Publikationen

Publikationen

All That Glitters Is Not Gold: RPKI’s Stumbling Speedrun To The Top
Mirdita, Donika and Schulmann, Haya and Waidner, Michael
IEEE Transactions on Dependable and Secure Computing, p.1-12
[Journal Article]


Resilience Meets Security in Cyber-Physical Systems and Critical Infrastructures
Förster, Anna and Hollick, Matthias and Katzenbeisser, Stefan and Krauss, Christoph
Communications of the ACM, Vol.69, p.35–38
[Journal Article]


SoK: An Introspective Analysis of RPKI Security
Donika Mirdita and Haya Schulmann and Michael Waidner
34th USENIX Security Symposium (USENIX Security 25), p.3649–3665
[Journal Article]


Streamlining Plug-and-Charge Authorization for Electric Vehicles with OAuth 2 and OpenID Federation
Primbs, Jonas and Kern, Dustin and Menth, Michael and Krauß, Christoph
IEEE Access, Vol.13, p.168711-168731
[Journal Article]


DemoQuanDT: a carrier-grade QKD network
P. Horoschenkoff and J. Henrich and R. Böhn and I. Khan and J. Rödiger and M. Gunkel and M. Bauch and J. Benda and P. Bläcker and E. Eichhammer and U. Eismann and G. Frenck and H. Griesser and W. Jontofsohn and N. Kopshoff and S. Röhrich and F. Seidl and N. Schark and E. Sollner and D. von Blanckenburg and A. Heinemann and M. Stiemerling and M. Gärtner
J. Opt. Commun. Netw., Vol.17, p.743–756
[Journal Article]


Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, S. Gonzalez, D. Benalcazar and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]


Forged Presentation Attack Detection for ID Cards on Remote Verification Systems
J. Tapia and S. Gonzalez
ScienceDirect - Pattern Recognition
[Journal Article]


Are Morphed Periocular Iris Images a Threat to Iris Recognition?
J. Tapia, D. Schulz and C. Busch
IEEE Trans. on Information Forensics and Security, Vol.20, p.12417-12428
[Journal Article]


Classification of Alcohol, Drugs and Sleepiness Condition using Periocular Iris Images to Evaluate Fitness For Duty
J. Tapia and D. Benalcazar and A.Valenzuela and L. Causa and E. Lopez-Droguett and C. Busch
ScienceDirect - Expert Systems with Applications
[Journal Article]


Training humans for synthetic face image detection
S. Rehman and E. Meier and M. Ibsen and C. Rathgeb and R. Nichols and C. Busch
Frontiers in Artificial Intelligence, Vol.8, p.1568267
[Journal Article]


Cancelable Face Biometrics With Soft-Biometric Privacy Enhancement
P. Melzi and H. Otroshi and C. Rathgeb and R. Tolosana and R. Vera-Rodriguez and J. Fierrez and S. Marcel and C. Busch
IEEE Access
[Journal Article]


Second FRCSyn-onGoing: Winning solutions and post-challenge analysis to improve face recognition with synthetic data
I. DeAndres-Tame and R. Tolosana and P. Melzi and R. Vera-Rodriguez and M. Kim and C. Rathgeb and others
Information Fusion, Vol.120, p.103099
[Journal Article]


The Super-Recogniser Advantage Extends to the Detection of Digitally Manipulated Faces
J. Davis and D. Robertson and R. Jenkins and M. Ibsen and R. Nichols and M. Babbs and C. Rathgeb and F. Løvåsdal and K. Raja and C. Busch
Applied Cognitive Psychology, Vol.39
[Journal Article]


dCTIDH: Fast & Deterministic CTIDH
Campos, Fabio and Hellenbrand, Andreas and Meyer, Michael and Reijnders, Krijn
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol.2025, p.516–541
[Journal Article]


Meldung von Sicherheitsvorfällen
Hardt, Mark Joshua; Stummer, Sarah
[Journal Article]


Weiterbildung zur Cybersicherheit
Schneider, Markus; Heftrig, Elias; Dukanovic, Sinisa; Dexheimer, Thomas
[Journal Article]


Uncovering linux desktop espionage
Schmidt, Lukas; Strasda, Sebastian; Schinzel, Sebastian
Annual Digital Forensics Research Conference 2025
[Journal Article]


DamFlow: Preventing a Flood of Irrelevant Data Flows in Android Apps
Alecci, Marco; Samhi, Jordan; Miltenberger, Marc; Arzt, Steven; Bissyandé, Tegawendé F.; Klein, Jacques
[Journal Article]


Securing Product Identity With Digital Fingerprinting
Berchtold, Waldemar; Steinebach, Martin
[Journal Article]


Weiternutzung medizinischer Daten zur Forschung
Enzmann, Matthias; Rathore, Soni Wadud Bakhtawer
[Journal Article]


Einsatz KI-generierter Datenschutz-Schulungsmaterialien
Selzer, Annika; Berndt, Jan Ole; Timm, Ingo J.
[Journal Article]


Zur Qualität KI-generierter Selbstlerneinheiten
Enzmann, Matthias; Selzer, Annika; Stummer, Sarah
[Journal Article]


Die Produktidentität per digitalem Fingerabdruck sichern
Berchtold, Waldemar; Steinebach, Martin
[Journal Article]


KI-generierte Abbildungen von Kindesmissbrauch. Technische Grundlagen und rechtliche Einordnung
Steinebach, Martin; Hunter, Julian; Schröder, Lily
[Journal Article]


Explainable Deepfake Detection across Different Modalities: An Overview of Methods and Challenges
Momin, MD Sarfaraz; Sufian, Abu; Barman, Debaditya; Leo, Marco; Distante, Cosimo; Damer, Naser
[Journal Article]


Improving Version Detection for JAB Codes
Bugert, Simon; Frühwein, Marco; Berchtold, Waldemar; Riedel, Ann-Katrin; Heeger, Julian
International Symposium on Electronic Imaging 2025
[Journal Article]


Cooking Spiders: Efficient OSINT with Chefs and Recipes
Yannikos, York; Agel, Marc Leon; Heeger, Julian; Bugert, Simon
International Symposium on Electronic Imaging 2025
[Journal Article]


Cybertraining auf einer Cyber Range
Schneider, Markus; Dexheimer, Thomas; Heftrig, Elias; Dukanovic, Sinisa
[Journal Article]


Robustness of Reverse Image Search Engines in the Era of AI-generated Media
Frick, Raphael; Stein, Felix; Wallrabenstein, Katharina Anja; Zmudzinski, Sascha
International Symposium on Electronic Imaging 2025
[Journal Article]


Detecting Voice Cloning and Text to Speech Audio in Real Time on Mobile Devices
Berchtold, Waldemar; Heeger, Julian; Bugert, Simon; Steinebach, Martin
International Symposium on Electronic Imaging 2025
[Journal Article]