Face verification robustness & camera-subject distance
Berthe, Benoit; Croll, Christian; Henniger, Olaf
[Journal Article]

Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead
Asokan, N.; Miettinen, Markus
Computer Communications
[Journal Article]

Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Gerber, Nina; Gerber, Paul; Volkamer, Melanie
Computers & Security, p.226-261
[Journal Article]

Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]

SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]

Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]

Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]

Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]

General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.13, p.1406-1420
[Journal Article]

Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
[Journal Article]

Ethical guidelines for nudging in information security & privacy
Renaud, Karen; Zimmermann, Verena
International Journal of Human-Computer Studies (IJHCS), p.22-35
[Journal Article]

Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), p.680-685
[Journal Article]

Guidelines For Ethical Nudging in Password Authentication
Renaud, Karen; Zimmermann, Verena
South African Institute Of Electrical Engineers (SAIEE), p.102-118
[Journal Article]

Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards
Heidt, Margareta
European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
[Journal Article]

When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Dessouky, Ghada; Gens, David; Haney, Patrick; Persyn, Garrett; Kanuparthi, Arun K.; Khattri, Hareesh; Fung, Jason M.; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
Cryptography and Security
[Journal Article]

Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines
Kaufhold, Marc-André; Gizikis, Alexis; Reuter, Christian; Habdank, Matthias; Grinko, Margarita
Journal of Contingencies and Crisis Management (JCCM), p.198-213
[Journal Article]

A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Gil Dantas, Yuri; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Journal Article]

Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
Riebe, Thea; Nordmann, Alfred; Reuter, Christian
Wissenschaft & Frieden, p.60-61
[Journal Article]

Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.v-viii
[Journal Article]

Human-computer interaction and social media in safety-critical Systems – Editorial
Reuter, Christian; Mentler, Tilo
Journal of Contingencies and Crisis Management (JCCM), p.2-3
[Journal Article]

Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Spielhofer, Thomas
Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, p.64-66
[Journal Article]

Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail
Reuter, Christian; Leopold, Inken
Media in Action: An Interdisciplinary Journal on Cooperative Media, p.99-134
[Journal Article]

Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
BBK Bevölkerungsschutz, p.22-24
[Journal Article]

Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics
Reuter, Christian; Kaufhold, Marc-André
Journal of Contingencies and Crisis Management (JCCM), p.41-57
[Journal Article]

Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research
Reuter, Christian; Hughes, Amanda Lee; Kaufhold, Marc-André
International Journal on Human-Computer Interaction (IJHCI), p.280-294
[Journal Article]

Editorial of the Special Issue on Social Media in Crisis Management
Reuter, Christian; Hughes, Amanda Lee; Hiltz, Starr Roxanne; Imran, Muhammad; Plotnick, Linda
International Journal on Human-Computer Interaction (IJHCI), p.277-279
[Journal Article]

Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.1-19
[Journal Article]

A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas
Journal of Mathematical Cryptology (JMC)
[Journal Article]

M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
[Report, Journal Article]