Publications
Publications
Closing the Performance Gap in Biometric Cryptosystems: A Deeper Analysis on Unlinkable Fuzzy Vaults
H. Geißner and C. Rathgeb
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Online Augmentation for Presentation Attack Detection on ID Cards
F. Fernadez and J. E. Tapia and J. M. Espin, Mario-Nieto
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Demographic Differentials in Face Image Quality: Evaluation and Comparison on Real and Synthetic Data
A. Dörsch and J. Merkle and B. Tams and G. Gutierrez Alvarez and P. Munch and C. Busch and C. Rathgeb
Proc. Intl. Conf. of the IEEE/CVF on Computer Vision (ICCV) Workshops, p.5874–5882
[Conference Proceedings]
Fairness measures for biometric quality assessment
A. D"orsch and T. Schlett and P. Munch and C. Rathgeb and C. Busch
Pattern Recognition. ICPR 2024 Intl. Workshops and Challenges, p.287–298
[Conference Proceedings]
Second FRCSyn-onGoing: Winning solutions and post-challenge analysis to improve face recognition with synthetic data
I. DeAndres-Tame and R. Tolosana and P. Melzi and R. Vera-Rodriguez and M. Kim and C. Rathgeb and others
Information Fusion, Vol.120, p.103099
[Journal Article]
The Super-Recogniser Advantage Extends to the Detection of Digitally Manipulated Faces
J. Davis and D. Robertson and R. Jenkins and M. Ibsen and R. Nichols and M. Babbs and C. Rathgeb and F. Løvåsdal and K. Raja and C. Busch
Applied Cognitive Psychology, Vol.39
[Journal Article]
Training-free Dimensionality Reduction via Feature Truncation: Enhancing Efficiency in Privacy-preserving Multi-Biometric Systems
F. Bayer and M. Russo and C. Rathgeb
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
AMB-FHE: Adaptive Multi-biometric Fusion with Fully Homomorphic Encryption
F. Bayer and C. Rathgeb
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
SoK: On the Physical Security of UOV-Based Signature Schemes
Aulbach, Thomas and Campos, Fabio and Krämer, Juliane
International Conference on Post-Quantum Cryptography (PQCrypto), p.199–231
[Conference Proceedings]
dCTIDH: Fast & Deterministic CTIDH
Campos, Fabio and Hellenbrand, Andreas and Meyer, Michael and Reijnders, Krijn
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2025, p.516–541
[Journal Article]
Können KI-Chatbots zum Datenschutz schulen?
Forina, Alina; Stummer, Sarah
[Study]
LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices
Eckel, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results
Eckel, Michael; Gkoktsis, George; Horn, Markus
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE
Eckel, Michael; Gorbracht, Janik; Gkoktsis, George; Kaupat, Tobias
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Meldung von Sicherheitsvorfällen
Hardt, Mark Joshua; Stummer, Sarah
[Journal Article]
De-Anonymisierungsstrategien: Empirische Analyse und normative Implikationen
Stummer, Sarah; Hähle, Phillip
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]
Weiterbildung zur Cybersicherheit
Schneider, Markus; Heftrig, Elias; Dukanovic, Sinisa; Dexheimer, Thomas
[Journal Article]
When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial Attacks
Schäfer, Karla; Ludwig, Leon
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Real-World Audio Deepfake Detection Using SSL-Based Speech Models and Diverse Training Data
Schäfer, Karla; Neu, Matthias
International Conference on Tools with Artificial Intelligence 2025
[Conference Paper]
Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature Modeling
Schäfer, Karla; Steinebach, Martin
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Comparative Analysis of Threat Assumptions in Field Level Protocol Security
Peters, Ludger; Gkoktsis, George; Cäsar, Matthias; Eckel, Michael
Standardization Workshop on Industrial Automation and Control Systems 2025
A Close Look at RMP Entry Caching and Its Security Implications in SEV-SNP
Bagia, Alexis; Ulitzsch, Vincent Quentin; Trujillo, Daniël; Li, Mengyuan; Yan, Mengjia; Seifert, Jean-Pierre
International Workshop on Hardware and Architectural Support for Security and Privacy 2025
[Conference Paper]
Demand-aware multi-source IP-multicast: Minimal congestion via link weight optimization
Bentert, Matthias; Franke, Max; Melnyk, Darya; Pourdamghani, Arash; Schmid, Stefan
Networking Conference 2025
[Conference Paper]
Uncovering linux desktop espionage
Schmidt, Lukas; Strasda, Sebastian; Schinzel, Sebastian
Annual Digital Forensics Research Conference 2025
[Journal Article]
DamFlow: Preventing a Flood of Irrelevant Data Flows in Android Apps
Alecci, Marco; Samhi, Jordan; Miltenberger, Marc; Arzt, Steven; Bissyandé, Tegawendé F.; Klein, Jacques
[Journal Article]
Securing Product Identity With Digital Fingerprinting
Berchtold, Waldemar; Steinebach, Martin
[Journal Article]
BIOSIG 2025, 24th International Conference of the Biometrics Special Interest Group. Proceedings
Gesellschaft für Informatik, Special Interest Group Biometrics (BIOSIG International Conference) 2025
[Conference Proceeding]
SVC '25: Proceedings of the 1st International Workshop & Challenge on Subtle Visual Computing
International Workshop & Challenge on Subtle Visual Computing 2025
[Conference Proceeding]
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast, Stefan; Weissteiner, Hannes; Schröder, Leander; Gruss, Daniel
Network and Distributed System Security Symposium 2025
[Conference Paper]
S/MINE: collecting and analyzing S/MIME certificates at scale
Öndarö, Gurur; Kaspereit, Jonas; Umezulike, Samson; Saatjohann, Christoph; Ising, Fabian; Schinzel, Sebastian
USENIX Security Symposium 2025
[Conference Paper]


