Publikationen
Publikationen
API Usability of Stateful Signature Schemes
Alexander Zeier and
Alexander Wiesmaier and
Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]
Phishing Attack Recognition by End-Users: Concepts for URL Visualization
and Implementation
Vivian Ives Philipp Erbenich and
Daniel Träder and
Andreas Heinemann and
Meltem Nural
HAISA, p.179–188
[Conference Proceedings]
Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]
Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]
On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
L. J. González-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]
Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
M. Gomez-Barrero and J. Kolberg and C. Busch
Proc. Int. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]
Multi-Spectral Convolutional Neural Networks for Biometric Presentation Attack Detection
M. Gomez-Barrero and C. Busch
Proc. of the Norwegian Information Security Conf. (NISC)
[Conference Proceedings]
Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
P. Drozdowski and C. Rathgeb and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1–5
[Conference Proceedings]
On the Application of Homomorphic Encryption to Face Identification
P. Drozdowski and N. Buchmann and C. Rathgeb and M. Margraf and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
L. Debiasi and N. Damer and A. Moseguí-Saladié and C. Rathgeb and U. Scherhag and C. Busch and F. Kirchbuchner and A. Uhl
Image Analysis and Processing (ICIAP), p.345–356
[Conference Proceedings]
On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH
Meyer, Michael and Campos, Fabio and Reith, Steffen
International Conference on Post-Quantum Cryptography (PQCrypto), p.307–325
[Conference Proceedings]
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control
Systems
Henk Birkholz and Christoph Krauß and Maria Zhdanova and Don Kuzhiyelil and Tolga Arul and Markus Heinrich
and Stefan Katzenbeisser and Neeraj Suri and Tsvetoslava Vateva-Gurova and Christian Schlehuber
4th International Workshop on MILS: Architecture and Assurance for Secure Systems, (MILS@DSN 2018)
[Conference Proceedings]
Anonymous Charging and Billing of Electric Vehicles
Daniel Zelle and Markus Springer and Maria Zhdanova and Christoph Krauß
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES, p.22:1–22:10
[Conference Proceedings]
The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Jonas Walter and Bettina Abendroth and Thilo Von Pape and Christian Plappert and Daniel Zelle and Christoph
Krauß and Gundula Gagzow and Hendrik Decke
Proceedings of the 13th International Conference on Availability, Reliability and
Security ARES, p.24:1–24:10
[Conference Proceedings]
Open Source Value Chains for Addressing Security Issues Efficiently
Arnd Weber and Steffen Reith and Dirk Kuhlmann and Michael Kasper and Jean-Pierre Seifert and Christoph
Krauß
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599–606
[Conference Proceedings]
Auf dem Weg zu sicheren abgeleiteten Identitäten mit Payment
Service Directive 2
Daniel Träder and
Alexander Zeier and
Andreas Heinemann
Sicherheit, p.183–196
[Conference Proceedings]
Towards Fingerprint Presentation Attack Detection Based on Convolutional Neural Networks and Short Wave Infrared Imaging
R. Tolosana and M. Gomez-Barrero and J. Kolberg and A. Morales and C. Busch and J. Ortega-Garcia
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]
Sex-Prediction from Periocular Images across Multiple Sensors and Spectra
J. Tapia and C. Rathgeb and C. Busch
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1–7
[Conference Proceedings]
Multi-spectral Iris Segmentation in Visible Wavelengths
T. Schlett and C. Rathgeb and C. Busch
Intl. Conf. on Biometrics (ICB'18), p.1–5
[Conference Proceedings]
Performance Variation of Morphed Face Image Detection Algorithms across different Datasets
U. Scherhag and C. Rathgeb and C. Busch
6th Intl. Workshop on Biometrics and Forensics, p.1–6
[Conference Proceedings]
Morph detection from single face images: a multi-algorithm fusion approach
U. Scherhag and C. Rathgeb and C. Busch
Intl. Conf. on Biometric Engineering and Applications 2018 (ICBEA), p.1–7
[Conference Proceedings]
Towards detection of morphed face images in electronic travel documents
U. Scherhag and C. Rathgeb and C. Busch
13th IAPR Workshop on Document Analysis Systems (DAS), p.1–6
[Conference Proceedings]
Detecting Morphed Face Images Using Facial Landmarks
U. Scherhag and D. Budhrani and M. Gomez-Barrero and C. Busch
Intl. Conf. on Image and Signal Processing (ICISP)
[Conference Proceedings]
Multi-sample Compression of Iris Images using High Efficiency Video Coding
C. Rathgeb and T. Schlett and N. Buchmann and H. Baier and C. Busch
Intl. Conf. on Biometrics (ICB'18), p.1–6
[Conference Proceedings]
Visible Wavelength Iris Segmentation: A Multi-Class Approach using Fully Convolutional Neuronal Networks
D. Osorio-Roig and C. Rathgeb and M. Gomez-Barrero and A. Morales-Gonzalez and E. Garea-Llano and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
D. Osorio-Roig and P. Drozdowski and C. Rathgeb and A. Morales-González and E. Garea-Llano and C. Busch
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1–6
[Conference Proceedings]
Towards Multi-Modal Finger Presentation Attack Detection
M. Gomez-Barrero and J. Kolberg and C. Busch
Proc. UBIO, p.547–552
[Conference Proceedings]
Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures
P. Drozdowski and S. Garg and C. Rathgeb and M. Gomez-Barrero and D. Chang and C. Busch
European Signal Processing Conf. (EUSIPCO), p.1–5
[Conference Proceedings]
Database Binning and Retrieval in Multi-Fingerprint Identification Systems
P. Drozdowski and D. Fischer and C. Rathgeb and C. Schiel and C. Busch
Intl. Workshop on Information Forensics and Security (WIFS), p.1–7
[Conference Proceedings]
Detection of Glasses in Near-infrared Ocular Images
P. Drozdowski and F. Struck and C. Rathgeb and C. Busch
Intl. Conf. on Biometrics (ICB), p.1–7
[Conference Proceedings]


