Publikationen

Publikationen

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Cryptology ePrint Archive, p.1-33
Sprache: English
[Journal Article]

Security Proofs for Participation Privacy and Stronger Verifiability for Helios
Bernhard, David; Kulyk, Oksana; Volkamer, Melanie
Sprache: English
[Report]

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Fujiwara, Mikio; Geihs, Matthias; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.1-13
Sprache: English
[Conference Proceedings]

Post-Quantum Attribute-Based Signatures from Lattice Assumptions
El Bansarkhani, Rachid; El Kaafarani, Ali
Cryptology ePrint Archive, p.1-28
Sprache: English
[Journal Article]

Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Wunderer, Thomas
Cryptology ePrint Archive, p.1-35
Sprache: English
[Journal Article]

On the Security \& Privacy of Internet of Things Architectures and Systems
Emmanouil Vasilomanolakis; Jörg Daubert; Manisha Luthra; Vangelis Gazis; Alex Wiesmaier; Panayotis Kikiras
2015 International Workshop on Secure Internet of Things (SIoT), p.49-57
[Conference Proceedings]

Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs; Christoph Krauß; Jürgen Repp
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]

Evaluation of Lightweight TPMs for Automotive Software Updates over the Air
Richard Petri; Markus Springer; Daniel Zelle; Ira McDonald; Andreas Fuchs; Christoph Krauß
4th Embedded Security in Cars (escar) USA
[Conference Proceedings]

Zur Benutzbarkeit der AusweisApp2
Jörg Willomitzer; Andreas Heinemann; Marian Margraf
Mensch & Computer Workshopband
[Conference Proceedings]

Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises
Sandra Kostic; Andreas Heinemann; Marian Margraf
GI-Jahrestagung, p.519-527
[Conference Proceedings]

Workshop: Nutzerzentrierte Sicherheit - NzS 2016
Andreas Heinemann; Steffen Lange; Marian Margraf; Jörg Willomitzer
GI-Jahrestagung, p.485-486
[Conference Proceedings]

In Whom Do We Trust - Sharing Security Events
J. Steinberger; B. Kuhnert; A. Sperotto; H. Baier; A. Pras
Management and Security in the Age of Hyperconnectivity, p.111-124

Ludo - kids playing Distributed Denial of Service
J. Steinberger; J. Santanna; E. Spatharas; H. Amler; N. Breuer; others
TERENA Networking Conf. (TNC16)
[Conference Proceedings]

Collaborative DDoS defense using flow-based security event information
J. Steinberger; B. Kuhnert; A. Sperotto; H. Baier; A. Pras
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, p.516-522
[Conference Proceedings]

A Binarization Scheme for Face Recognition Based on Multi-Scale Block Local Binary Patterns
T. Schlett; C. Rathgeb; C. Busch
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]

Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features
U. Scherhag; A. Nautsch; C. Rathgeb; C. Busch
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH), p.2209-2213
[Conference Proceedings]

Unlinkable improved multi-biometric iris fuzzy vault
C. Rathgeb; B. Tams; J. Wagner; C. Busch
EURASIP Journal on Information Security, Vol.2016, p.26
[Journal Article]

Effects of image compression on ear biometrics
C. Rathgeb; A. Pflug; J. Wagner; C. Busch
IET Biometrics, Vol.5, p.252-261
[Journal Article]

How to apply Binarized Statistical Image Features to Near-Infrared Iris Recognition effectively
C. Rathgeb; F. Struck; C. Busch
Sixth Intl. Conf. on Image Processing Theory, Tools and Applications (IPTA 2016)
[Conference Proceedings]

Design Decisions for an Iris Recognition SDK
C. Rathgeb; A. Uhl; P. Wild; H. Hofbauer
Handbook of Iris Recognition, p.359-396

TripleA: Accelerated accuracy-preserving alignment for iris-codes
C. Rathgeb; H. Hofbauer; A. Uhl; C. Busch
2016 Intl. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]

DDoS 3.0 - How Terrorists Bring Down the Internet
A. Pras; J. Santanna; J. Steinberger; A. Sperotto
Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, p.1-4

Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection
M. Paulini; C. Rathgeb; A. Nautsch; H. Reichau; H. Reininger; C. Busch
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.291-296
[Conference Proceedings]

Finger image quality assessment features - definitions and evaluation
M. Olsen; V. \vSmida; C. Busch
IET Biometrics, Vol.5, p.47-64
[Journal Article]

Robustness of Quality-based Score Calibration of Speaker Recognition Systems with respect to low-SNR and short-duration conditions
A. Nautsch; R. Saeidi; C. Rathgeb; C. Busch
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.358-365
[Conference Proceedings]