Publikationen

Publikationen

Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]


Language Support for Secure Software Development with Enclaves
Oak, Aditya; Ahmadian, Amir M.; Balliu, Musard; Salvaneschi, Guido
34th IEEE Computer Security Foundations Symposium (CSF 2021)
[Conference Proceedings]


Privacy - Preserving Clustering
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Hossein
32. Kryptotag - crypto day matters
[Conference Proceedings]


Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
30th USENIX Security Symposium
[Conference Proceedings]


DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20)
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signature
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]


Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021)
[Conference Proceedings]


Trusted Configuration in Cloud FPGAs
Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
[Conference Proceedings]


Two-Party Adaptor Signatures From Identification Schemes
Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
[Conference Proceedings]


Bitcoin-Compatible Virtual Channels
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]


Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
Public-Key Cryptography - PKC 2021, p.205-234
[Conference Proceedings]


HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
[Conference Proceedings]


ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security 21), p.2165-2182
[Conference Proceedings]


All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
[Conference Proceedings]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
R. Huesmann and A. Zeier and A. Heinemann and A. Wiesmaier
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Dimitrios Tsilimantos and Stefan Valentin and Tobias Hoßfeld
NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020, p.1–9
[Conference Proceedings]


Post-Quantum Secure Boot
Vinay B. Y. Kumar and Naina Gupta and Anupam Chattopadhyay and Michael Kasper and Christoph Krauß and Ruben Niederhagen
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]


SEPAD - Security Evaluation Platform for Autonomous Driving
Daniel Zelle and Roland Rieke and Christian Plappert and Christoph Krauß and Dmitry Levshun and Andrey Chechulin
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]


Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]


Securing Electric Vehicle Charging Systems through Component Binding
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]


HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova and Ronald Heddergott
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Security Analysis of Automotive Protocols
Timm Lauser and Daniel Zelle and Christoph Krauß
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]


Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Rolf Huesmann and Alexander Zeier and Andreas Heinemann and Alexander Wiesmaier
Mensch & Computer Workshopband
[Conference Proceedings]


SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
M. Vitek and A. Das and Y. Pourcenoux and A. Missler and C. Paumier and S. Das and I. De Ghosh and D. R. Lucio and L. A. Zanlorensi Jr. and D. Menotti and F. Boutros and N. Damer and J. H. Grebe and A. Kuijper and J. Hu and Y. He and C. Wang and H. Liu and Y. Wang and Z. Sun and D. Osorio-Roig and C. Rathgeb and C. Busch and J. Tapia and A. Valenzuela and G. Zampoukis and L. Tsochatzidis and I. Pratikakis and S. Nathan and R. Suganya and V. Mehta and A. Dhall and K. Raja and G. Gupta and J. N. Khiarak and M. Akbari-Shahper and F. Jaryani and M. Asgari-Chenaghlu and R. Vyas and S. Dakshit and S. Dakshit and P. Peer and U. Pal and V. Struc
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–10
[Conference Proceedings]


Detection of Makeup Presentation Attacks based on Deep Face Representations
C. Rathgeb and P. Drozdowski and C. Busch
Proc. Int. Conf. on Pattern Recognition (ICPR), p.1–6
[Conference Proceedings]


Touchless Fingerprint Sample Quality: Prerequisites for the Applicability of NFIQ2.0
J. Priesnitz and C. Rathgeb and N. Buchmann and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Si­mu­la­tion of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks
A. Mitkovski and J. Merkle and C. Rathgeb and B. Tams and K. Bernardo and N. E. Haryanto and C. Busch
Proc. of 2020 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–8
[Conference Proceedings]


Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection
J. Kolberg and A. C. Vasile and M. Gomez-Barrero and C. Busch
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–7
[Conference Proceedings]