Publikationen
Publikationen
Sicherheitsaspekte und Vergleich der Blockchiffren LED und TEA
M. Appel and C. Pauer and A. Wiesmaier
[Report]
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8
P. Jattke and M. Senker and A. Wiesmaier
[Report]
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
L. Dietrich and P. Jattke and L. Murati and M. Senker and A. Wiesmaier
[Report]
ECDSA and QUARTZ in Comparison with RSA
P. Lieb and M. Schmidt and A. Wiesmaier
[Report]
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i
R. Röpke and T. Thräm and J. Wagener and A. Wiesmaier
[Report]
Security aspects and comparison of block ciphers LED and TEA
M. Appel and C. Pauer and A. Wiesmaier
[Report]
A comparison of block ciphers SIMON, SPECK, and KATAN
A. Bossert and S. Cooper and A. Wiesmaier
[Report]
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared
M. Appel and A. Bossert and S. Cooper and T. Kußmaul and J. Löffler and C. Pauer and A. Wiesmaier
[Report]
On the Security & Privacy of Internet of Things Architectures and Systems
E. Vasilomanolakis and J. Daubert and M. Luthra and V. Gazis and A. Wiesmaier and P. Kikiras
2015 International Workshop on Secure Internet of Things (SIoT), p.49–57
[Conference Proceedings]
Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs and Christoph Krauß and Jürgen Repp
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]
Evaluation of Lightweight TPMs for Automotive Software Updates over the Air
Richard Petri and Markus Springer and Daniel Zelle and Ira McDonald and Andreas Fuchs and Christoph Krauß
4th Embedded Security in Cars (escar) USA
[Conference Proceedings]
Zur Benutzbarkeit der AusweisApp2
Jörg Willomitzer and
Andreas Heinemann and
Marian Margraf
Mensch & Computer Workshopband
[Conference Proceedings]
Usability-Untersuchung eines Papierprototypen für eine mobile
Online-Ausweisfunktion des Personalausweises
Sandra Kostic and
Andreas Heinemann and
Marian Margraf
GI-Jahrestagung, p.519–527
[Conference Proceedings]
Workshop: Nutzerzentrierte Sicherheit - NzS 2016
Andreas Heinemann and
Steffen Lange and
Marian Margraf and
Jörg Willomitzer
GI-Jahrestagung, p.485–486
[Conference Proceedings]
In Whom Do We Trust - Sharing Security Events
J. Steinberger and B. Kuhnert and A. Sperotto and H. Baier and A. Pras
Management and Security in the Age of Hyperconnectivity, p.111–124
Ludo - kids playing Distributed Denial of Service
J. Steinberger and J. Santanna and E. Spatharas and H. Amler and N. Breuer and others
TERENA Networking Conf. (TNC16)
[Conference Proceedings]
Collaborative DDoS defense using flow-based security event information
J. Steinberger and B. Kuhnert and A. Sperotto and H. Baier and A. Pras
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, p.516–522
[Conference Proceedings]
A Binarization Scheme for Face Recognition Based on Multi-Scale Block Local Binary Patterns
T. Schlett and C. Rathgeb and C. Busch
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]
Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features
U. Scherhag and A. Nautsch and C. Rathgeb and C. Busch
Proc. of the Annual Conf. of the Intl. Speech Communication Association (INTERSPEECH), p.2209–2213
[Conference Proceedings]
Unlinkable improved multi-biometric iris fuzzy vault
C. Rathgeb and B. Tams and J. Wagner and C. Busch
EURASIP Journal on Information Security, Vol.2016, p.26
[Journal Article]
Effects of image compression on ear biometrics
C. Rathgeb and A. Pflug and J. Wagner and C. Busch
IET Biometrics, Vol.5, p.252–261
[Journal Article]
How to apply Binarized Statistical Image Features to Near-Infrared Iris Recognition effectively
C. Rathgeb and F. Struck and C. Busch
Sixth Intl. Conf. on Image Processing Theory, Tools and Applications (IPTA 2016)
[Conference Proceedings]
Design Decisions for an Iris Recognition SDK
C. Rathgeb and A. Uhl and P. Wild and H. Hofbauer
Handbook of Iris Recognition, p.359–396
TripleA: Accelerated accuracy-preserving alignment for iris-codes
C. Rathgeb and H. Hofbauer and A. Uhl and C. Busch
2016 Intl. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]
DDoS 3.0 - How Terrorists Bring Down the Internet
A. Pras and J. Santanna and J. Steinberger and A. Sperotto
Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, p.1–4
Multi-Bit Allocation: Preparing Voice Biometrics for Template Protection
M. Paulini and C. Rathgeb and A. Nautsch and H. Reichau and H. Reininger and C. Busch
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.291–296
[Conference Proceedings]
Finger image quality assessment features - definitions and evaluation
M. Olsen and V. Šmida and C. Busch
IET Biometrics, Vol.5, p.47–64
[Journal Article]
Robustness of Quality-based Score Calibration of Speaker Recognition Systems with respect to low-SNR and short-duration conditions
A. Nautsch and R. Saeidi and C. Rathgeb and C. Busch
Proc. Odyssey 2016: The Speaker and Language Recognition Workshop, p.358–365
[Conference Proceedings]
Towards PLDA-RBM based speaker recognition in mobile environment: Designing stacked/deep PLDA-RBM systems
A. Nautsch and H. Hao and T. Stafylakis and C. Rathgeb and C. Busch
Proc. of 2016 IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP), p.5055–5059
[Conference Proceedings]
HDA NIST SRE'16 Systems (CRISP & I4U)
Nautsch, A. and Isadskiy, S. and Rathgeb, C. and Busch, C.
Proc. of the NIST SRE workshop
[Conference Proceedings]


