Multi-Biometric Template Protection Based on Homomorphic Encryption
Gomez-Barrero, M.; Maiorana, E.; Galbally, J.; Campisi, P.; Fierrez, J.
Pattern Recognition, Vol.67, p.149-163
[Journal Article]

Standardisierung von Biometric Template Protection
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]

Is Your Biometric System Robust to Morphing Attacks?
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, U.; Busch, C.
Proc. 5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]

Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy
Galbally, J.; Gomez-Barrero, M.; Ross, A.
Proc. Int. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]

Altered Fingerprint Detection
Ellingsgaard, J.; Busch, C.
Handbook of Biometrics for Forensic Science, p.85-123

SIC-Gen: A Synthetic Iris-Code Generator
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Conference Proceedings]

Multi-Iris Indexing and Retrieval: Fusion Strategies for Bloom Filter-based Search Structures
Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB 2017), p.1-8
[Conference Proceedings]

Towards Pre-alignment of Near-infrared Iris Images
Drozdowski, P.; Rathgeb, C.; Hofbauer, H.; Wagner, J.; Uhl, A.; Busch, C.
Intl. Joint Conf. on Biometrics (IJCB), p.1-8
[Conference Proceedings]

Bloom Filter-based Search Structures for Indexing and Retrieving Iris-Codes
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.7, p.260-268
[Journal Article]

Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Buchmann, N.; Rathgeb, C.; Baier, H.; Busch, C.; Margraf, M.
41st IEEE Annual Computer Software and Applications Conf. COMPSAC 2017, p.744-748
[Conference Proceedings]

Combining multiple iris texture features for unconstrained recognition in visible wavelengths
Andersen-Hoppe, E.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1-6
[Conference Proceedings]

ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]

Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]

Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]

Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]

“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]

Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
[Conference Proceedings]

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Cryptography and Security
[Journal Article]

Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
Wiegärtner, Daniel; Reuter, Christian; Müller, Claudia
Mensch & Computer 2017 - Workshopband, p.609-614
[Conference Proceedings]

DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
Reuter, Christian; Wiegärtner, Daniel; Müller, Claudia
Mensch & Computer 2017: Tagungsband, p.295-298
[Conference Proceedings]

Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe
Reuter, Christian; Spielhofer, Thomas
Technological Forecasting and Social Change (TFSC), p.168-180
[Journal Article]

Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]

IT for Peace? Fighting Against Terrorism in Social Media - An Explorative Twitter Study
Reuter, Christian; Pätsch, Katja; Runft, Elena
i-com: Journal of Interactive Media, p.181-195
[Journal Article]

4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Geisler, Stefan; Herczeg, Michael; Ludwig, Thomas; Pipek, Volkmar; Nestler, Simon
Mensch und Computer 2017 - Workshopband, p.5-8
[Conference Proceedings]

Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Hupertz, Julian
Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, p.75-88

Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
Reuter, Christian; Kaufhold, Marc-André; Steinfort, René
Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management; ISCRAM 2017, p.583-591
[Conference Proceedings]

Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing Vol. 1 Issue CSCW, p.1-19
[Journal Article, Conference Proceedings]

Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat)
Reuter, Christian; Kaufhold, Marc-André; Schorch, Marén; Gerwinski, Jan; Soost, Christian; Hassan, Sohaib S.; Rusch, Gebhard; Moog, Petra; Pipek, Volkmar; Wulf, Volker
Sicherheit (DIAGONAL Jahrgang 38), p.207-224

End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media
Reuter, Christian; Kaufhold, Marc-André; Ludwig, Thomas
New Perspectives in End-User Development, p.307-332

Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Proceedings of the 25th European Conference on Information Systems (ECIS), p.2187-2201
[Conference Proceedings]