizing efforts for Morphing Attacks-Deep embeddings for morphing pair selection and improved Morphing Attack Detection
Kessler, R.; Kaja, K.; Tapia, j.; Busch, C.
PLOS ONE
[Journal Article]
Information Fusion and Hand Alignment to Improve Hand Recognition in Forensic Scenarios
Gonzalez-Soler, L. J.; Jónsdóttir, D. K.; Rathgeb, C.; Fischer, D.
IEEE Access, Vol.12, p.52941-52950
[Journal Article]
Contactless Hand Biometrics for Forensics: Review and Performance Benchmark
Gonzalez-Soler, L. J.; Zyla, K.; Rathgeb, C.; Fischer, D.
EURASIP Journal on Image and Video Processing (JIVP), p.34
[Journal Article]
Child Face Recognition at Scale: Synthetic Data Generation and Performance Benchmark
Falkenberg, M.; Ottsen, A. B.; Ibsen, M.; Rathgeb, C.
Frontiers in Signal Processing
[Journal Article]
Analysis of behavioural curves to classify iris images under the influence of alcohol, drugs, and sleepiness conditions
Causa, L.; Tapia, J.; Perez, C.; Busch, C.
Expert Systems With Applications
[Journal Article]
Challenges for automated face recognition systems
Busch, C.
Nature Reviews Electrical Engineering
[Journal Article]
BRAKE: Biometric Resilient Authenticated Key Exchange
Bauspieß, P.; Silde, T.; Poljuha, M.; Tullot, A.; Costache, A.; Rathgeb, C.; Kolberg, J.; Busch, C
IEEE Access, Vol.12, p.46596-46615
[Journal Article]
Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag
Seyda, Linda; Brüggemann, Andreas; Hornung, Gerrit; Schneider, Thomas
INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), p.153-167
[Journal Article]
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
Rostami, Mohamadreza; Chen, Chen; Kande, Rahul; Li, Huimin; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
IEEE Security & Privacy, p.76-86
[Journal Article]
Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises
Schmid, Stefka; Hartwig, Katrin; Cieslinski, Robert; Reuter, Christian
Information Systems Frontiers, p.477-499
[Journal Article]
Marionette: Manipulate Your Touchscreen via A Charging Cable
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza
IEEE Transactions on Dependable and Secure Computing
[Journal Article]
Datenschutz-Vorsorge: Schritte 3-6
Boll, Alina
[Journal Article]
Zur Strafbarkeit von Datenfunden im Darknet
Kriegel, Jessica; Dejam, Jubin; Durth, Hanno; Franke, Florian; Hemkens, Wolfram
[Journal Article]
Integration der Compliance by Design-Anforderungen in die (agile) Softwareentwicklung
Appelt, Dominik
[Journal Article]
Der gläserne Mitarbeiter - Spannungsfeld Standortdaten
Selzer, Annika; Enzmann, Matthias
[Journal Article]
Challenges for a Taxonomy of Cyber Defence in International Law
Gärtner, Tanya
[Journal Article]
Die rechtskonforme Veröffentlichung von Forschungsdaten
Rudolph, Louisa
[Journal Article]
The Data Protection Preventive Assessment (DP-PA): Proposal for a New Instrument in Data Protection Law. Practitioners’ Corner
Boll, Alina; Selzer, Annika
[Journal Article]
Anonymität und deren Verifikation
Stummer, Sarah; Hähle, Phillip
[Journal Article]
Von Privacy by Design zu Compliance by Design
Appelt, Dominik
[Journal Article]