Publikationen
Publikationen
Vulnerability Assessment and Detection of Makeup Presentation Attacks
C. Rathgeb and P. Drozdowski and D. Fischer and C. Busch
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Efficient Identification in Large-Scale Vein Recognition Systems Using Spectral Minutiae Representations
B.-A. Mokroß and P. Drozdowski and C. Rathgeb and C. Busch
Handbook of Vascular Biometrics
[Book Article]
Efficient privacy-preserving biometric identification in large-scale multibiometric systems
P. Drozdowski
[Dissertation]
Multi-biometric Identification with Cascading Database Filtering
P. Drozdowski and C. Rathgeb and B.-A. Mokroß and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.2, p.210–222
[Journal Article]
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
P. Bauspieß and J. Kolberg and D. Demmler and J. Krämer and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
Campos, Fabio and Kannwischer, Matthias J and Meyer, Michael and Onuki, Hiroshi and Stöttinger, Marc
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), p.57–65
[Conference Proceedings]
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Campos, Fabio and Jellema, Lars and Lemmen, Mauk and Müller, Lars and Sprenkels, Amber and Viguier, Benoit
International Conference on Cryptology and Network Security (CANS), p.526–545
[Conference Proceedings]
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Campos, Fabio and Kohlstadt, Tim and Reith, Steffen and Stöttinger, Marc
International Conference on Cryptology in Africa (AFRICACRYPT), p.258–277
[Conference Proceedings]
API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]
Benchmark Performance for the Sussex-Huawei Locomotion and Transportation
Recognition Challenge 2018
Lin Wang and
Hristijan Gjoreski and
Mathias Ciliberto and
Sami Mekki and
Stefan Valentin and
Daniel Roggen
Human Activity Sensing - Corpus and Applications, p.153–170
Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and
Albert Sunny and
Liang Zhao and
Eitan Altman and
Dimitrios Tsilimantos and
Francesco De Pellegrini and
Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC
2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]
Analysis of QoE for Adaptive Video Streaming over Wireless Networks
with User Abandonment Behavior
Rachid El Azouzi and
Krishna V. Acharya and
Sudheer Poojary and
Albert Sunny and
Majed Haddad and
Eitan Altman and
Dimitrios Tsilimantos and
Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC
2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]
From click to playback: a dataset to study the response time of mobile
YouTube
Frank Loh and
Florian Wamser and
Christian Moldovan and
Bernd Zeidler and
Tobias Hoßfeld and
Dimitrios Tsilimantos and
Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys
2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]
Enforcing Bitrate-Stability for Adaptive Streaming Traffic in Cellular
Networks
Albert Sunny and
Rachid El Azouzi and
Afaf Arfaoui and
Eitan Altman and
Sudheer Poojary and
Dimitrios Tsilimantos and
Stefan Valentin
IEEE Trans. Netw. Serv. Manag., Vol.16, p.1812–1825
[Journal Article]
Enabling Reproducible Research in Sensor-Based Transportation Mode
Recognition With the Sussex-Huawei Dataset
Lin Wang and
Hristijan Gjoreski and
Mathias Ciliberto and
Sami Mekki and
Stefan Valentin and
Daniel Roggen
IEEE Access, Vol.7, p.10870–10891
[Journal Article]
Security Requirements Engineering in Safety-Critical Railway Signalling Networks
Markus Heinrich and Tsvetoslava Vateva-Gurova and Tolga Arul and Stefan Katzenbeisser and Neeraj Suri and Henk
Birkholz and Andreas Fuchs and Christoph Krauß and Maria Zhdanova and Don Kuzhiyelil and Sergey Tverdyshev and Christian
Schlehuber
Security and Communication Networks, Vol.vol. 2019, Article ID 8348925, p.14 pages
[Journal Article]
Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph
Grundrechtsschutz im Smart Car: Kommunikation, Sicherheit und Datenschutz im vernetzten Fahrzeug, p.227–244
[Book Article]
Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC
2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]
Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess
sicherer Software
Rolf Huesmann and
Alexander Zeier and
Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]
API Usability of Stateful Signature Schemes
Alexander Zeier and
Alexander Wiesmaier and
Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]
Phishing Attack Recognition by End-Users: Concepts for URL Visualization
and Implementation
Vivian Ives Philipp Erbenich and
Daniel Träder and
Andreas Heinemann and
Meltem Nural
HAISA, p.179–188
[Conference Proceedings]
Datenschutz muss benutzbar sein
Andreas Heinemann and
Tobias Straub
Datenschutz und Datensicherheit, Vol.43, p.7–12
[Journal Article]
Relevant features for Gender Classification in NIR Periocular Images
I. Viedma and J. Tapia and A. Iturriaga and C. Busch
arXiv e-prints
[Journal Article]
Privacy-preserving PLDA Speaker Verification Using Outsourced Secure Computation
A. Treiber and A. Nautsch and J. Kolberg and T. Schneider and C. Busch
Speech Communication, Vol.114, p.60–71
[Journal Article]
Detection of Face Morphing Attacks based on PRNU Analysis
U. Scherhag and L. Debiasi and C. Rathgeb and C. Busch and A. Uhl
Trans. on Biometrics, Behavior, and Identity Science (TBIOM)
[Journal Article]
Face Recognition Systems under Morphing Attacks: A Survey
U. Scherhag and C. Rathgeb and J. Merkle and R. Breithaupt and C. Busch
IEEEAccess
[Journal Article]
Impact and Detection of Facial Beautification in Face Recognition: An Overview
C. Rathgeb and A. Dantcheva and C. Busch
IEEE Access, Vol.7, p.152667–152678
[Journal Article]
Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]
Preserving Privacy in Speaker and Speech Characterisation
A. Nautsch and A. Jiménez and A. Treiber and J. Kolberg and C. Jasserand and others
Computer Speech & Language, Vol.58, p.441–480
[Journal Article]
Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]


