Publikationen

Publikationen

D-ID-Net: Two-Stage Domain and Identity Learning for Identity-Preserving Image Generation from Semantic Segmentation
Damer, Naser; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Computer Vision (ICCV) <17, 2019, Seoul>
Sprache: English
[Conference Paper]

Darknets as Tools for Cyber Warfare
Denker, Kai; Schäfer, Marcel; Steinebach, Martin
Sprache: English
[Book Article]

Das Löschen nach der DSGVO. Eine Diskussion der datenschutzkonformen Umsetzung bei E-Mails
Selzer, Annika; Durmus, Erdem; Pordesch, Ulrich
Sprache: German
[Journal Article]

Data Erasure under the GDPR - Steps towards Compliance. Practitioner’s Corner
Enzmann, Matthias; Selzer, Annika; Spychalski, Dominik
Sprache: English
[Journal Article]

Data-Leakage-Tracking durch digitale Wasserzeichen
Zmudzinski, Sascha; Steinebach, Martin
Sprache: German
[Journal Article]

Datenschutz muss benutzbar sein
Heinemann, Andreas; Straub, Tobias
Datenschutz und Datensicherheit, Vol.43, p.7-12
[Journal Article]

Der digitale Nachlass: Eine Untersuchung aus rechtlicher und technischer Sicht
Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich
Sprache: German
[Study, Electronic Publication]

Der digitale Nachlass: Eine Untersuchung aus rechtlicher und technischer Sicht (Tablet-Version)
Kubis, Marcel; Naczinsky, Magdalena; Selzer, Annika; Sperlich, Tim; Steiner, Simone; Waldmann, Ulrich
Sprache: German
[Study, Electronic Publication]

Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts
Damer, Naser; Boller, Viola; Wainakh, Yaza; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
German Conference on Pattern Recognition (GCPR) <40, 2018, Stuttgart>
Sprache: English
[Conference Paper]

Detection and Analysis of Tor Onion Services
Steinebach, Martin; Schäfer, Marcel; Karakuz, Alexander; Brandl, Katharina; Yannikos, York
International Conference on Availability, Reliability and Security (ARES) <14, 2019, Canterbury>
Sprache: English
[Conference Paper]

Detection of Face Morphing Attacks based on PRNU Analysis
Scherhag, U.; Debiasi, L.; Rathgeb, C.; Busch, C.; Uhl, A.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]

Deterministic twirling with low resources
Stonner, David Jakob; Kysela, Jaroslav; Weir, Graeme; Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physics Letters A
Sprache: English
[Journal Article]

Die Entwicklung von Löschregeln zum datenschutzkonformen Löschen personenbezogener Daten in Issue-Tracking-Systemen
Selzer, Annika; Stummer, Sarah
Sprache: German
[Journal Article]

Digitalisierung der Kommunikation und der Wandel von Organisationen
Reuter, Christian; Schultz, Tanjev; Stegbauer, Christian
Sprache: German
[Book]

DÏoT: A Federated Self-learning Anomaly Detection System for IoT
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Fereidooni, Hossein; Asokan, N.; Sadeghi, Ahmad-Reza
The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
Sprache: English
[Conference Proceedings]

DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
Brasser, Ferdinand; Capkun, Srdjan; Dmitrienko, Alexandra; Frassetto, Tommaso; Kostiainen, Kari; Sadeghi, Ahmad-Reza
ACSAC - 35th Annual Computer Security Applications Conference
Sprache: English
[Conference Proceedings]

Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
Riebe, Thea; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
Sprache: English

Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden
Sprache: German
[Journal Article]

Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden, p.46-48
Sprache: German
[Journal Article]

Dynamic DASH Aware Scheduling in Cellular Networks
El-Azouzi, R.; Sunny, A.; Zhao, L.; Altman, E.; Tsilimantos, D.; de Pellegrini, F.; Valentin, S.
CONF_WCNC
[Conference Proceedings]

eContracting: Case Study - Face Recognition in the Biometric Passport
Busch, C.
eDemocracy and eGovernment

Efficient Circuit-based PSI with Linear Communication
Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay
38. Advances in Cryptology -- EUROCRYPT 2019
Sprache: English
[Conference Proceedings]

Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments
Geihs, Matthias; Schabhüser, Lucas; Buchmann, Johannes
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019
Sprache: English
[Conference Proceedings]

Efficiently Stealing your Machine Learning Models
Reith, Robert Nikolai; Schneider, Thomas; Tkachenko, Oleksandr
Proceedings of the 2019 Workshop on Privacy in the Electronic Society
Sprache: English
[Conference Proceedings]

Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas
Mensch & Computer Workshopband
[Conference Proceedings]