Publikationen

Publikationen

Can Generative Colourisation Help Face Recognition?
P. Drozdowski and D. Fischer and C. Rathgeb and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.299–307
[Conference Proceedings]


Demographic Bias in Biometrics: A Survey on an Emerging Challenge
P. Drozdowski and C. Rathgeb and A. Dantcheva and N. Damer and C. Busch
Trans. on Technology and Society (TTS), Vol.1, p.89–103
[Journal Article]


Demographic Bias: A Challenge for Fingervein Recognition Systems?
P. Drozdowski and B. Prommegger and G. Wimmer and R. Schraml and C. Rathgeb and A. Uhl and C. Busch
European Signal Processing Conf. (EUSIPCO), p.825–829
[Conference Proceedings]


PRNU-based Detection of Facial Retouching
C. Rathgeb and A. Botaljov and F. Stockhardt and S. Isadskiy and L. Debiasi and A.Uhl and C. Busch
IET Biometrics, Vol.9, p.154–164
[Journal Article]


Plastic Surgery: An Obstacle for Deep Face Recognition?
C. Rathgeb and D. Dogan and F. Stockhardt and M. De Marsico and C. Busch
Proc. 15th IEEE Computer Society Workshop on Biometrics (CVPRW), p.806–807
[Conference Proceedings]


Vulnerability Assessment and Detection of Makeup Presentation Attacks
C. Rathgeb and P. Drozdowski and D. Fischer and C. Busch
Proc. Int. Workshop on Biometrics and Forensics (IWBF), p.1–6
[Conference Proceedings]


Efficient Identification in Large-Scale Vein Recognition Systems Using Spectral Minutiae Representations
B.-A. Mokroß and P. Drozdowski and C. Rathgeb and C. Busch
Handbook of Vascular Biometrics
[Book Article]


Efficient privacy-preserving biometric identification in large-scale multibiometric systems
P. Drozdowski
[Dissertation]


Multi-biometric Identification with Cascading Database Filtering
P. Drozdowski and C. Rathgeb and B.-A. Mokroß and C. Busch
Trans. on Biometrics, Behavior, and Identity Science (TBIOM), Vol.2, p.210–222
[Journal Article]


Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
P. Bauspieß and J. Kolberg and D. Demmler and J. Krämer and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]


Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
Campos, Fabio and Kannwischer, Matthias J and Meyer, Michael and Onuki, Hiroshi and Stöttinger, Marc
Workshop on Fault Detection and Tolerance in Cryptography (FDTC), p.57–65
[Conference Proceedings]


Assembly or Optimized C for Lightweight Cryptography on RISC-V?
Campos, Fabio and Jellema, Lars and Lemmen, Mauk and Müller, Lars and Sprenkels, Amber and Viguier, Benoit
International Conference on Cryptology and Network Security (CANS), p.526–545
[Conference Proceedings]


LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Campos, Fabio and Kohlstadt, Tim and Reith, Steffen and Stöttinger, Marc
International Conference on Cryptology in Africa (AFRICACRYPT), p.258–277
[Conference Proceedings]


Aimes: Advanced computation and I/O methods for earth-system simulations
Kunkel, Julian; Jumah, Nabeeh; Novikova, Anastasiia; Ludwig, Thomas; Yashiro, Hisashi; Maruyama, Naoya; Wahib, Mohamed; Thuburn, John
[Book Article]


A Characterization of Data Exchange between Visual Analytics Tools
Nonnemann, Lars; Schumann, Heidrun; Urban, Bodo; Aehnelt, Mario; Schulz, Hans-Jörg
International Conference Information Visualisation (IV) 2020
[Conference Paper]


Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK
Oesch, Sean; Abu-Salma, Ruba; Krämer, Juliane; Wu, Justin; Diallo, Oumar; Ruoti, Scott
Annual Computer Security Applications Conference (ACSAC 2020)
[Conference Proceedings]


RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Mantel, Heiko; Scheidel, Lukas; Schneider, Thomas; Weber, Alexandra; Weinert, Christian; Weißmantel, Tim
19. International Conference on Cryptology And Network Security (CANS'20)
[Conference Proceedings]


CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
Krüger, Stefan; Ali, Karim; Bodden, Eric
International Symposium on Code Generation and Optimization
[Conference Proceedings]


V0LTpwn: Attacking x86 Processor Integrity from Software
Kenjar, Zijo; Frassetto, Tommaso; Gens, David; Franz, Michael; Sadeghi, Ahmad-Reza
arXiv
[Conference Proceedings]


Fuzzy Asymmetric Password-Authenticated Key Exchange
Erwig, Andreas; Hesse, Julia; Orlt, Maximilian; Riahi, Siavash
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020)
[Conference Proceedings]


CryptoSPN: Privacy-preserving Sum-Product Network Inference
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
24th European Conference on Artificial Intelligence (ECAI'20)
[Conference Proceedings]


Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]


Enclave Computing on RISC-V: A Brighter Future for Security?
Dessouky, Ghada; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020
[Conference Proceedings]


Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]


Secure Two-Party Computation in a Quantum world
Büscher, Niklas; Demmler, Daniel; Karvelas, Nikolaos; Katzenbeisser, Stefan; Krämer, Juliane; Rathee, Deevashwer; Schneider, Thomas; Struck, Patrick
18th International Conference on Applied Cryptography and Network Security (ACNS'20)
[Conference Proceedings]


MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Hossein
PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, p.43-45
[Conference Proceedings]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
Cryptography
[Journal Article]


Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
Mobile HCI 2020: Expanding the Horizon of Mobile Interaction
[Conference Proceedings]


Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]


Demographic Bias in Presentation Attack Detection of Iris Recognition Systems
Fang, Meiling; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 2020
[Conference Paper]