Publikationen

Publikationen

Sicherheit ist die Abwesenheit von Kriminalität - eine Hypothese. P(Sicherheit) = 1-P(Kriminalität)
Labudde, Dirk
Sprache: German
[Book Article]

One Billion Apples' Secret Sauce : Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.529-543
Sprache: English
[Conference Proceedings]

Demo : Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.820-822
Sprache: English
[Conference Proceedings]

Web Application for Privacy-Preserving Scheduling (Poster)
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
Sprache: English
[Conference Proceedings]

Souveränität und die IT-Wertschöpfungskette
Arnd Weber; Steffen Reith; Michael Kasper; Dirk Kuhlmann; Jean-Pierre Seifert; Christoph Krauß
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]

A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems
Henk Birkholz; Christoph Krauß; Maria Zhdanova; Don Kuzhiyelil; Tolga Arul; Markus Heinrich; Stefan Katzenbeisser; Neeraj Suri; Tsvetoslava Vateva-Gurova; Christian Schlehuber
4th International Workshop on MILS: Architecture and Assurance for Secure Systems, (MILS@DSN 2018)
[Conference Proceedings]

Anonymous Charging and Billing of Electric Vehicles
Daniel Zelle; Markus Springer; Maria Zhdanova; Christoph Krauß
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES, p.1-22
[Conference Proceedings]

The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Jonas Walter; Bettina Abendroth; Thilo Von Pape; Christian Plappert; Daniel Zelle; Christoph Krauß; Gundula Gagzow; Hendrik Decke
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES, p.1-24
[Conference Proceedings]

Open Source Value Chains for Addressing Security Issues Efficiently
Arnd Weber; Steffen Reith; Dirk Kuhlmann and Michael Kasper; Jean-Pierre Seifert; Christoph Krauß
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]

Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2
Daniel Träder; Alexander Zeier; Andreas Heinemann
Sicherheit, p.183-196
[Conference Proceedings]

Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
R. Tolosana; M. Gomez-Barrero; J. Kolberg; A. Morales; C. Busch; J. Ortega-Garcia
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]

Sex-Prediction from Periocular Images across Multiple Sensors and Spectra
J. Tapia; C. Rathgeb; C. Busch
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-7
[Conference Proceedings]

Multi-spectral Iris Segmentation in Visible Wavelengths
T. Schlett; C. Rathgeb; C. Busch
Intl. Conf. on Biometrics (ICB 18), p.1-5
[Conference Proceedings]

Performance Variation of Morphed Face Image Detection Algorithms across different Datasets
U. Scherhag; C. Rathgeb; C. Busch
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]

Morph detection from single face images: a multi-algorithm fusion approach
U. Scherhag; C. Rathgeb; C. Busch
Intl. Conf. on Biometric Engineering and Applications 2018 (ICBEA), p.1-7
[Conference Proceedings]

Towards detection of morphed face images in electronic travel documents
U. Scherhag; C. Rathgeb; C. Busch
13th IAPR Workshop on Document Analysis Systems (DAS), p.1-6
[Conference Proceedings]

Detecting Morphed Face Images Using Facial Landmarks
U. Scherhag; D. Budhrani; M. Gomez-Barrero; C. Busch
Intl. Conf. on Image and Signal Processing (ICISP)
[Conference Proceedings]

SIFT-based iris recognition revisited: prerequisites, advantages and improvements
C. Rathgeb; J. Wagner; C. Busch
Pattern Analysis and Applications
[Journal Article]

Multi-sample Compression of Iris Images using High Efficiency Video Coding
C. Rathgeb; T. Schlett; N. Buchmann; H. Baier; C. Busch
Intl. Conf. on Biometrics (ICB 18), p.1-6
[Conference Proceedings]

Visible Wavelength Iris Segmentation: A Multi-Class Approach using Fully Convolutional Neuronal Networks
D. Osorio-Roig; C. Rathgeb; M. Gomez-Barrero; A. Morales-Gonzalez; E. Garea-Llano; C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]

Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
D. Osorio-Roig; P. Drozdowski; C. Rathgeb; A. Morales-González; E. Garea-Llano; C. Busch
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-6
[Conference Proceedings]

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
A. Nautsch; S. Isadskiy; J. Kolberg; M. Gomez-Barrero; C. Busch
Procs. Speaker Odyssey, p.16-23
[Journal Article]

Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
P. Keilbach; J. Kolberg; M. Gomez-Barrero; C. Busch; H. Langweg
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]

Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
M. Gomez-Barrero; C. Rathgeb; Ulrich Scherhag; C. Busch
IET Biometrics, Vol.7, p.333-341
[Journal Article]

Multi-biometric template protection based on bloom filters
M. Gomez-Barrero; C. Rathgeb; G. Li; R. Raghavendra; J. Galbally; C. Busch
Information Fusion, Vol.42, p.37-50
[Journal Article]