Publikationen
Publikationen
Special issue ESORICS 2021
Elisa Bertino and Haya Schulmann and Michael Waidner
Journal of Computer Security, Vol.30, p.753–755
[Journal Article]
Efficient Practical Byzantine Consensus Using Random Linear Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi
Springer Annals of Telecommunications (Journal), Vol.78, p.33–51
[Journal Article]
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering
Daniel Zelle and Christian Plappert and Roland Rieke and Dirk Scheuermann and Christoph Krauß
Microprocessors and Microsystems, Vol.90, p.104461
[Journal Article]
Integrating Privacy into the Electric Vehicle Charging Architecture
Dustin Kern and Timm Lauser and Christoph Krauß
Proceedings on Privacy Enhancing Technologies, Vol.2022, p.140-158
[Journal Article]
Towards a maturity model for crypto-agility assessment
Julian Hohm and
Andreas Heinemann and
Alexander Wiesmaier
CoRR, Vol.abs/2202.07645
[Journal Article]
Selfie Periocular Verification using an Efficient Super-Resolution Approach
J. Tapia and A. Valenzuela and R. Lara and M. Gomez-Barrero and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Analysis of the synthetic periocular iris images for robust Presentation Attacks Detection algorithms
J. Maureira and J. Tapia and C. Arellano, C. Busch
IET Biometrics, Vol.n/a, p.1–12
[Journal Article]
A novel Capsule Neural Network based model for drowsiness detection using electroencephalography signals
L. Guarda and J. Tapia and E. Lopez-Droguett and M. Ramos
Expert Systems with Applications, Vol.201, p.116977
[Journal Article]
Reliable detection of doppelgängers based on deep face representations
C. Rathgeb and D. Fischer and P. Drozdowski and C. Busch
IET Biometrics, Vol.11, p.215–224
[Journal Article]
Demographic fairness in biometric systems: What do the experts say?
C. Rathgeb and P. Drozdowski and D. C. Frings and N. Damer and C. Busch
IEEE Technology and Society Magazine, Vol.41, p.71–82
[Journal Article]
Deep face fuzzy vault: Implementation and performance
C. Rathgeb and J. Merkle and J. Scholz and B. Tams and V. Nesterowicz
Computers & Security
[Journal Article]
SynCoLFinGer: Synthetic contactless fingerprint generator
Jannis Priesnitz and Christian Rathgeb and Nicolas Buchmann and Christoph Busch
Pattern Recognition Letters, Vol.157, p.127–134
[Journal Article]
Mobile Contactless Fingerprint Presentation Attack Detection: Generalizability and Explainability
J. Priesnitz and R. Casula and J. Kolberg and M. Fang and A. Madhu and C. Rathgeb and G. L. Marcialis and N. Damer and C. Busch
IEEE Trans. on Biometrics, Behavior, and Identity Science (TBIOM), p.1–14
[Journal Article]
MCLFIQ: Mobile Contactless Fingerprint Image Quality
J. Priesnitz and A. Weißenfeld and L. Ruzicka and C. Rathgeb and B. Strobl and R. Lessmann and C. Busch
IEEE Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.6, p.272–287
[Journal Article]
Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
J. Priesnitz and R. Huesmann and C. Rathgeb and N. Buchmann and C. Busch
MDPI Intelligent Sensors
[Journal Article]
An Attack on Facial Soft-biometric Privacy Enhancement
D. Osorio-Roig and C. Rathgeb and P Drozdowski and P. Terhörst and V. Štruc and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.4, p.263–275
[Journal Article]
Psychophysical Evaluation of Human Performance in Detecting Digital Face Image Manipulations
R. Nichols and C. Rathgeb and P. Drozdowski and C. Busch
IEEE Access, Vol.10, p.31359–31376
[Journal Article]
Face Beneath the Ink: Synthetic Data and Tattoo Removal with Application to Face Recognition
M. Ibsen and C. Rathgeb and P. Drozdowski and C. Busch
Applied Sciences, Vol.12
[Journal Article]
Biometrics in the Era of COVID-19: Challenges and Opportunities
M. Gomez-Barrero and P. Drozdowski and C. Rathgeb and others
Trans. on Technology and Society (TTS)
[Journal Article]
Signal-level fusion for indexing and retrieval of facial biometric data
P. Drozdowski and F. Stockhardt and C. Rathgeb and C. Busch
IET Biometrics, Vol.11, p.1–16
[Journal Article]
Fun Selfie Filters in Face Recognition: Impact Assessment and Removal
C. Botezatu and M. Ibsen and C. Rathgeb and C. Busch
IEEE Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.5, p.91–104
[Journal Article]
Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption with Keyword Search
P. Bauspieß and J. Kolberg and P. Drozdowski and C. Rathgeb and C. Busch
IEEE Trans. on Industrial Informatics
[Journal Article]
Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
Schmid, Stefka; Riebe, Thea; Reuter, Christian
Science and Engineering Ethics
[Journal Article]
LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
Kuntke, Franz; Romanenko, Vladimir; Linsner, Sebastian; Steinbrink, Enno; Reuter, Christian
Transactions on Emerging Telecommunications Technologies
[Journal Article]
Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
Reinhold, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.226-239
[Journal Article]
Zwischen Destabilisierung und der Ermöglichung von Resilienz: Perspektiven aus den Technikwissenschaften, den Sozialwissenschaften und den Rechtswissenschaften
Reuter, Christian; Göttsche, Malte; Frieß, Friederike; Thielbörger, Pierre; Vüllers, Johannes
Die Friedens-Warte : journal of international peace and organization, p.241-243
[Journal Article]
Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
Schmid, Stefka
Die Friedens-Warte : journal of international peace and organization, p.290-315
[Journal Article]
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
Reuter, Christian; Lo Iacono, Luigi; Benlian, Alexander
Behaviour & Information Technology, p.2035-2048
[Journal Article]
U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, p.39-65
[Journal Article]
Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
Zeitschrift für Friedens- und Konfliktforschung, p.129-140
[Journal Article]


