Publikationen

Publikationen

Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles
Kohnhäuser, Florian; Püllen, Dominik; Katzenbeisser, Stefan
IEEE Workshop on the Internet of Safe Things
[Journal Article]


Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset
Zimmermann, Verena; Renaud, Karen
International Journal of Human-Computer Studies
[Journal Article]


The Status of Quantum-Based Long-Term Secure Communication over the Internet
Geihs, Matthias; Nikiforov, Oleg; Demirel, Denise; Sauer, Alexander; Butin, Denis; Günther, Felix; Alber, Gernot; Walther, Thomas; Buchmann, Johannes
IEEE Transactions on Sustainable Computing
[Journal Article]


Sichere Instant Messaging Apps
Brendel, Jacqueline; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.276-280
[Journal Article]


AUDI: Towards Autonomous IoT Device-Type Identification
Marchal, Samuel; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Asokan, N.
IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
[Journal Article]


Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden
[Journal Article]


SoK: Modular and Efficient Private Decision Tree Evaluation
Kiss, Ágnes; Naderpour, Masoud; Liu, Jian; Asokan, N.; Schneider, Thomas
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Journal Article]


RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units
Reuter, Christian; Ludwig, Thomas; Mischur, Patrick
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), p.209-246
[Journal Article]


Face verification robustness & camera-subject distance
Berthe, Benoit; Croll, Christian; Henniger, Olaf
[Journal Article]


Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead
Asokan, N.; Miettinen, Markus
Computer Communications
[Journal Article]


Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Gerber, Nina; Gerber, Paul; Volkamer, Melanie
Computers & Security, p.226-261
[Journal Article]


Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Datenschutz und Datensicherheit, Vol.42, p.291-293
[Journal Article]


SIFT-based iris recognition revisited: prerequisites, advantages and improvements
Rathgeb, C.; Wagner, J.; Busch, C.
Pattern Analysis and Applications
[Journal Article]


Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.
Procs. Speaker Odyssey, p.16-23
[Journal Article]


Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging
Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H.
Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-6
[Journal Article]


Predicting the vulnerability of biometric systems to attacks based on morphed biometric information
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, Ulrich; Busch, C.
IET Biometrics, Vol.7, p.333-341
[Journal Article]


Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]


General Framework to Evaluate Unlinkability in Biometric Template Protection Systems
Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C.
IEEE Trans. on Information Forensics and Security, Vol.13, p.1406-1420
[Journal Article]


Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
[Journal Article]


Ethical guidelines for nudging in information security & privacy
Renaud, Karen; Zimmermann, Verena
International Journal of Human-Computer Studies (IJHCS), p.22-35
[Journal Article]


Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), p.680-685
[Journal Article]


Guidelines For Ethical Nudging in Password Authentication
Renaud, Karen; Zimmermann, Verena
South African Institute Of Electrical Engineers (SAIEE), p.102-118
[Journal Article]


Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards
Heidt, Margareta
European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
[Journal Article]


When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Dessouky, Ghada; Gens, David; Haney, Patrick; Persyn, Garrett; Kanuparthi, Arun K.; Khattri, Hareesh; Fung, Jason M.; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan
Cryptography and Security
[Journal Article]


Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines
Kaufhold, Marc-André; Gizikis, Alexis; Reuter, Christian; Habdank, Matthias; Grinko, Margarita
Journal of Contingencies and Crisis Management (JCCM), p.198-213
[Journal Article]


A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Gil Dantas, Yuri; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Journal Article]


Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
Riebe, Thea; Nordmann, Alfred; Reuter, Christian
Wissenschaft & Frieden, p.60-61
[Journal Article]


Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.v-viii
[Journal Article]


Human-computer interaction and social media in safety-critical Systems – Editorial
Reuter, Christian; Mentler, Tilo
Journal of Contingencies and Crisis Management (JCCM), p.2-3
[Journal Article]


Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Spielhofer, Thomas
Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, p.64-66
[Journal Article]