Publikationen

Publikationen

SEPAD - Security Evaluation Platform for Autonomous Driving
Daniel Zelle and Roland Rieke and Christian Plappert and Christoph Krauß and Dmitry Levshun and Andrey Chechulin
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]


Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]


Securing Electric Vehicle Charging Systems through Component Binding
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]


HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova and Ronald Heddergott
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Security Analysis of Automotive Protocols
Timm Lauser and Daniel Zelle and Christoph Krauß
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Rolf Huesmann and Alexander Zeier and Andreas Heinemann and Alexander Wiesmaier
Mensch & Computer Workshopband
[Conference Proceedings]


SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
M. Vitek and A. Das and Y. Pourcenoux and A. Missler and C. Paumier and S. Das and I. De Ghosh and D. R. Lucio and L. A. Zanlorensi Jr. and D. Menotti and F. Boutros and N. Damer and J. H. Grebe and A. Kuijper and J. Hu and Y. He and C. Wang and H. Liu and Y. Wang and Z. Sun and D. Osorio-Roig and C. Rathgeb and C. Busch and J. Tapia and A. Valenzuela and G. Zampoukis and L. Tsochatzidis and I. Pratikakis and S. Nathan and R. Suganya and V. Mehta and A. Dhall and K. Raja and G. Gupta and J. N. Khiarak and M. Akbari-Shahper and F. Jaryani and M. Asgari-Chenaghlu and R. Vyas and S. Dakshit and S. Dakshit and P. Peer and U. Pal and V. Struc
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–10
[Conference Proceedings]


Detection of Makeup Presentation Attacks based on Deep Face Representations
C. Rathgeb and P. Drozdowski and C. Busch
Proc. Int. Conf. on Pattern Recognition (ICPR), p.1–6
[Conference Proceedings]


Touchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Si­mu­la­tion of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
A. Mitkovski and J. Merkle and C. Rathgeb and B. Tams and K. Bernardo and N. E. Haryanto and C. Busch
Proc. of 2020 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]


Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection
J. Kolberg and A. C. Vasile and M. Gomez-Barrero and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–7
[Conference Proceedings]


Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption
J. Kolberg and P. Drozdowski and M. Gomez-Barrero and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]


Texture-based Presentation Attack Detection for Automatic Speaker Verification
L. J. Gonzalez-Soler and J. Patino and M. Gomez-Barrero and M. Todisco and C. Busch and N. Evans
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]


Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
Norwegian Information Security Conf. (NISK)
[Conference Proceedings]


Fisher Vector Encoding of Dense-BSIF Features for Unknown Face Presentation Attack Detection
L. J. Gonzalez-Soler and M. Gomez-Barrero and C. Busch
Proc. Intl. Conf. of the Special Interest Group on Biometrics (BIOSIG 2020), p.1–11
[Conference Proceedings]


Can Generative Colourisation Help Face Recognition?
P. Drozdowski and D. Fischer and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.299–307
[Conference Proceedings]


Demographic Bias: A Challenge for Fingervein Recognition Systems?
P. Drozdowski and B. Prommegger and G. Wimmer and R. Schraml and C. Rathgeb and A. Uhl and C. Busch
European Signal Processing Conf. (EUSIPCO), p.825–829
[Conference Proceedings]


Plastic Surgery: An Obstacle for Deep Face Recognition?
C. Rathgeb and D. Dogan and F. Stockhardt and M. De Marsico and C. Busch
Proc. 15th IEEE Computer Society Workshop on Biometrics (CVPRW), p.806–807
[Conference Proceedings]


Vulnerability Assessment and Detection of Makeup Presentation Attacks
C. Rathgeb and P. Drozdowski and D. Fischer and C. Busch
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
P. Bauspieß and J. Kolberg and D. Demmler and J. Krämer and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]


Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
Campos, Fabio and Kannwischer, Matthias J and Meyer, Michael and Onuki, Hiroshi and Stöttinger, Marc
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), p.57–65
[Conference Proceedings]


Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Campos, Fabio and Jellema, Lars and Lemmen, Mauk and Müller, Lars and Sprenkels, Amber and Viguier, Benoit
International Conference on Cryptology and Network Security (CANS), p.526–545
[Conference Proceedings]


LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Campos, Fabio and Kohlstadt, Tim and Reith, Steffen and Stöttinger, Marc
International Conference on Cryptology in Africa (AFRICACRYPT), p.258–277
[Conference Proceedings]


API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]


Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and Albert Sunny and Liang Zhao and Eitan Altman and Dimitrios Tsilimantos and Francesco De Pellegrini and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
Rachid El Azouzi and Krishna V. Acharya and Sudheer Poojary and Albert Sunny and Majed Haddad and Eitan Altman and Dimitrios Tsilimantos and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


From click to playback: a dataset to study the response time of mobile YouTube
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Tobias Hoßfeld and Dimitrios Tsilimantos and Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys 2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]


Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Rolf Huesmann and Alexander Zeier and Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]