Publikationen

Publikationen

Open Source Value Chains for Addressing Security Issues Efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]

Open source value chains for addressing security issues efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
International Conference on Software Quality, Reliability, and Security (QRS) <18, 2018, Lisbon>
Sprache: English
[Conference Paper]

Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas; Burger, Michael; Nguyen, Giang Nam
CSE-2018
Sprache: English
[Conference Proceedings]

Parsing and Extracting Features from OPC Unified Architecture in Industrial Environments
Hormann, Ricardo; Nikelski, Sebastian; Dukanovic, Sinisa; Fischer, Eric
International Symposium on Computer Science and Intelligent Control (ISCSIC) <2, 2018, Stockholm>
Sprache: English
[Conference Paper]

Path MTU discovery considered harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
International Conference on Distributed Computing Systems (ICDCS) <38, 2018, Vienna>
Sprache: English
[Conference Paper]

Path MTU Discovery Considered Harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems
Sprache: English
[Conference Proceedings]

Patterns of frugal innovation in healthcare
Arshad, Hareem; Radic, Marija; Radic, Dubravko
Sprache: English
[Journal Article, Electronic Publication]

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
Sprache: English
[Conference Proceedings]

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Workshop on Hot Topics in Networks (HotNets) <17, 2018, Redmond/Wash.>
Sprache: English
[Conference Paper]

Performance analysis of OpenFlow based software defined wired and wireless network
Jany, M.H.R.; Islam, N.; Khondoker, R.; Habib, M.A.
International Conference of Computer and Information Technology (ICCIT) <20, 2017, Dhaka>
Sprache: English
[Conference Paper]

Performance Variation of Morphed Face Image Detection Algorithms across different Datasets
Scherhag, U.; Rathgeb, C.; Busch, C.
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]

PIR-PSI: Scaling Private Contact Discovery
Demmler, Daniel; Rindal, Peter; Rosulek, Mike; Trieu, Ni
Proceedings on Privacy Enhancing Technologies (PoPETs), p.159-178
Sprache: English
[Journal Article]

Post-quantum cryptography on FPGAs. The Niederreiter cryptosystem. Extended Abstract
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Great Lakes Symposium on VLSI (GLSVLSI) <28, 2018, Chicago/Ill.>
Sprache: English
[Abstract]

Practical experience: Methodologies for measuring route origin validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
International Conference on Dependable Systems and Networks (DSN) <48, 2018, Luxembourg>
Sprache: English
[Conference Paper]

Practical Experience: Methodologies for Measuring Route Origin Validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks
Sprache: English
[Conference Proceedings]

Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]

Privacy and data protection in the domain name system: Threats and countermeasures
Kelpen, Kevin; Simo, Hervais
Sprache: English
[Book Article]

Privacy Preserving Forensics for JPEG Images
Liu, Huajian; Steinebach, Martin; Stein, Richard; Mayer, Felix
Annual Symposium on Electronic Imaging, Science and Technology <2018, Burlingame/Calif.>
Sprache: English
[Conference Paper, Electronic Publication]

Privacy-Preserving Genomics on a Large Scale
Tkachenko, Oleksandr
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
Sprache: English
[Conference Proceedings]

Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures
Drozdowski, P.; Garg, S.; Rathgeb, C.; Gomez-Barrero, M.; Chang, D.; Busch, C.
European Signal Processing Conf. (EUSIPCO), p.1-5
[Conference Proceedings]

Private Function Evaluation with Universal Circuits
Günther, Daniel
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
Sprache: English
[Conference Proceedings]

PRNU Variance Analysis for Morphed Face Image Detection
Debiasi, L.; Scherhag, U.; Rathgeb, C.; Uhl, A.; Busch, C.
in Proc. of 9th Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS 2018)
[Conference Proceedings]

PRNU-based Detection of Morphed Face Images
Debiasi, L.; Scherhag, U.; Rathgeb, C.; Uhl, A.; Busch, C.
6th Intl. Workshop on Biometrics and Forensics, p.1-6
[Conference Proceedings]

PROPYLA: Privacy Preserving Long-Term Secure Storage
Geihs, Matthias; Karvelas, Nikolaos; Katzenbeisser, Stefan; Buchmann, Johannes
SCC Workshop @ AsiaCCS 2018
Sprache: English
[Conference Proceedings]

Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng; Krämer, Juliane; Hu, Yu-pu; Buchmann, Johannes
Frontiers of Information Technology & Electronic Engineering, p.1348-1369
Sprache: English
[Journal Article]