Publikationen
Publikationen
Dual-Stream Temporal Convolutional Neural Network for Voice Presentation Attack Detection
J. Gonzalez-Soler and M. Gomez-Barrero and M. Kamble and M. Todisco and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Towards Refining ID Cards Presentation Attack Detection Systems using Face Quality Index
S. Gonzalez and J. Tapia
Proc. of the 30th European Signal Processing Conf. (EUSIPCO), p.1027–1031
[Conference Proceedings]
Biometrics in the Era of COVID-19: Challenges and Opportunities
M. Gomez-Barrero and P. Drozdowski and C. Rathgeb and others
Trans. on Technology and Society (TTS)
[Journal Article]
Signal-level fusion for indexing and retrieval of facial biometric data
P. Drozdowski and F. Stockhardt and C. Rathgeb and C. Busch
IET Biometrics, Vol.11, p.1–16
[Journal Article]
Are Average Faces Master Faces?
A. Dörsch and C. Rathgeb and M. Ibsen and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]
Fun Selfie Filters in Face Recognition: Impact Assessment and Removal
C. Botezatu and M. Ibsen and C. Rathgeb and C. Busch
IEEE Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.5, p.91–104
[Journal Article]
Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption with Keyword Search
P. Bauspieß and J. Kolberg and P. Drozdowski and C. Rathgeb and C. Busch
IEEE Trans. on Industrial Informatics
[Journal Article]
Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
P. Bauspieß and J. Olafsson and J. Kolberg and P. Drozdowski and C. Rathgeb and C. Busch
Proc. Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions
Campos, Fabio and Muth, Philipp
International Conference on Post-Quantum Cryptography (PQCrypto), p.375–398
[Conference Proceedings]
Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
Campos, Fabio and Meyer, Michael and Reijnders, Krijn and Stöttinger, Marc
International Conference on Selected Areas in Cryptography (SAC), p.234–262
[Conference Proceedings]
On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
Biselli, Tom; Steinbrink, Enno; Herbert, Franziska; Schmidbauer-Wolf, Gina M.; Reuter, Christian
22nd Privacy Enhancing Technologies Symposium (PETS 2022)
[Conference Proceedings]
Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
Schmid, Stefka; Riebe, Thea; Reuter, Christian
Science and Engineering Ethics
[Journal Article]
LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
Kuntke, Franz; Romanenko, Vladimir; Linsner, Sebastian; Steinbrink, Enno; Reuter, Christian
Transactions on Emerging Telecommunications Technologies
[Journal Article]
A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
Eyilmez, Kaan; Basyurt, Ali Sercan; Stieglitz, Stefan; Fuchß, Christoph; Kaufhold, Marc-André; Reuter, Christian; Mirabaie, Milad
ACIS 2022 Proceedings
[Conference Proceedings]
Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
Reinhold, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.226-239
[Journal Article]
Zwischen Destabilisierung und der Ermöglichung von Resilienz: Perspektiven aus den Technikwissenschaften, den Sozialwissenschaften und den Rechtswissenschaften
Reuter, Christian; Göttsche, Malte; Frieß, Friederike; Thielbörger, Pierre; Vüllers, Johannes
Die Friedens-Warte : journal of international peace and organization, p.241-243
[Journal Article]
Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
Schmid, Stefka
Die Friedens-Warte : journal of international peace and organization, p.290-315
[Journal Article]
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
Reuter, Christian; Lo Iacono, Luigi; Benlian, Alexander
Behaviour & Information Technology, p.2035-2048
[Journal Article]
U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, p.39-65
[Journal Article]
Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
Zeitschrift für Friedens- und Konfliktforschung, p.129-140
[Journal Article]
Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
Guntrum, Laura Gianna; Güldenring, Benjamin; Kuntke, Franz; Reuter, Christian
Zeitschrift für Friedens- und Konfliktforschung, p.95-128
[Journal Article]
Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations
Hartwig, Katrin; Reuter, Christian
Behaviour & Information Technology, p.1357-1380
[Journal Article]
Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
Kuntke, Franz; Linsner, Sebastian; Steinbrink, Enno; Franken, Jonas; Reuter, Christian
International Journal of Disaster Risk Science, p.214-229
[Journal Article]
Remotely Accessing the Field and Building Trust with Distant Sources. Perspectives from Journalism Practice for Ethnographic Research
Guntrum, Laura Gianna; Keßler, Mira; Patel, Jignesh; Varfolomeeva, Anna
Global Media Journal - German Edition
[Journal Article]
Book Review: Artificial Intelligence and The Future of Warfare: The USA China and Strategic Stability. Johnson,J. Manchester: University Press. (2021)
Reinhold, Thomas; Reuter, Christian
Zeitschrift für Außen- und Sicherheitspolitik, p.353-355
[Journal Article]
Mensch und Computer 2022: Facing Realities - Tagungsband
[Conference Proceedings]
A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ Attitudes Towards Social Media for Public Safety and Security
Reuter, Christian
[Book]
Für eine umfassende, globale und aktive Abrüstungs- und Rüstungskontrollpolitik
Meier, Oliver; Brzoska, Michael; Ferl, Anna-Katharina; Hach, Sascha; Bayer, Markus; Mutschler, Max; Prem, Berenike; Reinhold, Thomas; Schmid, Stefka; Schwarz, Matthias
[Report]
Conference Proceedings : Science, Peace, Security '21 : The Impact of new Technologies: Destabilizing or Enabling Resilience? : 8-10 September 2021
Göttsche, Malte; Bauer, Sibylle; Dahlmann, Anja; Frieß, Friederike; Lentzos, Filippa; Neuneck, Götz; Niemeyer, Irmgard; Riebe, Thea; Silomon, Jantje; Reuter, Christian; Brochhaus, Jakob; Rademacher, Lukas
[Conference Proceedings]
The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
Franken, Jonas; Reinhold, Thomas; Reichert, Lilian; Reuter, Christian
International Journal of Critical Infrastructure Protection
[Journal Article]


