Publikationen

Publikationen

A Review of existing GDPR Solutions for Citizens and SMEs
E. Klinger and A. Wiesmaier and A. Heinemann


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
D. Kern and C. Krauß and T. Lauser and N. Alnahawi and A. Wiesmaier and R. Niederhagen
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, p.85–111
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
J. Hohm and A. Heinemann and A. Wiesmaier
15th International Symposium on Foundations & Practice of Security, p.104–119
[Conference Proceedings]


Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics
J. Henrich and A. Heinemann and A. Wiesmaier and N. Schmitt
Information Security Conference (ISC), p.267–287
[Conference Proceedings]


Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Matteo Varotto and Stefan Valentin and Stefano Tomasin
IEEE Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, p.160–165
[Conference Proceedings]


Detection of e-Mobility-based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph
53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference Proceedings]


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Kern, Dustin and Krauß, Christoph and Lauser, Timm and Alnahawi, Nouri and Wiesmaier, Alexander and Niederhagen, Ruben
21st International Conference on Applied Cryptography and Network Security (ACNS)
[Conference Proceedings]


Formal Security Analysis of Vehicle Diagnostic Protocols
Lauser, Timm and Krauß, Christoph
The 17th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


CVE-2023-6073: DoS and Control of Volume Settings for VW ID.3 ICAS3 IVI ECU
Hannah Wieser and Jannis Hamborg and Timm Lauser and Thomas Schäfer and Christoph Krauß


Remote Attestation with Constrained Disclosure
Eckel, Michael and George, Dominik Roy and Grohmann, Björn and Krauß, Christoph
Proceedings of the 39th Annual Computer Security Applications Conference, p.718–731
[Conference Proceedings]


Detection of Anomalies in Electric Vehicle Charging Sessions
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
Proceedings of the 39th Annual Computer Security Applications Conference, p.298–309
[Conference Proceedings]


Crypto-Agile Design and Testbed for QKD-Networks
Henrich, Johanna and Heinemann, Andreas and Stiemerling, Martin and Seidl, Fabian
Proceedings of the 2023 European Interdisciplinary Cyber­security Conference, p.191–192
[Conference Proceedings]


Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics
Henrich, Johanna and Heinemann, Andreas and Wiesmaier, Alexander and Schmitt, Nicolai
Information Security, ISC 2023. Lecture Notes in Computer Science, vol 14411, p.267–287
[Conference Proceedings]


Fitness-for-Duty Classification using Temporal Sequences of Iris Periocular images
P. Zurita and D. Benalcazar and J. Tapia
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Iris Liveness Detection Competition (LivDet-Iris)
P. Tinsley and S. Purnapatra and M. Mitcheff and A. Boyd and C. Crum and M. Fang and N. Damer and X. Liu and C. Wang and X. Sun and Z. Chang and X. Li and G. Zhao and J. Tapia and C. Busch and C. Aravena and D. Schulz and S. Schuckers and K. Bowyer and P. Flynn and A. Czajka
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Simulating Print/Scan Textures for Morphing Attack Detection
J. Tapia and H. Zhang and R. Raghavendra and K. Raja and C. Busch
European Signal Processing Conf. (EUSIPCO)
[Conference Proceedings]


Exploring Bias in Sclera Segmentation Models: A Group Evaluation Approach
M. Vitek and A. Das and D. Lucio and L. Zanlorensi and D. Menotti and J. Khiarak and M. Shahpar and M. Asgari-Chenaghlu and E. Jaryani and J. Tapia. and A. Valenzuela and C. Wang and Y. Wang and Z. He and Z. Sun and F. Boutros and N. Damer and J. Grebe and A. Kuijper and K. Raja and G. Gupta and G. Zampoukis and L. Tsochatzidis and I. Pratikakis and A. Kumar and B. Harish and U. Pal and P. Peer and V. Štruc
IEEE Trans. on Information Forensics and Security, Vol.18, p.190–205
[Journal Article]


Impact of Synthetic Images on Morphing Attack Detection Using a Siamese Network
J.Tapia and C. Busch
Iberoamerican Congress on Pattern Recognition (CIARP), p.343–357
[Conference Proceedings]


Face Feature Visualisation of Single Morphing Attack Detection
J. Tapia and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Journal Article]


Classify NIR Iris images Under Alcohol/Drugs/Sleepiness Conditions Using a Siamese Network
J. Tapia and C. Busch
Iberoamerican Congress on Pattern Recognition (CIARP), p.575–588
[Conference Proceedings]


AlphaNet: Single Morphing Attack Detection using Multiple Contributors
J. Tapia and C. Busch
Intl. Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]


Effect of Lossy Compression Algorithms on Face Image Quality and Recognition
T. Schlett and S. Schachner and C. Rathgeb and J. Tapia and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
[Conference Proceedings]


Considerations on the Evaluation of Biometric Quality Assessment Algorithms
T. Schlett and C. Rathgeb and J. Tapia and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]


Benchmarking fixed-length Fingerprint Representations across different Embedding Sizes and Sensor Types
T. Rohwedder and D. Osorio-Roig and C. Rathgeb and C. Busch
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Multi-Biometric Fuzzy Vault based on Face and Fingerprints
C. Rathgeb and B. Tams and J. Merkle and V. Nesterowicz and U. Korte and M. Neu
Proc. Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Vision transformers for fingerprint presentation attack detection
K. Raja and R. Raghavendra and M. Gomez-Barrero and C. Rathgeb and C.Busch
Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment, p.17–56


Towards Contactless Fingerprint Presentation Attack Detection using Algorithms from the Contact-based Domain
J. Priesnitz and R. Casula and C. Rathgeb and G. L. Marcialis and C. Busch
Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


COLFIPAD: A Presentation Attack Detection Benchmark for Contactless Fingerprint Recognition
J. Priesnitz and J. Kolberg and M. Fang and A. Madhu and C. Rathgeb and N. Damer and C. Busch
Proc. of the Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Flickr-PAD: New Face High-Resolution Presentation Attack Detection Database
D. Pasmino and C. Aravena and J. Tapia and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Reversing Deep Face Embeddings with Probable Privacy Protection
D. Osorio-Roig and PA. Gerlitz and C. Rathgeb and C. Busch
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]