Publikationen

Publikationen

Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Fischlin, Marc; Günther, Felix; Janson, Christian
Journal of Cryptology
[Journal Article]


SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]


Datenschutzsensibilisierung - Mit Kindern spielerisch ins Gespräch über die Wichtigkeit des Datenschutzes kommen
Appelt, Dominik; Geissler, Ines
[Journal Article]


FRCSyn-onGoing: Benchmarking and Comprehensive Evaluation of Real and Synthetic Data to Improve Face Recognition Systems
Melzi, Pietro; Tolosana, Ruben; Vera-Rodriguez, Ruben; Minchul, Kim; Rathgeb, Christian; Liu, Xiaoming; DeAndres-Tame, Ivan; Morales , Aythami; Fierrez, Julian; Ortega Heras, Javier; Zhao, Weisong; Zhu, Xiangyu; Yan, Zheyu; Zhang, Xiao-Yu; Wu, Jinlin; Lei, Zhen; Tripathi, Suvidha; Kothari, Mahak; Zama, Md Haider; Deb, Debayan; Biesseck, Bernardo; Vidal, Pedro; Granada, Roger; Fickel, Guilherme; Führ, Gustavo; Menotti, David; Unnervik, Alexander; George, Anjith; Ecabert, Christophe; Shahreza, Hatef Otroshi; Rahimi, Parsa; Marcel, Sébastien; Sarridis, Ioannis; Koutlis, Christos; Baltsou, Georgia; Papadopoulos, Symeon; Diou, Christos; Domenico, Nicolò Di; Borghi, Guido; Pellegrini, Lorenzo; Mas, Enrique; Sánchez-Pérez, Ángela; Atzori, Andrea; Fenu, Gianni; Marras, Mirko; Boutros, Fadi; Damer, Naser
[Journal Article]


SFace2: Synthetic-Based Face Recognition with w-Space Identity-Driven Sampling
Boutros, Fadi; Huber, Marco; Luu, Anh Thi; Siebke, Patrick; Damer, Naser
[Journal Article]


Precisely Extracting Complex Variable Values from Android Apps
Miltenberger, Marc; Arzt, Steven
[Journal Article]


Automatic data-driven design and 3D printing of custom ocular prostheses
Reinhard, Johann; Urban, Philipp; Bell, Stephen; Carpenter, David; Sagoo, Mandeep S.
[Journal Article]


A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field
Khodadoust, Javad; Monroy, Raúl; Medina-Pérez, Miguel Angel; Loyola-González, Octavio; Kusakunniran, Worapan; Boller, Andre; Terhörst, Philipp
[Journal Article]


Erste Schritte im Rahmen der Datenschutz-Vorsorge
Boll, Alina; Stummer, Sarah
[Journal Article]


GAAlign: Robust Sampling-Based Point Cloud Registration Using Geometric Algebra
Neumann, Kai; Hildenbrand, Dietmar; Stock, Florian; Steinmetz, Christian; Michel, Maximilian
International Conference on Advanced Computational Applications of Geometric Algebra 2022
[Conference Paper]


A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]


A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
Vincenzi, Marco de; Costantino, Gianpiero; Matteucci, Ilaria; Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel
[Journal Article]


Keystroke Verification Challenge (KVC): Biometric and Fairness Benchmark Evaluation
Stragapede, Giuseppe; Vera-Rodriguez, Ruben; Tolosana, Ruben; Morales , Aythami; Damer, Naser; Fierrez, Julian; Ortega-Garcia, Javier
[Journal Article]


Ubiquitous Multi-Occupant Detection in Smart Environments
Fährmann, Daniel; Boutros, Fadi; Kubon, Philipp; Kirchbuchner, Florian; Kuijper, Arjan; Damer, Naser
[Journal Article]


Short-term predictor for COVID-19 severity from a longitudinal multi-omics study for practical application in intensive care units
Kugler, Sabine; Hahnefeld, Lisa; Kloka, Jan Andreas; Ginzel, Sebastian; Nürenberg-Goloub, Elena; Zinn, Sebastian; Vehrenschild, Maria; Zacharowski, Kai; Lindau, Simone; Ulrich, Evelyn; Burmeister, Jan; Kohlhammer, Jörn; Schwäble, Joachim; Gurke, Robert; Dorochow, Erika; Bennett, Alexandre; Dauth, Stephanie; Campe, Julia; Knape, Tilo; Laux, Volker; Kannt, Aimo; Köhm, Michaela; Geisslinger, Gerd; Resch, Eduard; Behrens, Frank
[Journal Article]


Fairness in Face Presentation Attack Detection
Fang, Meiling; Yang, Wufei; Kuijper, Arjan; S̆truc, Vitomir; Damer, Naser
[Journal Article]


Migrating Monolithic Applications to Function as a Service
Würz, Hendrik Martin; Krämer, Michel; Kaster, Marvin; Kuijper, Arjan
[Journal Article]


Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Elias Heftrig and Haya Schulmann and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.7429–7444
[Conference Proceedings]


Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Tomas Hlavacek and Haya Schulmann and Niklas Vogel and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.4841–4858
[Conference Proceedings]


Poster: Off-Path DNSSEC Downgrade Attacks
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.1120–1122
[Conference Proceedings]


Poster: LeMon: Global Route Leak Monitoring Service
Haya Schulmann and Shujie Zhao
Proceedings of the ACM SIGCOMM 2023 Conference, p.1111–1113
[Conference Proceedings]


Beyond Limits: How to Disable Validators in Secure Networks
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.950–966
[Conference Proceedings]


Poster: Longitudinal Analysis of DoS Attacks
Fabian Kaiser and Haya Schulmann and Michael Waidner
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3573–3575
[Conference Proceedings]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the ACM on Networking (PACMNET), Vol.1, p.26:1–26:20
[Journal Article]


Aktive Cyberabwehr
Haya Schulmann and Michael Waidner
Datenschutz und Datensicherheit, Vol.47, p.497–502
[Journal Article]


A Review of existing GDPR Solutions for Citizens and SMEs
E. Klinger and A. Wiesmaier and A. Heinemann


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
D. Kern and C. Krauß and T. Lauser and N. Alnahawi and A. Wiesmaier and R. Niederhagen
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, p.85–111
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
J. Hohm and A. Heinemann and A. Wiesmaier
15th International Symposium on Foundations & Practice of Security, p.104–119
[Conference Proceedings]


Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics
J. Henrich and A. Heinemann and A. Wiesmaier and N. Schmitt
Information Security Conference (ISC), p.267–287
[Conference Proceedings]


Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Matteo Varotto and Stefan Valentin and Stefano Tomasin
IEEE Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, p.160–165
[Conference Proceedings]