Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
Raja, K.; Ferrara, M.; Franco, A.; Spreeuwers, L.; Batskos, I.; others
IEEE Trans. on Information Forensics and Security
[Journal Article]

Morphing-Angriffe - Ein Sicherheitsrisiko für Gesichtserkennungssysteme
Merkle, J.; Rathgeb, C.; Scherhag, U.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.38-42
[Journal Article]

Towards Measuring the Amount of Discriminatory Information in Finger Vein Biometric Characteristics Using a Relative Entropy Estimator
ca, V. Krivoku\; Gomez-Barrero, M.; Marcel, S.; Rathgeb, C.; Busch, C.
[Book Article]

Presentation Attack Detection for Finger Recognition
Kolberg, J.; Gomez-Barrero, M.; Venkatesh, S.; Raghavendra, R.; Busch, C.
Handbook of Vascular Biometrics, p.435-463

Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection
Kolberg, J.; Vasile, A. C.; Gomez-Barrero, M.; Busch, C.
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1-7
[Conference Proceedings]

Texture-based Presentation Attack Detection for Automatic Speaker Verification
Gonzalez-Soler, L. J.; Patino, J.; Gomez-Barrero, M.; Todisco, M.; Busch, C.; Evans, N.
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1-6
[Conference Proceedings]

Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]

Reversing the irreversible: A survey on inverse biometrics
Gomez-Barrero, M.; Galbally, J.
Computers & Security, Vol.90
[Journal Article]

Erkennung von Präsentationsangriffen auf Fingerabdruck Systemen
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Datenschutz und Datensicherheit - DuD, Vol.44, p.26-31
[Journal Article]

A Novel Approach for Generating Synthetic Datasets for Digital Forensics
Göbel, T.; Schäfer, T.; Hachenberger, J; Türr, J.; Baier, H.
Advances in Digital Forensics XVI, p.73-93

Demographic Bias: A Challenge for Fingervein Recognition Systems?
Drozdowski, P.; Prommegger, B.; Wimmer, G.; Schraml, R.; Rathgeb, C.; Uhl, A.; Busch, C.
European Signal Processing Conf. (EUSIPCO), p.825-829
[Conference Proceedings]

Information-Theoretic Security of Cryptographic Channels
Fischlin, Marc; Günther, Felix; Muth, Philipp
Information and Communications Security, p.295-311
[Conference Proceedings]

LeakyPick: IoT Audio Spy Detector
Mitev, Richard; Pazii, Anna; Miettinen, Markus; Enck, William; Sadeghi, Ahmad-Reza
ACSAC '20: Annual Computer Security Applications Conference, p.694-705
[Conference Proceedings]

Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic
Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense
[Conference Proceedings]

Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Lauinger, Johannes; Baumgärtner, Lars; Wickert, Anna-Katharina; Mezini, Mira
Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.410-417
[Conference Proceedings]

Mind the GAP: Security & Privacy Risks of Contact Tracing Apps
Baumgärtner, Lars; Dmitrienko, Alexandra; Freisleben, Bernd; Gruler, Alexander; Höchst, Jonas; Kühlberg, Joshua; Mezini, Mira; Mitev, Richard; Miettinen, Markus; Muhamedagic, Anel; Nguyen, Thien Duc; Penning, Alvar; Pustelnik, Frederik; Roos, Filipp; Sadeghi, Ahmad-Reza; Schwarz, Michael; Uhl, Christian
Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.458-467
[Conference Proceedings]

Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy
Glanz, Leonid; Müller, Patrick; Baumgärtner, Lars; Reif, Michael; Anthonysamy, Pauline; Mezini, Mira
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, p.694-707
[Conference Proceedings]

How to nudge in cyber security
Renaud, Karen; Zimmermann, Verena
Network Security, p.20-20
[Journal Article]

Exploring User Expectations of Proactive AI Systems
Meurisch, Christian; Mihale-Wilson, Cristina; Hawlitschek, Adrian; Giger, Florian; Müller, Florian; Hinz, Oliver; Mühlhäuser, Max
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
[Journal Article]

LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]

Classic McEliece Implementation with Low Memory Footprint
Roth, Johannes; Karatsiolis, Vangelis; Krämer, Juliane
19th Smart Card Research and Advanced Application Conference (CARDIS 2020)
[Conference Proceedings]

Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen
Reuter, Christian; Kaufhold, Marc-André; Schmid, Stefka
BBK Bevölkerungsschutz, p.14-17
[Journal Article]

Cost Fairness for Blockchain-Based Two-Party Exchang Protocols
Lohr, Matthias; Schlosser, Benjamin; Jürjens, Jan; Staab, Matthias
3rd IEEE International Conference on Blockchain
[Conference Proceedings]

Security of Public Key Encryption against Resetting Attacks
Krämer, Juliane; Struck, Patrick
21st International Conference on Cryptology in India (Indocrypt 2020)
[Conference Proceedings]

Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the 28th European Conference on Information Systems (ECIS)
[Conference Proceedings]

OptiSwap: Fast Optimistic Fair Exchange
Eckey, Lisa; Faust, Sebastian; Schlosser, Benjamin
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20)
[Conference Proceedings]

Towards Post-Quantum Security for Signal's X3DH Handshake
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian; Stebila, Douglas
27th Selected Areas in Cryptography (SAC 2020)
[Conference Proceedings]

Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
Bauspieß, Pia; Kolberg, Jascha; Demmler, Daniel; Krämer, Juliane; Busch, Christoph
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020)
[Conference Proceedings]

Deterministic Wallets in a Quantum World
Alkeilani Alkadri, Nabil; Das, Poulami; Erwig, Andreas; Faust, Sebastian; Krämer, Juliane; Riahi, Siavash; Struck, Patrick
The 27th ACM Conference on Computer and Communications Security (CCS 2020)
[Conference Proceedings]

Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
Kaufhold, Marc-André; Bayer, Markus; Reuter, Christian
Information Processing & Management
[Journal Article]