Publikationen

Publikationen

Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
17. Workshop on Privacy in the Electronic Society (WPES’18), p.66-70
Sprache: English
[Conference Proceedings]

Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
Sprache: English
[Conference Proceedings]

Exploring the Performance Envelope of the LLL Algorithm
Burger, Michael; Bischof, Christian; Calotoiu, Alexandru; Wunderer, Thomas; Wolf, Felix
CSE-2018
Sprache: English
[Conference Proceedings]

Face verification robustness & camera-subject distance: Camera-subject distance marginally affects automatic face verification
Berthe, Benoit; Croll, Christian; Henniger, Olaf
Sprache: English
[Journal Article]

FairSwap: How to fairly exchange digital goods
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Sprache: English
[Conference Proceedings]

Faster Privacy-Preserving Location Proximity Schemes
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
17. International Conference on Cryptology And Network Security (CANS'18), p.3-22
Sprache: English
[Conference Proceedings]

Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics
Reuter, Christian; Kaufhold, Marc-André
Journal of Contingencies and Crisis Management (JCCM), p.41-57
Sprache: English
[Journal Article]

Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie
International Conference on Availability, Reliability and Security (ARES)
Sprache: English
[Conference Proceedings]

Fingerprint and iris multi-biometric data indexing and retrieval
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Information Fusion (FUSION) <21, 2018, Cambridge>
Sprache: English
[Conference Paper]

Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]

FPGA-based Niederreiter cryptosystem using binary goppa codes
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
International Conference on Post-Quantum Cryptography (PQCrypto) <9, 2018, Fort Lauderdale/Fla.>
Sprache: English
[Conference Paper]

From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
Riebe, Thea; Pätsch, Katja; Kaufhold, Marc-André; Reuter, Christian
Mensch und Computer 2018: Workshopband
Sprache: English
[Conference Proceedings]

Function-Dependent Commitments for Verifiable Multi-Party Computation
Schabhüser, Lucas; Butin, Denis; Demirel, Denise; Buchmann, Johannes
Information Security - 21st International Conference, ISC 2018
Sprache: English
[Conference Proceedings]

General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.13, p.1406-1420
[Journal Article]

General State Channel Networks
Dziembowski, Stefan; Faust, Sebastian; Hostakova, Kristina
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Sprache: English
[Conference Proceedings]

Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.v-viii
Sprache: English
[Journal Article]

Guidelines For Ethical Nudging in Password Authentication
Renaud, Karen; Zimmermann, Verena
South African Institute Of Electrical Engineers (SAIEE), p.102-118
Sprache: English
[Journal Article]

Handlungsempfehlungen des Förderprojekts DELTA
Brosi, Frank; Harner, Andreas; Krauß, Christoph; Seipel, Christian; Springer, Markus; Staubermann, Michael; Suhr, André; Voit, Stephan; Zhdanova, Maria; Seipel, Christian
Sprache: German
[Report, Electronic Publication]

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]

HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot
Daubert, Jörg; Boopalan, Dhanasekar; Mühlhäuser, Max; Vasilomanolakis, Emmanouil
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, p.1-6
Sprache: English
[Conference Proceedings]

How Secure is Green IT? The Case of Software-Based Energy Side Channels
Mantel, Heiko; Schickel, Johannes; Weber, Alexandra; Weber, Friedrich
ESORICS 2018
Sprache: English
[Conference Proceedings]

How Secure is Green IT? The Case of Software-Based Energy Side Channels
Mantel, Heiko; Schickel, Johannes; Weber, Alexandra; Weber, Friedrich
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS)
Sprache: English
[Conference Proceedings]

Human Factors in Security
Gerber, Paul; Ghiglieri, Marco; Henhapl, Birgit; Kulyk, Oksana; Marky, Karola; Mayer, Peter; Reinheimer, Benjamin; Volkamer, Melanie
Sicherheitskritische Mensch-Computer-Interaktion, p.83-98
Sprache: German

Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial
Reuter, Christian; Mentler, Tilo
Journal of Contingencies and Crisis Management (JCCM), p.2-3
Sprache: English
[Journal Article]

Hybrid Image Encryption
Steinebach, Martin; Liu, Huajian; Stein, Richard; Mayer, Felix
Annual Symposium on Electronic Imaging, Science and Technology <2018, Burlingame/Calif.>
Sprache: English
[Conference Paper, Electronic Publication]