Publikationen
Publikationen
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]
Datenschutzsensibilisierung - Mit Kindern spielerisch ins Gespräch über die Wichtigkeit des Datenschutzes kommen
Appelt, Dominik; Geissler, Ines
[Journal Article]
FRCSyn-onGoing: Benchmarking and Comprehensive Evaluation of Real and Synthetic Data to Improve Face Recognition Systems
Melzi, Pietro; Tolosana, Ruben; Vera-Rodriguez, Ruben; Minchul, Kim; Rathgeb, Christian; Liu, Xiaoming; DeAndres-Tame, Ivan; Morales , Aythami; Fierrez, Julian; Ortega Heras, Javier; Zhao, Weisong; Zhu, Xiangyu; Yan, Zheyu; Zhang, Xiao-Yu; Wu, Jinlin; Lei, Zhen; Tripathi, Suvidha; Kothari, Mahak; Zama, Md Haider; Deb, Debayan; Biesseck, Bernardo; Vidal, Pedro; Granada, Roger; Fickel, Guilherme; Führ, Gustavo; Menotti, David; Unnervik, Alexander; George, Anjith; Ecabert, Christophe; Shahreza, Hatef Otroshi; Rahimi, Parsa; Marcel, Sébastien; Sarridis, Ioannis; Koutlis, Christos; Baltsou, Georgia; Papadopoulos, Symeon; Diou, Christos; Domenico, Nicolò Di; Borghi, Guido; Pellegrini, Lorenzo; Mas, Enrique; Sánchez-Pérez, Ángela; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Boutros, Fadi; Damer, Naser
[Journal Article]
SFace2: Synthetic-Based Face Recognition with w-Space Identity-Driven Sampling
Boutros, Fadi; Huber, Marco; Luu, Anh Thi; Siebke, Patrick; Damer, Naser
[Journal Article]
Precisely Extracting Complex Variable Values from Android Apps
Miltenberger, Marc; Arzt, Steven
[Journal Article]
Automatic data-driven design and 3D printing of custom ocular prostheses
Reinhard, Johann; Urban, Philipp; Bell, Stephen; Carpenter, David; Sagoo, Mandeep S.
[Journal Article]
A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field
Khodadoust, Javad; Monroy, Raúl; Medina-Pérez, Miguel Angel; Loyola-González, Octavio; Kusakunniran, Worapan; Boller, Andre; Terhörst, Philipp
[Journal Article]
Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]
GAAlign: Robust Sampling-Based Point Cloud Registration Using Geometric Algebra
Neumann, Kai; Hildenbrand, Dietmar; Stock, Florian; Steinmetz, Christian; Michel, Maximilian
International Conference on Advanced Computational Applications of Geometric Algebra 2022
[Conference Paper]
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Vincenzi, Marco de; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel
[Journal Article]
Keystroke Verification Challenge (KVC): Biometric and Fairness Benchmark Evaluation
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales , Aythami; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier
[Journal Article]
Ubiquitous Multi-Occupant Detection in Smart Environments
Fährmann, Daniel; Boutros, Fadi; Kubon, Philipp; Kirchbuchner, Florian; Kuijper, Arjan; Damer, Naser
[Journal Article]
Short-term predictor for COVID-19 severity from a longitudinal multi-omics study for practical application in intensive care units
Kugler, Sabine; Hahnefeld, Lisa; Kloka, Jan Andreas; Ginzel, Sebastian; Nürenberg-Goloub, Elena; Zinn, Sebastian; Vehrenschild, Maria; Zacharowski, Kai; Lindau, Simone; Ulrich, Evelyn; Burmeister, Jan; Kohlhammer, Jörn; Schwäble, Joachim; Gurke, Robert; Dorochow, Erika; Bennett, Alexandre; Dauth, Stephanie; Campe, Julia; Knape, Tilo; Laux, Volker; Kannt, Aimo; Köhm, Michaela; Geisslinger, Gerd; Resch, Eduard; Behrens, Frank
[Journal Article]
Fairness in Face Presentation Attack Detection
Fang, Meiling; Yang, Wufei; Kuijper, Arjan; S̆truc, Vitomir; Damer, Naser
[Journal Article]
Migrating Monolithic Applications to Function as a Service
Würz, Hendrik Martin; Krämer, Michel; Kaster, Marvin; Kuijper, Arjan
[Journal Article]
Roles of data protection in metaverses and in virtual survival: From data subjects to processors to those responsible Datenschutzrechtliche rollen in metaversen und im virtuellen weiterleben
Geissler, Ines
2023 Designing Futures: Zukunfte gestalten, INFORMATIK 2023 - 2023 Designing Futures: Shaping the Future, INFORMATIK 2023
[Conference Paper]
Post pandemic follow-up
Selzer, Annika; Timm, Ingo J.
2023 Designing Futures: Zukunfte gestalten, INFORMATIK 2023 - 2023 Designing Futures: Shaping the Future, INFORMATIK 2023
[Conference Paper]
The planned US Active Cyber Defense Certainty Act: A role model for Germany? Der geplante us active cyber defense certainty act
Kriegel, Jessica; Boll, Alina
2023 Designing Futures: Zukunfte gestalten, INFORMATIK 2023 - 2023 Designing Futures: Shaping the Future, INFORMATIK 2023
[Conference Paper]
Law and technology - Data protection in discourse Recht und Technik Datenschutz im Diskurs
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Genannt Döhmann, Indra Spiecker
2023 Designing Futures: Zukunfte gestalten, INFORMATIK 2023 - 2023 Designing Futures: Shaping the Future, INFORMATIK 2023
[Conference Paper]
Fraunhofer SIT at CheckThat! 2023: Can LLMs Be Used for Data Augmentation & Few-Shot Classification? Detecting Subjectivity in Text Using ChatGPT
Frick, Raphael Antonius
24th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF-WN 2023
[Conference Paper]
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
32nd USENIX Security Symposium (USENIX Security 23), p.7429-7444
[Conference Proceedings]
Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Hlavacek, Tomas; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
32nd USENIX Security Symposium (USENIX Security 23), p.4841-4858
[Conference Proceedings]
Poster: Off-Path DNSSEC Downgrade Attacks
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Proceedings of the ACM SIGCOMM 2023 Conference, p.1120-1122
[Conference Proceedings]
Poster: LeMon: Global Route Leak Monitoring Service
Schulmann, Haya; Zhao, Shujie
Proceedings of the ACM SIGCOMM 2023 Conference, p.1111-1113
[Conference Proceedings]
Beyond Limits: How to Disable Validators in Secure Networks
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the ACM SIGCOMM 2023 Conference, p.950-966
[Conference Proceedings]
Poster: Longitudinal Analysis of DoS Attacks
Kaiser, Fabian; Schulmann, Haya; Waidner, Michael
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3573-3575
[Conference Proceedings]
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
Proceedings of the ACM on Networking (PACMNET), Vol.1, p.1-26
[Journal Article]
Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
Datenschutz und Datensicherheit, Vol.47, p.497-502
[Journal Article]
Crypto-Agile Design and Testbed for QKD-Networks
Henrich, Johanna; Heinemann, Andreas; Stiemerling, Martin; Seidl, Fabian
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, p.191–192
[Conference Proceedings]


