Publikationen

Publikationen

Datenschutzsensibilisierung - Mit Kindern spielerisch ins Gespräch über die Wichtigkeit des Datenschutzes kommen
Appelt, Dominik; Geissler, Ines
[Journal Article]


FRCSyn-onGoing: Benchmarking and Comprehensive Evaluation of Real and Synthetic Data to Improve Face Recognition Systems
Melzi, Pietro; Tolosana, Ruben; Vera-Rodriguez, Ruben; Minchul, Kim; Rathgeb, Christian; Liu, Xiaoming; DeAndres-Tame, Ivan; Morales , Aythami; Fierrez, Julian; Ortega Heras, Javier; Zhao, Weisong; Zhu, Xiangyu; Yan, Zheyu; Zhang, Xiao-Yu; Wu, Jinlin; Lei, Zhen; Tripathi, Suvidha; Kothari, Mahak; Zama, Md Haider; Deb, Debayan; Biesseck, Bernardo; Vidal, Pedro; Granada, Roger; Fickel, Guilherme; Führ, Gustavo; Menotti, David; Unnervik, Alexander; George, Anjith; Ecabert, Christophe; Shahreza, Hatef Otroshi; Rahimi, Parsa; Marcel, Sébastien; Sarridis, Ioannis; Koutlis, Christos; Baltsou, Georgia; Papadopoulos, Symeon; Diou, Christos; Domenico, Nicolò Di; Borghi, Guido; Pellegrini, Lorenzo; Mas, Enrique; Sánchez-Pérez, Ángela; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Boutros, Fadi; Damer, Naser
[Journal Article]


SFace2: Synthetic-Based Face Recognition with w-Space Identity-Driven Sampling
Boutros, Fadi; Huber, Marco; Luu, Anh Thi; Siebke, Patrick; Damer, Naser
[Journal Article]


Precisely Extracting Complex Variable Values from Android Apps
Miltenberger, Marc; Arzt, Steven
[Journal Article]


Automatic data-driven design and 3D printing of custom ocular prostheses
Reinhard, Johann; Urban, Philipp; Bell, Stephen; Carpenter, David; Sagoo, Mandeep S.
[Journal Article]


A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field
Khodadoust, Javad; Monroy, Raúl; Medina-Pérez, Miguel Angel; Loyola-González, Octavio; Kusakunniran, Worapan; Boller, Andre; Terhörst, Philipp
[Journal Article]


Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]


GAAlign: Robust Sampling-Based Point Cloud Registration Using Geometric Algebra
Neumann, Kai; Hildenbrand, Dietmar; Stock, Florian; Steinmetz, Christian; Michel, Maximilian
International Conference on Advanced Computational Applications of Geometric Algebra 2022
[Conference Paper]


A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]


A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Vincenzi, Marco de; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel
[Journal Article]


Keystroke Verification Challenge (KVC): Biometric and Fairness Benchmark Evaluation
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales , Aythami; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier
[Journal Article]


Ubiquitous Multi-Occupant Detection in Smart Environments
Fährmann, Daniel; Boutros, Fadi; Kubon, Philipp; Kirchbuchner, Florian; Kuijper, Arjan; Damer, Naser
[Journal Article]


Short-term predictor for COVID-19 severity from a longitudinal multi-omics study for practical application in intensive care units
Kugler, Sabine; Hahnefeld, Lisa; Kloka, Jan Andreas; Ginzel, Sebastian; Nürenberg-Goloub, Elena; Zinn, Sebastian; Vehrenschild, Maria; Zacharowski, Kai; Lindau, Simone; Ulrich, Evelyn; Burmeister, Jan; Kohlhammer, Jörn; Schwäble, Joachim; Gurke, Robert; Dorochow, Erika; Bennett, Alexandre; Dauth, Stephanie; Campe, Julia; Knape, Tilo; Laux, Volker; Kannt, Aimo; Köhm, Michaela; Geisslinger, Gerd; Resch, Eduard; Behrens, Frank
[Journal Article]


Fairness in Face Presentation Attack Detection
Fang, Meiling; Yang, Wufei; Kuijper, Arjan; S̆truc, Vitomir; Damer, Naser
[Journal Article]


Migrating Monolithic Applications to Function as a Service
Würz, Hendrik Martin; Krämer, Michel; Kaster, Marvin; Kuijper, Arjan
[Journal Article]


Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Elias Heftrig and Haya Schulmann and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.7429–7444
[Conference Proceedings]


Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Tomas Hlavacek and Haya Schulmann and Niklas Vogel and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.4841–4858
[Conference Proceedings]


Poster: Off-Path DNSSEC Downgrade Attacks
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.1120–1122
[Conference Proceedings]


Poster: LeMon: Global Route Leak Monitoring Service
Haya Schulmann and Shujie Zhao
Proceedings of the ACM SIGCOMM 2023 Conference, p.1111–1113
[Conference Proceedings]


Beyond Limits: How to Disable Validators in Secure Networks
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.950–966
[Conference Proceedings]


Poster: Longitudinal Analysis of DoS Attacks
Fabian Kaiser and Haya Schulmann and Michael Waidner
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3573–3575
[Conference Proceedings]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the ACM on Networking (PACMNET), Vol.1, p.26:1–26:20
[Journal Article]


Aktive Cyberabwehr
Haya Schulmann and Michael Waidner
Datenschutz und Datensicherheit, Vol.47, p.497–502
[Journal Article]


A Review of existing GDPR Solutions for Citizens and SMEs
E. Klinger and A. Wiesmaier and A. Heinemann


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
D. Kern and C. Krauß and T. Lauser and N. Alnahawi and A. Wiesmaier and R. Niederhagen
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, p.85–111
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
J. Hohm and A. Heinemann and A. Wiesmaier
15th International Symposium on Foundations & Practice of Security, p.104–119
[Conference Proceedings]


Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics
J. Henrich and A. Heinemann and A. Wiesmaier and N. Schmitt
Information Security Conference (ISC), p.267–287
[Conference Proceedings]


Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Matteo Varotto and Stefan Valentin and Stefano Tomasin
IEEE Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, p.160–165
[Conference Proceedings]


Detection of e-Mobility-based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph
53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference Proceedings]


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Kern, Dustin and Krauß, Christoph and Lauser, Timm and Alnahawi, Nouri and Wiesmaier, Alexander and Niederhagen, Ruben
21st International Conference on Applied Cryptography and Network Security (ACNS)
[Conference Proceedings]