Publikationen
Publikationen
Trusted Configuration in Cloud FPGAs
Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
[Conference Proceedings]
FLGUARD: Secure and Private Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
[Journal Article, Report]
Data Protection in AI Services: A Survey
Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
[Journal Article]
Two-Party Adaptor Signatures From Identification Schemes
Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
[Conference Proceedings]
Bitcoin-Compatible Virtual Channels
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]
Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction
Stojanovic, Vladimir M.
Physical Review A
[Journal Article]
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
Public-Key Cryptography - PKC 2021, p.205-234
[Conference Proceedings]
HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
[Conference Proceedings]
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
[Journal Article]
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security 21), p.2165-2182
[Conference Proceedings]
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
[Conference Proceedings]
Zur Benutzbarkeit und Verwendung von API-Dokumentationen
R. Huesmann and A. Zeier and A. Heinemann and A. Wiesmaier
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]
Is the Uplink Enough? Estimating Video Stalls from Encrypted Network
Traffic
Frank Loh and
Florian Wamser and
Christian Moldovan and
Bernd Zeidler and
Dimitrios Tsilimantos and
Stefan Valentin and
Tobias Hoßfeld
NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium,
Budapest, Hungary, April 20-24, 2020, p.1–9
[Conference Proceedings]
IJNM Special Issue - International Journal of Network Management:
QoE-centric analysis and management of communication networks
Florian Wamser and
Özgü Alay and
Florian Metzger and
Stefan Valentin
Int. J. Netw. Manag., Vol.30
[Journal Article]
Post-Quantum Secure Boot
Vinay B. Y. Kumar and Naina Gupta and Anupam Chattopadhyay and Michael Kasper and Christoph Krauß and Ruben
Niederhagen
Design, Automation & Test in Europe Conference & Exhibition, DATE 2020
[Conference Proceedings]
TrustEV: Trustworthy Electric Vehicle Charging and Billing
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 35th ACM/SIGAPP Symposium on Applied Computing SAC 2020
[Conference Proceedings]
SEPAD - Security Evaluation Platform for Autonomous Driving
Daniel Zelle and Roland Rieke and Christian Plappert and Christoph Krauß and Dmitry Levshun and Andrey
Chechulin
28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP
[Conference Proceedings]
Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS, p.841–852
[Conference Proceedings]
Securing Electric Vehicle Charging Systems through Component Binding
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
39th International Conference on Computer Safety, Reliability and Security, SAFECOMP
[Conference Proceedings]
HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]
HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Andreas Fuchs and Dustin Kern and Christoph Krauß and Maria Zhdanova and Ronald Heddergott
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]
Security Analysis of Automotive Protocols
Timm Lauser and Daniel Zelle and Christoph Krauß
Proceedings of the 4th Computer Science in Cars Symposium, CSCS
[Conference Proceedings]
Zur Benutzbarkeit und Verwendung von API-Dokumentationen
Rolf Huesmann and
Alexander Zeier and
Andreas Heinemann and
Alexander Wiesmaier
Mensch & Computer Workshopband
[Conference Proceedings]
SSBC 2020: Sclera Segmentation Benchmarking Competition in the Mobile Environment
M. Vitek and A. Das and Y. Pourcenoux and A. Missler and C. Paumier and S. Das and I. De Ghosh and D. R. Lucio and L. A. Zanlorensi Jr. and D. Menotti and F. Boutros and N. Damer and J. H. Grebe and A. Kuijper and J. Hu and Y. He and C. Wang and H. Liu and Y. Wang and Z. Sun and D. Osorio-Roig and C. Rathgeb and C. Busch and J. Tapia and A. Valenzuela and G. Zampoukis and L. Tsochatzidis and I. Pratikakis and S. Nathan and R. Suganya and V. Mehta and A. Dhall and K. Raja and G. Gupta and J. N. Khiarak and M. Akbari-Shahper and F. Jaryani and M. Asgari-Chenaghlu and R. Vyas and S. Dakshit and S. Dakshit and P. Peer and U. Pal and V. Struc
Proc. Intl. Joint Conf. on Biometrics (IJCB), p.1–10
[Conference Proceedings]
Handbook of Vascular Biometrics
A. Uhl and C. Busch and S. Marcel and R. Veldhuis
[Book]
Biometric Presentation Attack Detection: Beyond the Visible Spectrum
R. Tolosana and M. Gomez-Barrero and C. Busch and J. Ortega-Garcia
IEEE Trans. on Information Forensics and Security, Vol.15, p.1261–1275
[Journal Article]
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris
J. Tapia and M. Gomez-Barrero and C. Busch
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
[Journal Article]
Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
U. Scherhag and J. Kunze and C. Rathgeb and C. Busch
IET Biometrics, Vol.9, p.278–289
[Journal Article]
Morphing Attack Detection using Laplace operator based features
U. Scherhag and D. Fischer and S. Isadskiy and J. Otte and C. Busch
in Proc. Norwegian Information Security Conf. (NISK)
[Journal Article]
Deep Face Representations for Differential Morphing Attack Detection
U. Scherhag and C. Rathgeb and J. Merkle and Christoph Busch
IEEE Trans. on Information Forensics and Security
[Journal Article]


