Publikationen

Publikationen

API Usability of Stateful Signature Schemes
Zeier, A.; Wiesmaier, A.; Heinemann, A.
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1-20
[Conference Proceedings]


Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
El-Azouzi, R.; Acharya, K.; Poojary, S.; Sunny, A.; Haddad, M.; Altman, E.; Tsilimantos, D.; Valentin, S.
CONF_WCNC
[Conference Proceedings]


Dynamic DASH Aware Scheduling in Cellular Networks
El-Azouzi, R.; Sunny, A.; Zhao, L.; Altman, E.; Tsilimantos, D.; de Pellegrini, F.; Valentin, S.
CONF_WCNC
[Conference Proceedings]


From Click to Playback: A Dataset to Study the Response Time of Mobile YouTube
Loh, F.; Wamser, F.; Moldovan, C.; Zeidler, B.; Hoßfeld, T.; Tsilimantos, D.; Valentin, S.
CONF_MMSYS_WS
[Conference Proceedings]


Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Loh, F.; Wamser, F.; Moldovan, C.; Zeidler, B.; Hoßfeld, T.; Tsilimantos, D.; Valentin, S.
CONF_NOMS
[Conference Proceedings]


Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Heinrich, Markus; Vateva-Gurova, Tsvetoslava; Arul, Tolga; Katzenbeisser, Stefan; Suri, Neeraj; Birkholz, Henk; Fuchs, Andreas; Krauß, Christoph; Zhdanova, Maria; Kuzhiyelil, Don; Tverdyshev, Sergey; Schlehuber, Christian
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]


Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Grundrechtsschutz im Smart Car: Kommunikation, Sicherheit und Datenschutz im vernetzten Fahrzeug, p.227-244
[Book Article]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521-528
[Conference Proceedings]


Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Huesmann, Rolf; Zeier, Alexander; Heinemann, Andreas
Mensch & Computer Workshopband
[Conference Proceedings]


API Usability of Stateful Signature Schemes
Zeier, Alexander; Wiesmaier, Alexander; Heinemann, Andreas
IWSEC, p.221-240
[Conference Proceedings]


Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Erbenich, Vivian Ives Philipp; Träder, Daniel; Heinemann, Andreas; Nural, Meltem
HAISA, p.179-188
[Conference Proceedings]


Datenschutz muss benutzbar sein
Heinemann, Andreas; Straub, Tobias
Datenschutz und Datensicherheit, Vol.43, p.7-12
[Journal Article]


Relevant features for Gender Classification in NIR Periocular Images
Viedma, I.; Tapia, J.; Iturriaga, A.; Busch, C.
arXiv e-prints
[Journal Article]


Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
Treiber, A.; Nautsch, A.; Kolberg, J.; Schneider, T.; Busch, C.
Speech Communication, Vol.114, p.60-71
[Journal Article]


Detection of Face Morphing Attacks based on PRNU Analysis
Scherhag, U.; Debiasi, L.; Rathgeb, C.; Busch, C.; Uhl, A.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Face Recognition Systems under Morphing Attacks: A Survey
Scherhag, U.; Rathgeb, C.; Merkle, J.; Breithaupt, R.; Busch, C.
IEEEAccess
[Journal Article]


Impact and Detection of Facial Beautification in Face Recognition: An Overview
Rathgeb, C.; Dantcheva, A.; Busch, C.
IEEE Access, Vol.7, p.152667-152678
[Journal Article]


Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra; Busch, C.
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]


Preserving Privacy in Speaker and Speech Characterisation
Nautsch, A.; Jiménez, A.; Treiber, A.; Kolberg, J.; Jasserand, C.; others
Computer Speech \& Language, Vol.58, p.441-480
[Journal Article]


Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
Mandalapu, H.; Raghavendra, R.; Busch, C.
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]


Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5


Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Kolberg, J.; Bauspieß, P.; Gomez-Barrero, M.; Rathgeb, C.; Dürmuth, M.; Busch, C.
IEEE Workshop on Information Forensics and Security (WIFS), p.1-6


On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
González-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C.
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]


Fingerprint Presentation Attack Detection Based on Local Features Encoding for Unknown Attacks
González-Soler, L. J.; Gomez-Barrero, M.; Chang, L.; Pérez-Suárez, A.; Busch, C.
arXiv preprint
[Journal Article]


Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
Gomez-Barrero, M.; Kolberg, J.; Busch, C.
Proc. Int. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]


Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection
Gomez-Barrero, M.; Busch, C.
Proc. of the Norwegian Information Security Conf. (NISC)
[Conference Proceedings]


Light Fields for Face Analysis
Galdi, C.; Chiesa, V.; Busch, C.; Correia, P. Lobato; Dugelay, J.-L.; Guillemot, C.
IEEE Sensors Journal, Vol.19, p.2687
[Journal Article]


Computational Workload in Biometric Identification Systems: An Overview
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.8, p.351-368
[Journal Article]


Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1-5
[Conference Proceedings]


On the Application of Homomorphic Encryption to Face Identification
Drozdowski, P.; Buchmann, N.; Rathgeb, C.; Margraf, M.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]