Publikationen

Publikationen

PRNU-based Detection of Morphed Face Images
L. Debiasi and U. Scherhag and C. Rathgeb and A. Uhl and C. Busch
6th Intl. Workshop on Biometrics and Forensics, p.1–6
[Conference Proceedings]


What can a single minutia tell about gender?
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
International Workshop on Biometrics and Forensics (IWBF) 2018
[Conference Paper]


Deep and multi-algorithmic gender classification of single fingerprint minutiae
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
International Conference on Information Fusion (FUSION) 2018
[Conference Paper]


Fingerprint and iris multi-biometric data indexing and retrieval
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Information Fusion (FUSION) 2018
[Conference Paper]


MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Damer, Naser; Moseguí Saladié, Alexandra; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2018
[Conference Paper]


Face verification robustness & camera-subject distance
Berthe, Benoit; Croll, Christian; Henniger, Olaf
[Journal Article]


Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data
Ulmer, Alex; Schufrin, Marija; Sessler, David; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 2018
[Conference Paper]


Deep learning-based face recognition and the robustness to perspective distortion
Damer, Naser; Wainakh, Yaza; Henniger, Olaf; Croll, Christian; Berthe, Benoit; Braun, Andreas; Kuijper, Arjan
International Conference on Pattern Recognition (ICPR) 2018
[Conference Paper]


CrazyFaces: Unassisted Circumvention of Watchlist Face Identification
Damer, Naser; Wainakh, Yaza; Boller, Viola; Berken von den, Sven; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 2018
[Conference Paper]


The dark side of the face: Exploring the ultraviolet spectrum for face biometrics
Samartzidis, Timotheos; Siegmund, Dirk; Gödde, Michael; Damer, Naser; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics (ICB) 2018
[Conference Paper]


P-score: Performance aligned normalization and an evaluation in score-level multi-biometric fusion
Damer, Naser; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 2018
[Conference Paper]


Application-driven advances in multi-biometric fusion
Damer, Naser
[Thesis]


Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead
Asokan, N.; Miettinen, Markus
Computer Communications
[Journal Article]


LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Dessouky, Ghada; Abera, Tigist; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18)
[Conference Proceedings]


A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Dantas, Yuri Gil; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]


Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Degabriele, Jean Paul; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2018, p.519-550
[Conference Proceedings]


"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Kulyk, Oksana; Hilt, Annika; Gerber, Nina; Volkamer, Melanie
3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018
[Conference Proceedings]


Helping john to make informed decisions on using social login
Karegar, Farzaneh; Gerber, Nina; Volkamer, Melanie; Fischer-Hübner, Simone
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, p.1165-1174
[Conference Proceedings]


Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, Marco; Henhapl, Birgit; Gerber, Nina
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]


Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Gerber, Nina; Gerber, Paul; Volkamer, Melanie
Computers & Security, p.226-261
[Journal Article]


Web Application for Privacy-Preserving Scheduling
Kiss, Ágnes; Schick, Oliver; Schneider, Thomas
27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Conference Proceedings]


Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
[Conference Proceedings]


Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]


Off-path Attacks Against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
[Conference Proceedings]


Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
HotNets '18: 17th ACM Workshop on Hot Topics in Networks
[Conference Proceedings]


IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt
Nordmann, Alfred; Reuter, Christian; Lederer, Markus
10 Jahre Forum inter­dis­zi­pli­näre Forschung an der TU Darmstadt, p.70-89


Towards a Cloud-based System for Software Protection and Licensing
Schaad, Andreas; Grohmann, Bjoern; Winzenried, Oliver; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, p.698-702
[Conference Proceedings]


CodeMatch: Obfuscation Won't Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2018, p.117-118


‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes
Zimmermann, Verena; Bennighof, Merve; Edel, Miriam; Hofmann, Oliver; Jung, Judith; Wick, Melina von
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]


Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
[Journal Article]