Publikationen

Publikationen

XMSS and Embedded Systems. XMSS Hardware Accelerators for RISC-V: Published on Cryptology ePrint Archive
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
Sprache: English
[Preprint, Electronic Publication, Paper]


A reference architecture for integrating safety and security applications on railway command and control systems: Published on Zenodo
Birkholz, Henk; Zhdanova, Maria; Krauß, Christoph; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Vateva-Gurova, Tsvetoslava; Suri, Neeraj; Kuzhiyelil, Don; Schlehuber, Christian
International Workshop on MILS "Architecture and Assurance for Secure Systems" 4, 2018, Luxembourg>
Sprache: English
[Presentation, Electronic Publication]


Kernelemente des IT-Risikomanagements in der industriellen Fertigung: Beitrag auf der Internetseite GIT Sicherheit + Management (https://www.git-sicherheit.de), 18.10.2018
Kraft, Reiner; Stöwer, Mechthild
Sprache: German
[Internet Contribution, Electronic Publication]


Umsetzung einer Architektur zur ad-hoc Etablierung ver­trauens­würdiger Kommunikation
Enzmann, Matthias; Spychalski, Dominik
Workshop "Informatik" 2018, Berlin>
Sprache: German
[Conference Paper]


P-score: Performance aligned normalization and an evaluation in score-level multi-biometric fusion
Damer, Naser; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 26, 2018, Roma>
Sprache: English
[Conference Paper]


Ultrasonic Waves to Support Human Echolocation
Zabiensky, F. von; Kreutzer, M.; Bienhaus, D.
International Conference on Universal Access in Human-Computer Interaction (UAHCI) 12, 2018, Las Vegas/Nev.>
Sprache: English
[Conference Paper]


Sicherheit ist die Abwesenheit von Kriminalität - eine Hypothese. P(Sicherheit) = 1-P(Kriminalität)
Labudde, Dirk
Sprache: German
[Book Article]


One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.529-543
Sprache: English
[Conference Proceedings]


Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.820-822
Sprache: English
[Conference Proceedings]


Web Application for Privacy-Preserving Scheduling (Poster)
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
Sprache: English
[Conference Proceedings]


Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]


A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems
Birkholz, Henk; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Suri, Neeraj; Vateva-Gurova, Tsvetoslava; Schlehuber, Christian
4th International Workshop on MILS: Architecture and Assurance for Secure Systems, (MILS@DSN 2018)
[Conference Proceedings]


Anonymous Charging and Billing of Electric Vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES, p.1-22
[Conference Proceedings]


The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Von Pape, Thilo; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES, p.1-24
[Conference Proceedings]


Open Source Value Chains for Addressing Security Issues Efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]


Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment Service Directive 2
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
Sicherheit, p.183-196
[Conference Proceedings]


Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
Tolosana, R.; Gomez-Barrero, M.; Kolberg, J.; Morales, A.; Busch, C.; Ortega-Garcia, J.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]


Sex-Prediction from Periocular Images across Multiple Sensors and Spectra
Tapia, J.; Rathgeb, C.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-7
[Conference Proceedings]


Multi-spectral Iris Segmentation in Visible Wavelengths
Schlett, T.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-5
[Conference Proceedings]


Performance Variation of Morphed Face Image Detection Algorithms across different Datasets
Scherhag, U.; Rathgeb, C.; Busch, C.
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]


Morph detection from single face images: a multi-algorithm fusion approach
Scherhag, U.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometric Engineering and Applications 2018 (ICBEA), p.1-7
[Conference Proceedings]


Towards detection of morphed face images in electronic travel documents
Scherhag, U.; Rathgeb, C.; Busch, C.
13th IAPR Workshop on Document Analysis Systems (DAS), p.1-6
[Conference Proceedings]


Detecting Morphed Face Images Using Facial Landmarks
Scherhag, U.; Budhrani, D.; Gomez-Barrero, M.; Busch, C.
Intl. Conf. on Image and Signal Processing (ICISP)
[Conference Proceedings]


SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]


Multi-sample Compression of Iris Images using High Efficiency Video Coding
Rathgeb, C.; Schlett, T.; Buchmann, N.; Baier, H.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-6
[Conference Proceedings]


Visible Wavelength Iris Segmentation: A Multi-Class Approach using Fully Convolutional Neuronal Networks
Osorio-Roig, D.; Rathgeb, C.; Gomez-Barrero, M.; Morales-Gonzalez, A.; Garea-Llano, E.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
Osorio-Roig, D.; Drozdowski, P.; Rathgeb, C.; Morales-González, A.; Garea-Llano, E.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-6
[Conference Proceedings]


Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]


Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]


Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]