Publications
Publications
API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]
Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and
Albert Sunny and
Liang Zhao and
Eitan Altman and
Dimitrios Tsilimantos and
Francesco De Pellegrini and
Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC
2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]
Analysis of QoE for Adaptive Video Streaming over Wireless Networks
with User Abandonment Behavior
Rachid El Azouzi and
Krishna V. Acharya and
Sudheer Poojary and
Albert Sunny and
Majed Haddad and
Eitan Altman and
Dimitrios Tsilimantos and
Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC
2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]
From click to playback: a dataset to study the response time of mobile
YouTube
Frank Loh and
Florian Wamser and
Christian Moldovan and
Bernd Zeidler and
Tobias Hoßfeld and
Dimitrios Tsilimantos and
Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys
2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC
2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]
Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess
sicherer Software
Rolf Huesmann and
Alexander Zeier and
Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]
API Usability of Stateful Signature Schemes
Alexander Zeier and
Alexander Wiesmaier and
Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]
Phishing Attack Recognition by End-Users: Concepts for URL Visualization
and Implementation
Vivian Ives Philipp Erbenich and
Daniel Träder and
Andreas Heinemann and
Meltem Nural
HAISA, p.179–188
[Conference Proceedings]
Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]
Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]
On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
L. J. González-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]
Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
M. Gomez-Barrero and J. Kolberg and C. Busch
Proc. Int. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]
Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and C. Busch
Proc. of the Norwegian Information Security Conf. (NISC)
[Conference Proceedings]
Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1–5
[Conference Proceedings]
On the Application of Homomorphic Encryption to Face Identification
P. Drozdowski and N. Buchmann and C. Rathgeb and M. Margraf and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
L. Debiasi and N. Damer and A. Moseguí-Saladié and C. Rathgeb and U. Scherhag and C. Busch and F. Kirchbuchner and A. Uhl
Image Analysis and Processing (ICIAP), p.345–356
[Conference Proceedings]
On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH
Meyer, Michael and Campos, Fabio and Reith, Steffen
International Conference on Post-Quantum Cryptography (PQCrypto), p.307–325
[Conference Proceedings]


