Publikationen
Publikationen
Zur Benutzbarkeit und Verwendung von API-Dokumentationen
R. Huesmann and A. Zeier and A. Heinemann and A. Wiesmaier
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]
Is the Uplink Enough? Estimating Video Stalls from Encrypted Network
Traffic
Frank Loh and
Florian Wamser and
Christian Moldovan and
Bernd Zeidler and
Dimitrios Tsilimantos and
Stefan Valentin and
Tobias Hoßfeld
NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium,
Budapest, Hungary, April 20-24, 2020, p.1–9
[Conference Proceedings]
IJNM Special Issue - International Journal of Network Management:
QoE-centric analysis and management of communication networks
Florian Wamser and
Özgü Alay and
Florian Metzger and
Stefan Valentin
Int. J. Netw. Manag., Vol.30
[Journal Article]
Post-Quantum Secure Boot
Vinay B. Y. Kumar and Naina Gupta and Anupam Chattopadhyay and Michael Kasper and Christoph Krauß and Ruben
Niederhagen
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]
TrustEV: Trustworthy Electric Vehicle Charging and Billing
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]
SEPAD - Security Evaluation Platform for Autonomous Driving
Daniel Zelle and Roland Rieke and Christian Plappert and Christoph Krauß and Dmitry Levshun and Andrey
Chechulin
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]
Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]
Securing Electric Vehicle Charging Systems through Component Binding
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]
HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]
HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova and Ronald Heddergott
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]
Security Analysis of Automotive Protocols
Timm Lauser and Daniel Zelle and Christoph Krauß
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]
Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Rolf Huesmann and
Alexander Zeier and
Andreas Heinemann and
Alexander Wiesmaier
Mensch & Computer Workshopband
[Conference Proceedings]
SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
M. Vitek and A. Das and Y. Pourcenoux and A. Missler and C. Paumier and S. Das and I. De Ghosh and D. R. Lucio and L. A. Zanlorensi Jr. and D. Menotti and F. Boutros and N. Damer and J. H. Grebe and A. Kuijper and J. Hu and Y. He and C. Wang and H. Liu and Y. Wang and Z. Sun and D. Osorio-Roig and C. Rathgeb and C. Busch and J. Tapia and A. Valenzuela and G. Zampoukis and L. Tsochatzidis and I. Pratikakis and S. Nathan and R. Suganya and V. Mehta and A. Dhall and K. Raja and G. Gupta and J. N. Khiarak and M. Akbari-Shahper and F. Jaryani and M. Asgari-Chenaghlu and R. Vyas and S. Dakshit and S. Dakshit and P. Peer and U. Pal and V. Struc
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–10
[Conference Proceedings]
Handbook of Vascular Biometrics
A. Uhl and C. Busch and S. Marcel and R. Veldhuis
[Book]
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
R. Tolosana and M. Gomez-Barrero and C. Busch and J. Ortega-Garcia
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261–1275
[Journal Article]
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
J. Tapia and M. Gomez-Barrero and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
U. Scherhag and J. Kunze and C. Rathgeb and C. Busch
IET Biometrics, Vol.9, p.278–289
[Journal Article]
Morphing Attack Detection using Laplace operator based features
U. Scherhag and D. Fischer and S. Isadskiy and J. Otte and C. Busch
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]
Deep Face Representations for Differential Morphing Attack Detection
U. Scherhag and C. Rathgeb and J. Merkle and Christoph Busch
IEEE Trans. on Information Forensics and Security
[Journal Article]
Detection of Makeup Presentation Attacks based on Deep Face Representations
C. Rathgeb and P. Drozdowski and C. Busch
Proc. Int. Conf. on Pattern Recognition (ICPR), p.1–6
[Conference Proceedings]
Makeup Presentation Attacks: Review and Detection Performance Benchmark
C. Rathgeb and P. Drozdowski and C. Busch
IEEE Access, Vol.8, p.224958–224973
[Journal Article]
Differential Detection of Facial Retouching: A Multi-Biometric Approach
C. Rathgeb and C.-I. Satnoianu and N. E. Haryanto and K. Bernardo and C. Busch
IEEE Access, Vol.8, p.106373–106385
[Journal Article]
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
K. Raja and M. Ferrara and A. Franco and L. Spreeuwers and I. Batskos and others
IEEE Trans. on Information Forensics and Security
[Journal Article]
Touchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Simulation of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
A. Mitkovski and J. Merkle and C. Rathgeb and B. Tams and K. Bernardo and N. E. Haryanto and C. Busch
Proc. of 2020 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]
Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
J. Merkle and C. Rathgeb and U. Scherhag and C. Busch
Datenschutz und Datensicherheit - DuD, Vol.44, p.38–42
[Journal Article]
Towards Measuring the Amount of Discriminatory Information in Finger Vein Biometric Characteristics Using a Relative Entropy Estimator
V. Krivokuća and M. Gomez-Barrero and S. Marcel and C. Rathgeb and C. Busch
[Book Article]
Presentation Attack Detection for Finger Recognition
J. Kolberg and M. Gomez-Barrero and S. Venkatesh and R. Raghavendra and C. Busch
Handbook of Vascular Biometrics, p.435–463
Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection
J. Kolberg and A. C. Vasile and M. Gomez-Barrero and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–7
[Conference Proceedings]
Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption
J. Kolberg and P. Drozdowski and M. Gomez-Barrero and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


