Publikationen

Publikationen

A Framework to Select Parameters for Lattice-Based Cryptography
Alkeilani Alkadri, Nabil; Buchmann, Johannes; El Bansarkhani, Rachid; Krämer, Juliane
Cryptology ePrint Archive, p.1-37
Sprache: English
[Journal Article]

TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Frieß, Tamara; Mühlhäuser, Max
USENIX Security Symposium Poster Session
Sprache: English
[Conference Proceedings]

Constrained PET Composition for Measuring Enforced Privacy
Funke, Sebastian; Wiesmaier, Alexander; Daubert, Jörg
Proceedings of the 12th International Conference on Availability, Reliability and Security, p.1-16
[Conference Proceedings]

On Using TLS to Secure In-Vehicle Networks
Daniel Zelle; Christoph Krauß; Hubert Strauß; Karsten Schmidt
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]

Selbstdatenschutz im vernetzten Fahrzeug - Eine Datenschutzloesung unter Berücksichtigung der technischen, rechtlichen und Nutzeranforderungen
Christoph Krauß; Rasmus Robrahn; Thilo von Pape; Daniel Zelle
Datenschutz und Datensicherheit, Vol.41, p.217-222
[Journal Article]

Runtime Firmware Product Lines using TPM2.0
Andreas Fuchs; Christoph Krauß; Jürgen Repp
Proceedings of the 32th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]

A Privacy-aware Data Access System for Automotive Applications
Christian Plappert; Daniel Zelle; Christoph Krauß; Benjamin Lange; Sebastian Mauthofer; Jonas Walter; Bettina Abendroth; Rasmus Robrahn; Thilo von Pape; Hendrik Decke
15th Embedded Security in Cars (escar)
[Conference Proceedings]

Design and Implementation Aspects of Mobile Derived Identities
Daniel Träder; Alexander Zeier; Andreas Heinemann
CoRR, Vol.abs/1707.06505
[Journal Article]

Design and Implementation Aspects of Mobile Derived Identities
Daniel Träder; Alexander Zeier; Andreas Heinemann
Open Identity Summit, p.147-152
[Conference Proceedings]

Alle reden über Blockchain
Rüdiger Grimm; Andreas Heinemann
Datenschutz und Datensicherheit, Vol.41, p.469
[Journal Article]

Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting
U. Scherhag; A. Nautsch; C. Rathgeb; M. Gomez-Barrero; R. N. J. Veldhuis; Luuk Spreeuwers; Maikel Schils; Davide Maltoni; Patrick Grother; Sebastien Marcel; Ralph Breithaupt; Raghavendra Ramachandra; Christoph Busch
Intl. Conf. of the Biometrics Special Interest Group BIOSIG 2017, p.1-7
[Conference Proceedings]

On the Vulnerability of Face Recognition Systems Towards Morphed Face Attacks
U. Scherhag; R. Raghavendra; K. B. Raja; M. Gomez-Barrero; C. Rathgeb; C. Busch
5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]

Iris biometric template protection
C. Rathgeb; J. Wagner; C. Busch
Iris and Periocular Biometric Recognition, p.317-340

Improvement of Iris Recognition Based on Iris-Code Bit-Error Pattern Analysis
C. Rathgeb; C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Conference Proceedings]

Fundamentals in iris recognition
C. Rathgeb; C. Busch
Iris and Periocular Biometric Recognition, p.1-28

On the Feasibility of Creating Morphed Iris-Codes
C. Rathgeb; C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017)
[Conference Proceedings]

Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems
C. Rathgeb; N. Buchmann; H. Hofbauer; H. Baier; A. Uhl; C. Busch
IET Biometrics
[Journal Article]

Scale-level score fusion of steered pyramid features for cross-spectral periocular verification
K. B. Raja; R. Raghavendra; C. Busch
20th Intl. Conf. on Information Fusion, FUSION 2017, p.1-7
[Conference Proceedings]

Robust Verification With Subsurface Fingerprint Recognition Using Full Field Optical Coherence Tomography
K. B. Raja; E. Auksorius; R. Raghavendra; A. C. Boccara; C. Busch
2017 IEEE Conf. on Computer Vision and Pattern Recognition Workshops CVPR, p.646-654
[Conference Proceedings]

Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
A. Nautsch; S. T. Steen; C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
A. Nautsch; D. Meuwly; D. Ramos; J. Lindh; C. Busch
IEEE Signal Processing Letters, Vol.24, p.1552-1556
[Journal Article]

da/sec ASVspoof2017 Submission
Nautsch, A.; Scherhag, U.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Prof. of the ASVspoof evaluation
[Conference Proceedings]

Biometric template protection based on Bloom filters and honey templates
E. Martiri; M. Gomez-Barrero; B. Yang; C. Busch
IET Biometrics, Vol.6, p.19-26
[Journal Article]

The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016
K. A. Lee; V. Hautamäki; T. Kinnunen; A. Larcher; C. Zhang; others
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH)
[Conference Proceedings]

Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection
M. Gomez-Barrero; J. Galbally; A. Morales; J. Fierrez
IEEE Access, Vol.5, p.8606-8619
[Journal Article]