Publikationen

Publikationen

An Attack on Facial Soft-biometric Privacy Enhancement
Osorio-Roig, D.; Rathgeb, C.; Drozdowski, P; Terhörst, P.; Štruc, V.; Busch, C.
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Are Average Faces Master Faces?
Dörsch, André; Rathgeb, Christian; Ibsen, Mathias; Busch, Christoph
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Towards a maturity model for crypto-agility asessment — long preprint
Hohm, J.; Heinemann, A.; Wiesmaier, A.


$crypto_lib$: Comparing and Selecting Cryptography Libraries (long version of EICC 2022 publication)
Wohlwender, Jan; Huesmann, Rolf; Heinemann, Andreas; Wiesmaier, Alexander


$crypto_lib$: Comparing and Selecting Cryptography Libraries
Wohlwender, Jan; Huesmann, Rolf; Heinemann, Andreas; Wiesmaier, Alexander
Accepted at European Interdisciplinary Cyber­security Conference (EICC 22)
[Conference Proceedings]


ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Zelle, Daniel; Plappert, Christian; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]


Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
Buschlinger, Lucas; Rieke, Roland; Sarda, Sanat; Krauß, Christoph
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), p.246-254
[Conference Proceedings]


Integrating Privacy into the Electric Vehicle Charging Architecture
Kern, Dustin; Lauser, Timm; Krauß, Christoph
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]


On the State of Crypto Agility
Alnahawi, N.; Schmitt, N.; Wiesmaier, A.; Heinemann, A.; Graßmeyer, T.
18. Deutscher IT-Sicherheitskongress, p.103-126
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
Hohm, Julian; Heinemann, Andreas; Wiesmaier, Alexander
CoRR, Vol.abs/2202.07645
[Journal Article]


Face Morphing Attack Detection Methods
Scherhag, U.; Rathgeb, C.; Busch, C.
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.331-349


Future Trends in Digital Face Manipulation and Detection
Tolosana, Ruben; Rathgeb, Christian; Vera-Rodriguez, Ruben; Busch, Christoph; Verdoliva, Luisa; Lyu, Siwei; others
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.463-482


Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
Nichols, R.; Rathgeb, C.; Drozdowski, P.; Busch, C.
IEEE Access, Vol.10, p.31359-31376
[Journal Article]


Signal-level fusion for indexing and retrieval of facial biometric data
Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.11, p.1-16
[Journal Article]


Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Digital Face Manipulation in Biometric Systems
Ibsen, M.; Rathgeb, C.; Fischer, D.; Drozdowski, P.; Busch, C.
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, p.27-43


Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
Qin, L.; Peng, F.; Long, M.; Raghavendra, R.; Busch, C.
ACM Trans. on Privacy and Security, Vol.25, p.1-28
[Journal Article]


Dual-Stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kamble, M.; Todisco, M.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]


Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
Priesnitz, J.; Huesmann, R.; Rathgeb, C.; Buchmann, N.; Busch, C.
MDPI Intelligent Sensors
[Journal Article]


Exploring Quality Scores for Workload Reduction in Biometric Identification
Osorio-Roig, D.; Schlett, T.; Rathgeb, C.; Tapia, J.; Busch, C.
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks
Rathgeb, C.; Tolosana, R.; Vera, R.; Busch, C.
[Book]


Reliable detection of doppelgängers based on deep face representations
Rathgeb, Christian; Fischer, Daniel; Drozdowski, Pawel; Busch, Christoph
IET Biometrics, Vol.11, p.215-224
[Journal Article]


On PQC Migration and Crypto-Agility
Wiesmaier, A.; Alnahawi, N.; Graßmeyer, T.; Geißler, J.; Zeier, A.; Bauspieß, P.; Heinemann, A.


On Message-based Consensus and Network Coding
Braun, M.; Wiesmaier, A.; Alnahawi, N.; Geißler, J.
NoF 2021 —- 12th International Conference on Network of the Future
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
Alnahawi, N.; Wiesmaier, A.; Graßmeyer, T.; Geißler, J.; Zeier, A.; Bauspieß, P.; Heinemann, A.
INFORMATIK 21 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Journal Article]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel; Lauser, Timm; Kern, Dustin; Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Chevalier, Yannick; Fenzl, Florian; Kolomeets, Maxim; Rieke, Roland; Chechulin, Andrey; Krauß, Christoph
Informatics and Automation, Vol.20, p.845-868
[Journal Article]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael; Kuzhiyelil, Don; Krauß, Christoph; Zhdanova, Maria; Katzenbeisser, Stefan; Cosic, Jasmin; Drodt, Matthias; Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin; Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]