Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead
Asokan, N.; Miettinen, Markus
Computer Communications
[Journal Article]

LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Dessouky, Ghada; Abera, Tigist; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18)
[Conference Proceedings]

A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Dantas, Yuri Gil; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]

Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Degabriele, Jean Paul; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2018, p.519-550
[Conference Proceedings]

"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Kulyk, Oksana; Hilt, Annika; Gerber, Nina; Volkamer, Melanie
3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018
[Conference Proceedings]

Helping john to make informed decisions on using social login
Karegar, Farzaneh; Gerber, Nina; Volkamer, Melanie; Fischer-Hübner, Simone
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, p.1165-1174
[Conference Proceedings]

Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, Marco; Henhapl, Birgit; Gerber, Nina
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]

Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Gerber, Nina; Gerber, Paul; Volkamer, Melanie
Computers & Security, p.226-261
[Journal Article]

IoT Stream Processing Tutorial
Strohbach, M.; Wiesmaier, A.; Mittelbach, A.

Web Application for Privacy-Preserving Scheduling (Poster)
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Conference Proceedings]

Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]

A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems
Birkholz, Henk; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Suri, Neeraj; Vateva-Gurova, Tsvetoslava; Schlehuber, Christian
4th International Workshop on MILS: Architecture and Assurance for Secure Systems, (MILS@DSN 2018)
[Conference Proceedings]

Anonymous Charging and Billing of Electric Vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES, p.1-22
[Conference Proceedings]

The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Von Pape, Thilo; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES, p.1-24
[Conference Proceedings]

Open Source Value Chains for Addressing Security Issues Efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]

Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
Sicherheit, p.183-196
[Conference Proceedings]

Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
Tolosana, R.; Gomez-Barrero, M.; Kolberg, J.; Morales, A.; Busch, C.; Ortega-Garcia, J.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]

Sex-Prediction from Periocular Images across Multiple Sensors and Spectra
Tapia, J.; Rathgeb, C.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-7
[Conference Proceedings]

Multi-spectral Iris Segmentation in Visible Wavelengths
Schlett, T.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-5
[Conference Proceedings]

Performance Variation of Morphed Face Image Detection Algorithms across different Datasets
Scherhag, U.; Rathgeb, C.; Busch, C.
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]

Morph detection from single face images: a multi-algorithm fusion approach
Scherhag, U.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometric Engineering and Applications 2018 (ICBEA), p.1-7
[Conference Proceedings]

Towards detection of morphed face images in electronic travel documents
Scherhag, U.; Rathgeb, C.; Busch, C.
13th IAPR Workshop on Document Analysis Systems (DAS), p.1-6
[Conference Proceedings]

Detecting Morphed Face Images Using Facial Landmarks
Scherhag, U.; Budhrani, D.; Gomez-Barrero, M.; Busch, C.
Intl. Conf. on Image and Signal Processing (ICISP)
[Conference Proceedings]

SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]

Multi-sample Compression of Iris Images using High Efficiency Video Coding
Rathgeb, C.; Schlett, T.; Buchmann, N.; Baier, H.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-6
[Conference Proceedings]

Visible Wavelength Iris Segmentation: A Multi-Class Approach using Fully Convolutional Neuronal Networks
Osorio-Roig, D.; Rathgeb, C.; Gomez-Barrero, M.; Morales-Gonzalez, A.; Garea-Llano, E.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]

Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
Osorio-Roig, D.; Drozdowski, P.; Rathgeb, C.; Morales-González, A.; Garea-Llano, E.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-6
[Conference Proceedings]

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]

Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]

Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]