Publications

Publications

API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]


Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and Albert Sunny and Liang Zhao and Eitan Altman and Dimitrios Tsilimantos and Francesco De Pellegrini and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
Rachid El Azouzi and Krishna V. Acharya and Sudheer Poojary and Albert Sunny and Majed Haddad and Eitan Altman and Dimitrios Tsilimantos and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


From click to playback: a dataset to study the response time of mobile YouTube
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Tobias Hoßfeld and Dimitrios Tsilimantos and Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys 2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]


Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Rolf Huesmann and Alexander Zeier and Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]


API Usability of Stateful Signature Schemes
Alexander Zeier and Alexander Wiesmaier and Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]


Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Vivian Ives Philipp Erbenich and Daniel Träder and Andreas Heinemann and Meltem Nural
HAISA, p.179–188
[Conference Proceedings]


Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]


Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]


On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
L. J. González-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]


Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
M. Gomez-Barrero and J. Kolberg and C. Busch
Proc. Int. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]


Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and C. Busch
Proc. of the Norwegian Information Security Conf. (NISC)
[Conference Proceedings]


Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1–5
[Conference Proceedings]


On the Application of Homomorphic Encryption to Face Identification
P. Drozdowski and N. Buchmann and C. Rathgeb and M. Margraf and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]


On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
L. Debiasi and N. Damer and A. Moseguí-Saladié and C. Rathgeb and U. Scherhag and C. Busch and F. Kirchbuchner and A. Uhl
Image Analysis and Processing (ICIAP), p.345–356
[Conference Proceedings]


On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH
Meyer, Michael and Campos, Fabio and Reith, Steffen
International Conference on Post-Quantum Cryptography (PQCrypto), p.307–325
[Conference Proceedings]