Publikationen

Publikationen

Zur Benutzbarkeit und Verwendung von API-Dokumentationen
R. Huesmann and A. Zeier and A. Heinemann and A. Wiesmaier
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Dimitrios Tsilimantos and Stefan Valentin and Tobias Hoßfeld
NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, p.1–9
[Conference Proceedings]


Post-Quantum Secure Boot
Vinay B. Y. Kumar and Naina Gupta and Anupam Chattopadhyay and Michael Kasper and Christoph Krauß and Ruben Niederhagen
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]


SEPAD - Security Evaluation Platform for Autonomous Driving
Daniel Zelle and Roland Rieke and Christian Plappert and Christoph Krauß and Dmitry Levshun and Andrey Chechulin
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]


Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]


Securing Electric Vehicle Charging Systems through Component Binding
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]


HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova and Ronald Heddergott
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Security Analysis of Automotive Protocols
Timm Lauser and Daniel Zelle and Christoph Krauß
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Rolf Huesmann and Alexander Zeier and Andreas Heinemann and Alexander Wiesmaier
Mensch & Computer Workshopband
[Conference Proceedings]


SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
M. Vitek and A. Das and Y. Pourcenoux and A. Missler and C. Paumier and S. Das and I. De Ghosh and D. R. Lucio and L. A. Zanlorensi Jr. and D. Menotti and F. Boutros and N. Damer and J. H. Grebe and A. Kuijper and J. Hu and Y. He and C. Wang and H. Liu and Y. Wang and Z. Sun and D. Osorio-Roig and C. Rathgeb and C. Busch and J. Tapia and A. Valenzuela and G. Zampoukis and L. Tsochatzidis and I. Pratikakis and S. Nathan and R. Suganya and V. Mehta and A. Dhall and K. Raja and G. Gupta and J. N. Khiarak and M. Akbari-Shahper and F. Jaryani and M. Asgari-Chenaghlu and R. Vyas and S. Dakshit and S. Dakshit and P. Peer and U. Pal and V. Struc
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–10
[Conference Proceedings]


Detection of Makeup Presentation Attacks based on Deep Face Representations
C. Rathgeb and P. Drozdowski and C. Busch
Proc. Int. Conf. on Pattern Recognition (ICPR), p.1–6
[Conference Proceedings]


Touchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Si­mu­la­tion of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
A. Mitkovski and J. Merkle and C. Rathgeb and B. Tams and K. Bernardo and N. E. Haryanto and C. Busch
Proc. of 2020 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]


Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection
J. Kolberg and A. C. Vasile and M. Gomez-Barrero and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–7
[Conference Proceedings]


Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption
J. Kolberg and P. Drozdowski and M. Gomez-Barrero and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


Texture-based Presentation Attack Detection for Automatic Speaker Verification
L. J. Gonzalez-Soler and J. Patino and M. Gomez-Barrero and M. Todisco and C. Busch and N. Evans
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]


Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2020), p.1–11
[Conference Proceedings]


Can Generative Colourisation Help Face Recognition?
P. Drozdowski and D. Fischer and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.299–307
[Conference Proceedings]


Demographic Bias: A Challenge for Fingervein Recognition Systems?
P. Drozdowski and B. Prommegger and G. Wimmer and R. Schraml and C. Rathgeb and A. Uhl and C. Busch
European Signal Processing Conf. (EUSIPCO), p.825–829
[Conference Proceedings]


Plastic Surgery: An Obstacle for Deep Face Recognition?
C. Rathgeb and D. Dogan and F. Stockhardt and M. De Marsico and C. Busch
Proc. 15th IEEE Computer Society Workshop on Biometrics (CVPRW), p.806–807
[Conference Proceedings]


Vulnerability Assessment and Detection of Makeup Presentation Attacks
C. Rathgeb and P. Drozdowski and D. Fischer and C. Busch
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
P. Bauspieß and J. Kolberg and D. Demmler and J. Krämer and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]


Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
Campos, Fabio and Kannwischer, Matthias J and Meyer, Michael and Onuki, Hiroshi and Stöttinger, Marc
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), p.57–65
[Conference Proceedings]


Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Campos, Fabio and Jellema, Lars and Lemmen, Mauk and Müller, Lars and Sprenkels, Amber and Viguier, Benoit
International Conference on Cryptology and Network Security (CANS), p.526–545
[Conference Proceedings]


LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Campos, Fabio and Kohlstadt, Tim and Reith, Steffen and Stöttinger, Marc
International Conference on Cryptology in Africa (AFRICACRYPT), p.258–277
[Conference Proceedings]


A Characterization of Data Exchange between Visual Analytics Tools
Nonnemann, Lars; Schumann, Heidrun; Urban, Bodo; Aehnelt, Mario; Schulz, Hans-Jörg
International Conference Information Visualisation (IV) 2020
[Conference Paper]


Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK
Oesch, Sean; Abu-Salma, Ruba; Krämer, Juliane; Wu, Justin; Diallo, Oumar; Ruoti, Scott
Annual Computer Security Applications Conference (ACSAC 2020)
[Conference Proceedings]