Year | Title/Author | Document Type |
2020 | 30. ID: SMART Workshop 2020: 19. und 20. Februar 2020, Darmstadt; Tagungsband
Waldmann, U. ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt | Conference Proceedings |
2020 | Accurate and robust neural networks for face morphing attack detection
Seibold, C.; Samek, W.; Hilsmann, A.; Eisert, P. | Journal Article
|
2020 | Achieving Data Privacy with a Dependability Mechanism for Cyber Physical Systems
Regan, Gilbert; McCaffery, Fergal; Paul, Pangkaj Chandra; Reich, Jan; Sorokos, Ioannis; Armangeud, Eric; Zeller, Marc; Longo, Simone | Conference Paper |
2020 | Advanced analyses of CrazyFaces attacks on face identification systems
Chen, Cong; Kuijper, Arjan (1. Review); Damer, Naser (2. Review) | Bachelor Thesis |
2020 | Anomaly-based Face Search
Grebe, Jonas Henry; Kuijper, Arjan (1. Gutachten); Terhörst, Philipp (2. Gutachten) | Bachelor Thesis |
2020 | AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Heinl, Michael P.; Giehl, Alexander; Graif, Lukas | Conference Paper
|
2020 | BIOSIG 2020, 19th International Conference of the Biometrics Special Interest Group. Proceedings: 16.-18.09.2020, Fully Virtual Conference
Brömme, Arslan (Ed.); Busch, Christoph; Dantcheva, Antitza; Raja, Kiran; Rathgeb, Christian; Uhl, Andreas ; Gesellschaft für Informatik -GI-, Bonn; Bundesamt für Sicherheit in der Informationstechnik -BSI-, Bonn; European Association for Biometrics -EAB-; European Commission, Joint Research Centre -JRC-; TeleTrusT Deutschland e.V., Verein zur Förderung der Vertrauenswürdigkeit von Informations- und Kommunikationstechnik; Norwegian Biometrics Laboratory -NBL-; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt | Conference Proceedings |
2020 | Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection
Venkatesh, Sushma; Zhang, Haoyu; Ramachandra, Raghavendra; Raja, Kiran; Damer, Naser; Busch, Christoph | Conference Paper |
2020 | CogniCryptgen: Generating code for the secure usage of crypto APIs
Krüger, S.; Ali, K.; Bodden, E. | Conference Paper |
2020 | Compact Models for Periocular Verification Through Knowledge Distillation
Boutros, Fadi; Damer, Naser; Fang, Meiling; Raja, Kiran; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2020 | Comparison-Level Mitigation of Ethnic Bias in Face Recognition
Terhörst, Philipp; Tran, Mai Ly; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2020 | Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, Francois | Electronic Publication
|
2020 | Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François | Journal Article
|
2020 | Deep Learning Multi-layer Fusion for an Accurate Iris Presentation Attack Detection
Fang, Meiling; Damer, Naser; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2020 | Demographic Bias in Biometrics: A Survey on an Emerging Challenge
Drozdowski, Pawel; Rathgeb, Christian; Dantcheva, Antitza; Damer, Naser; Busch, Christoph | Journal Article
|
2020 | Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin | Conference Paper
|
2020 | Detecting double compression and splicing using benfords first digit law
Frick, Raphael Antonius; Liu, Huajian; Steinebach, Martin | Conference Paper |
2020 | DFarm: Massive-Scaling Dynamic Android App Analysis on Real Hardware
Miltenberger, Marc; Gerding, Julien; Guthmann, Jens; Arzt, Steven | Conference Paper |
2020 | Eberbacher Gespräch on "AI, Security & Privacy"
Kreutzer, Michael; Küch, Oliver; Steinebach, Martin | Report
|
2020 | The Effect of Wearing a Mask on Face Recognition Performance. An Exploratory Study
Damer, Naser; Grebe, Jonas Henry; Chen, Cong; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2020 | Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0
Wagner, Paul Georg; Birnstill, Pascal; Beyerer, Jürgen | Conference Paper |
2020 | Estimating and abstracting the 3D structure of bones using neural networks on X-ray (2D) images
Cavojska, Jana; Petrasch, Julian; Mattern, Denny; Lehmann, Nicolas J.; Voisard, Agnès; Böttcher, Peter | Journal Article
|
2020 | Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2019: Neue Perspektiven im virutellen Raum. Unser Jahr 2019. Forschung im Einsatz
Fellner, Dieter W. (Hrsg.); Welling, Daniela (Red.); Ackeren, Janine van (Red.); Bergstedt, Bettina (Red.); Krüger, Kathrin (Red.); Prasche, Svenja; Bornemann, Heidrun (Red.); Roth, Anahit (Red.) ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt | Annual Report
|
2020 | Fusing Iris and Periocular Region for User Verification in Head Mounted Displays
Boutros, Fadi; Damer, Naser; Raja, Kiran; Ramachandra, Raghavendra; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2020 | A Gamified Information Visualization for the Exploration of Home Network Traffic Data
Kuban, Katharina; Kuijper, Arjan (1. Review); Schufrin, Marija (2. Review) | Bachelor Thesis |
2020 | Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph | Conference Paper |
2020 | Information Visualization Interface on Home Router Traffic Data for Laypersons
Schufrin, Marija; Sessler, David; Reynolds, Steven Lamarr; Ahmad, Salmah; Mertz, Tobias; Kohlhammer, Jörn | Conference Paper |
2020 | Iris and periocular biometrics for head mounted displays: Segmentation, recognition, and synthetic data generation
Boutros, Fadi; Damer, Naser; Raja, Kiran; Ramachandra, Raghavendra; Kirchbuchner, Florian; Kuijper, Arjan | Journal Article |
2020 | IT-Sicherheitsarchitektur für die nächste Generation der Leit- und Sicherheitstechnik
Heinrich, Markus; Krauß, Christoph; Zhdanova, Maria; Eckel, Michael; Katzenbeisser, Stefan; Kuzhiyelil, Don; Cosic, Jasmin; Drodt, Matthias | Journal Article |
2020 | Neue Normen für biometrische Datenaustauschformate: Normenreihe ISO/IEC 39794
Henniger, Olaf | Journal Article
|
2020 | Not all areas are equal: Analysis of citations in information security research
Wendzel, Steffen; Lévy-Bencheton, Cedric; Caviglione, Luca | Journal Article |
2020 | On the assessment of face image quality based on handcrafted features
Henniger, Olaf; Fu, Biying; Chen, Cong | Conference Paper
|
2020 | PE-MIU: A Training-Free Privacy-Enhancing Face Recognition Approach Based on Minimum Information Units
Terhörst, Philipp; Riehl, Kevin; Damer, Naser; Rot, Peter; Bortolato, Blaz; Kirchbuchner, Florian; Struc, Vitomir; Kuijper, Arjan | Journal Article
|
2020 | Periocular Biometrics in Head-Mounted Displays: A Sample Selection Approach for Better Recognition
Boutros, Fadi; Damer, Naser; Raja, Kiran; Ramachandra, Raghavendra; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2020 | Post-Quantum Secure Boot
Kumar, Vinay B.Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben | Conference Paper |
2020 | Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael | Conference Paper |
2020 | Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian | Journal Article
|
2020 | Privacy Evaluation Protocols for the Evaluation of Soft-Biometric Privacy-Enhancing Technologies
Terhörst, Philipp; Huber, Marco; Damer, Naser; Rot, Peter; Kirchbuchner, Florian; Struc, Vitomir; Kuijper, Arjan | Conference Paper |
2020 | Privacy implications of voice and speech analysis - information disclosure by inference
Kröger, Jacob Leon; Lutz, Otto Hans-Martin; Müller, Florian; Raschke, P. | Conference Paper
|
2020 | Privacy-enhanced robust image hashing with bloom filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian | Conference Paper |
2020 | Quality improvement mechanism for cyber physical systems - An evaluation
Regan, Gilbert; McCaffery, Fergal; Paul, Pangkaj Chandra; Reich, Jan; Armengaud, Eric; Kaypmaz, Cem; Zeller, Marc; Guo, Joe Zhensheng; Longo, Simone; O'Carroll, Eoin; Sorokos, Ioannis | Journal Article |
2020 | Reducing Deep Face Recognition Model Size by Knowledge Distillation
Klemt, Marcel; Kuijper, Arjan (1. Review); Boutros, Fadi (2. Review) | Bachelor Thesis |
2020 | Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Unterstein, Florian; Schink, Marc; Schamberger, Thomas; Tebelmann, Lars; Ilg, Manuel; Heyszl, Johann | Journal Article
|
2020 | Self Sovereign Identity Use Cases - von der Vision in die Praxis
Doerk, Adrian; Hansen, Patrick; Jürgens, Georg; Kaminski, Moritz; Kubach, Michael; Terbu, Oliver ; Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e.V. -bitkom- | Study
|
2020 | SER-FIQ: Unsupervised Estimation of Face Image Quality Based on Stochastic Embedding Robustness
Terhörst, Philipp; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2020 | TAVeer: An interpretable topic-agnostic authorship verification method
Halvani, Oren; Graner, Lukas; Regev, Roey | Conference Paper |
2020 | Toward mass video data analysis: Interactive and immersive 4D scene reconstruction
Kraus, Matthias; Pollock, Thomas; Miller, Matthias; Kilian, Timon; Moritz, Tobias; Schweitzer, Daniel; Beyerer, Jürgen; Keim, Daniel; Qu, Chengchao; Jentner, Wolfgang | Journal Article |
2020 | TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria | Conference Paper |
2020 | What does your gaze reveal about you? On the privacy implications of eye tracking
Kröger, Jacob Leon; Lutz, Otto Hans-Martin; Müller, Florian | Conference Paper
|
2020 | XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben | Conference Paper |
2019 | 29. SmartCard Workshop 2019. Tagungsband: 20. und 21. Februar 2019, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt | Conference Proceedings |
2019 | Anonymization Is Dead - Long Live Privacy
Zibuschka, Jan; Kurowski, Sebastian; Roßnagel, Heiko; Schunck, Christian H.; Zimmermann, Christian | Conference Paper
|
2019 | Assessing the Applicability of Authorship Verification Methods
Halvani, Oren; Winter, Christian; Graner, Lukas | Conference Paper
|
2019 | A calibratable detector for invasive attacks
Weiner, M.; Wieser, W.; Lupon, E.; Sigl, G.; Manich, S. | Journal Article |
2019 | Computer vision meets visual analytics: Enabling 4D crime scene investigation from image and video data
Pollok, Thomas; Kraus, Matthias; Qu, Chengchao; Miller, Matthias; Moritz, Tobias; Kilian, Timon; Keim, Daniel; Jentner, Wolfgang | Conference Paper |
2019 | Cross-Spectral Periocular Recognition by Cascaded Spectral Image Transformation
Raja, Kiran; Damer, Naser; Ramachandra, Raghavendra; Boutros, Fadi; Busch, Christoph | Conference Paper |
2019 | Cross-spectrum thermal to visible face recognition based on cascaded image synthesis
Mallat, Khawla; Damer, Naser; Boutros, Fadi; Kuijper, Arjan; Dugelay, Jean-Luc | Conference Paper |
2019 | Curve Based Cryptography: High-Performance Implementations and Speed Enhancing Methods
Koppermann, C.P. | Dissertation |
2019 | Cybersecurity Research: Challenges and Course of Action
Holz, Thorsten; Müller-Quade, Jörn; Raabe, Oliver; Waidner, Michael; Bardin, Sébastien; Debar, Hervé; Dinger, Jochen; Fahl, Sascha; Faust, Sebastian; Gonzalez Fuster, Gloria; Gro, Stjepan; Hallett, Joseph; Harlander, Magnus; Houdeau, Detlef; Kirchner, Claude; Klasen, Wolfgang; Lotz, Volkmar; Markatos, Evangelos; Möhring, Peter; Posch, Reinhard; Ritter, Steve; Schallbruch, Martin; Schunter, Matthias; Volkamer, Melanie; Wespi, Andreas; Engelbrecht, Adrian; Fuchs, Andreas; Geiselmann, Willi; Grensing, Anna-Louise; Heidt, Margareta; Heyszl, Johann; Hiller, Matthias; Jäger, Lukas; Kawohl, Claudia; Koch, Alexander; Krämer, Annika; Marnau, Ninja; Noack, Kathrin; Rieke, Roland; Senf, Daniel; Springer, Markus; Steinbrück, Anne; Strefler, Mario; Tatang, Dennis; Backes, Michael; Buxmann, Peter; Eckert, Claudia; Müller-Quade, Jörn | Report
|
2019 | D-ID-Net: Two-Stage Domain and Identity Learning for Identity-Preserving Image Generation from Semantic Segmentation
Damer, Naser; Boutros, Fadi; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | A Design Study on the Joy of Use in Information Visualization for Cybersecurity Analysis for Home Users
Ahmad, Salmah; Kuijper, Arjan (1. Gutachten); Schufrin, Marija (2. Gutachten) | Master Thesis |
2019 | Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts
Damer, Naser; Boller, Viola; Wainakh, Yaza; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2019 | Dynamic searchable symmetric encryption for storing geospatial data in the cloud
Hiemenz, Benedikt; Krämer, Michel | Journal Article |
2019 | Estimating the Impact of IT Security Incidents in Digitized Production Environments
Bürger, Olga; Häckel, Björn; Karnebogen, Philip; Töppel, Jannick | Journal Article |
2019 | Evaluation of a Dependability Mechanism for Cyber Physical Systems
Regan, Gilbert; McCaffery, Fergal; Reich, Jan; Armengaud, Eric; Kaypmaz, Cem; Zhensheng Guo, Joe; Longo, Simone; Carroll, Eoin O. | Conference Paper |
2019 | Exploring the Channels of Multiple Color Spaces for Age and Gender Estimation from Face Images
Boutros, Fadi; Damer, Naser; Terhörst, Philipp; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | Eye-MMS: Miniature Multi-Scale Segmentation Network of Key Eye-Regions in Embedded Applications
Boutros, Fadi; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2018: Künstliche Intelligenz im Visual Computing. Unser Jahr 2018. Forschung im Einsatz
Fellner, Dieter W. (Hrsg.); Welling, Daniela (Red.); Ackeren, Janine van (Red.); Bergstedt, Bettina (Red.); Krüger, Kathrin (Red.); Prasche, Svenja ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt | Annual Report
|
2019 | Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
Plaga, S.; Wiedermann, N.; Niedermaier, M.; Giehl, A.; Newe, T. | Conference Paper |
2019 | Futurehotel - das intelligente Hotelzimmer: Gestaltung einer kognitiven Hotelumgebung; ein Bericht aus dem Forschungsprojekt Futurehotel
Borkmann, Vanessa; Stolze, Dennis; Bruns, Christina | Study |
2019 | IEEE Symposium on Visualization for Cyber Security, VizSec 2019: Vancouver, Canada, October 23, 2019
Gove, Robert (General Co-Chair); Arendt, D.; Kohlhammer, Jörn; Angelini, M.; Paul, C.L.; Bryan, C.; McKenna, S.; Prigent, N.; Najafi, P.; Sopan, A. ; Institute of Electrical and Electronics Engineers -IEEE- | Conference Proceedings |
2019 | "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS
Krombholz, K.; Busse, K.; Pfeffer, K.; Smith, M.; Zezschwitz, E. von | Conference Paper |
2019 | Improved Manipulation Detection with Convolutional Neural Network for JPEG Images
Liu, Huajian; Steinebach, Martin; Schölei, Kathrin | Conference Paper |
2019 | Intrusion Detection - Systeme für vernetzte Fahrzeuge - Konzepte und Herausforderungen für Privatheit und Cyber-Sicherheit
Simo, Hervais; Waidner, Michael; Geminn, Christian | Book Article |
2019 | Local anomaly detection analysis in distribution grid based on IEC 61850-9-2 LE SV voltage signals
Rösch, Dennis; Ruhe, Stefan; Schäfer, Kevin; Nicolai, Steffen | Conference Paper |
2019 | MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness
Heinl, Michael P.; Giehl, Alexander; Wiedermann, Norbert; Plaga, Sven; Kargl, Frank | Conference Paper
|
2019 | Minutiae-Based Gender Estimation for Full and Partial Fingerprints of Arbitrary Size and Shape
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2019 | Mitigating Ethnic Bias in Face Recognition Models through Fair Template Comparison
Tran, Mai Ly; Kuijper, Arjan (1. Gutachter); Terhörst, Philipp (2. Gutachter) | Master Thesis |
2019 | Multi-algorithmic Fusion for Reliable Age and Gender Estimation from Face Images
Terhörst, Philipp; Huber, Marco; Kolf, Jan Niklas; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | A Multi-detector Solution Towards an Accurate and Generalized Detection of Face Morphing Attacks
Damer, Naser; Zienert, Steffen; Wainakh, Yaza; Moseguí Saladié, Alexandra; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | NetCapVis: Web-based Progressive Visual Analytics for Network Packet Captures
Ulmer, Alex; Sessler, David; Kohlhammer, Jörn | Conference Paper
|
2019 | New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions
Immler, V.; Uppund, K. | Journal Article
|
2019 | On Learning Joint Multi-biometric Representations by Deep Fusion
Damer, Naser; Dimitrov, Kristiyan; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2019 | On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, Luca; Damer, Naser; Moseguí Saladié, Alexandra; Rathgeb, Christian; Scherhag, Ulrich; Busch, Christoph; Kirchbuchner, Florian; Uhl, Andreas | Conference Paper |
2019 | On the Generalization of Detecting Face Morphing Attacks as Anomalies: Novelty vs. Outlier Detection
Damer, Naser; Grebe, Jonas Henry; Zienert, Steffen; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | Ontology Population Framework of MAGNETO for Instantiating Heterogeneous Forensic Data Modalities
Behmer, Ernst-Josef; Chandramouli, K.; Garrido, V.; Mühlenberg, Dirk; Müller, Dennis; Müller, Wilmuth; Pallmer, Dirk; Perez, F.; Piatrik, T.; Vargas, C. | Conference Paper
|
2019 | Privacy and Robust Hashes
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian | Conference Paper |
2019 | Realistic Dreams: Cascaded Enhancement of GAN-generated Imageswith an Example in Face Morphing Attacks
Damer, Naser; Boutros, Fadi; Saladie, Alexandra Moseguí; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | Recent Advancements in Digital Forensics, Pt.2
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen | Journal Article |
2019 | Reliable Age and Gender Estimation from Face Images: Stating the Confidence of Model Predictions
Terhörst, Philipp; Huber, Marco; Kolf, Jan Niklas; Zelch, Ines; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | Robust Face Authentication Based on Dynamic Quality-weighted Comparison of Visible and Thermal-to-visible images to Visible Enrollments
Mallat, Khawla; Damer, Naser; Boutros, Fadi; Dugelay, Jean-Luc | Conference Paper |
2019 | Secure and Flexible Deployment of Industrial Applications inside Cloud-Based Environments
Ehrlich, Marco; Trsek, Henning; Gergeleit, Martin; Paffrath, Julius; Simkin, Kostyantyn; Jasperneite, Jürgen | Conference Paper |
2019 | Secure Physical Enclosures from Coverswith Tamper-Resistance
Immler, V.; Obermaier, J.; Ng, K.K.; Ke, F.X.; Lee, J.; Lim, Y.P.; Oh, W.K.; Wee, K.H.; Sigl, G. | Journal Article
|
2019 | Securing physical documents with digital signatures
Winter, Christian; Berchtold, Waldemar; Hollenbeck, Jan Niklas | Conference Paper |
2019 | Selbstdatenschutz im vernetzten Fahrzeug und dessen technische Umsetzung
Krauß, Christoph | Book Article |
2019 | Suppressing Gender and Age in Face Templates Using Incremental Variable Elimination
Terhörst, Philipp; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan | Conference Paper |
2019 | Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets
Hilgert, J.-N.; Lambertz, M.; Rybalka, M.; Schell, R. | Journal Article
|
2019 | Thermal and Cross-spectral Palm Image Matching in the Visual Domain by Robust Image Transformation
Bartuzi, Ewelina; Damer, Naser | Conference Paper |
2019 | To Detect or not to Detect: The Right Faces to Morph
Damer, Naser; Saladie, Alexandra Moseguí; Zienert, Steffen; Wainakh, Yaza; Kirchbuchner, Florian; Kuijper, Arjan; Terhörst, Philipp | Conference Paper |
2019 | Unary and Binary Classification Approaches and their Implications for Authorship Verification
Halvani, Oren; Winter, Christian; Graner, Lukas | Report
|
2019 | Unsupervised Privacy-enhancement of Face Representations Using Similarity-sensitive Noise Transformations
Terhörst, Philipp; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan | Journal Article |
2019 | Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs: Extended Version
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A. | Journal Article |
2019 | Verschlüsselung in der Cloud
Herfert, Michael; Lange, Benjamin; Spychalski, Dominik | Journal Article |
2018 | 28. SmartCard Workshop 2018. Tagungsband: 21. und 22. Februar 2018, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt | Conference Proceedings |
2018 | Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case
Plaga, S.; Niethammer, M.; Wiedermann, N.; Borisov, A. | Conference Paper |
2018 | Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices
Santis, F. De | Dissertation |
2018 | Application-driven advances in multi-biometric fusion
Damer, Naser; Kuijper, Arjan (Referent); Fellner, Dieter W. (Referent); Ramachandra, Raghavendra (Referent) | Dissertation
|
2018 | Attribute-based Person Retrieval and Search in Video Sequences
Schumann, Arne; Specker, Andreas; Beyerer, Jürgen | Conference Paper |
2018 | B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection
Immler, V.; Obermaier, J.; König, M.; Hiller, M.; Sig, G. | Conference Paper |
2018 | BDABE - Blockchain-based Distributed Attribute based Encryption
Bramm, G.; Gall, M.; Schütte, J. | Conference Paper
|
2018 | Die Chancen der Digitalisierung sicher nutzen
Usländer, Thomas; Goll, F. | Journal Article
|
2018 | Cloud Mall Baden-Württemberg: Eine Umfrage zur Nutzung von Cloud-Lösungen bei kleinen und mittelständischen Unternehmen in Baden-Württemberg; Anwenderstudie
Falkner, Jürgen; Kutzias, Damian; Härle, Julia; Kett, Holger | Study |
2018 | CrazyFaces: Unassisted Circumvention of Watchlist Face Identification
Damer, Naser; Wainakh, Yaza; Boller, Viola; Berken von den, Sven; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2018 | CrySL: An extensible approach to validating the correct usage of cryptographic APIs
Krüger, S.; Späth, J.; Ali, K.; Bodden, E.; Mezini, M. | Conference Paper |
2018 | The dark side of the face: Exploring the ultraviolet spectrum for face biometrics
Samartzidis, Timotheos; Siegmund, Dirk; Gödde, Michael; Damer, Naser; Braun, Andreas; Kuijper, Arjan | Conference Paper
|
2018 | DATA - Differential address trace analysis: Finding address-based side-channels in binaries
Weiser, S.; Zankl, A.; Spreitzer, R.; Miller, K.; Mangard, S.; Sigl, G. | Conference Paper |
2018 | Dataset adaptation for the evaluation of small object retrieval in heavily cluttered background
Manger, Daniel | Conference Paper |
2018 | Deep and multi-algorithmic gender classification of single fingerprint minutiae
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2018 | Deep learning-based face recognition and the robustness to perspective distortion
Damer, Naser; Wainakh, Yaza; Henniger, Olaf; Croll, Christian; Berthe, Benoit; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2018 | Dividing the threshold: Multi-probe localized EM analysis on threshold implementations
Specht, R.; Immler, V.; Unterstein, F.; Heyszl, J.; Sig, G. | Conference Paper |
2018 | Domain validation++ for MitM-resilient PKI
Brandt, Markus; Dai, Tiaxing; Klein, Amit; Shulman, Haya; Waidner, Michael | Conference Paper |
2018 | Double Embedding Steganalysis: Steganalysis with Low False Positive Rates
Steinebach, Martin; Ester, Andre; Liu, Huajian; Zmudzinski, Sascha | Conference Paper |
2018 | Emerging and unconventional: New attacks and innovative detection techniques. Editorial
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian | Journal Article
|
2018 | Face verification robustness & camera-subject distance: Camera-subject distance marginally affects automatic face verification
Berthe, Benoit; Croll, Christian; Henniger, Olaf | Journal Article |
2018 | Fingerprint and iris multi-biometric data indexing and retrieval
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2018 | Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit
Hilgert, Jan-Niclas; Lambertz, Martin; Yang, Shuijan | Journal Article
|
2018 | Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2017
Fellner, Dieter W. (Hrsg.); Welling, Daniela (Red.); Ackeren, Janine van (Red.); Kröchert, Charlott (Red.); Prasche, Svenja (Red.); Roth, Anahit (Red.); Egner, Julian (Gestaltung); Gollnast, Anja (Gestaltung); Jahnke, Anne (Gestaltung); Kunkel, Andreas (Red.) ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt | Annual Report
|
2018 | Implementing Joux-Vitse's crossbred algorithm for solving MQ systems over F2 on GPUs
Niederhagen, Ruben; Ning, Kai-Chun; Yang, Bo-Yin | Conference Paper |
2018 | Implicit remote attestation for microkernel-based embedded systems
Wagner, S. | Dissertation |
2018 | Information hiding. Challenges for forensic experts
Mazurczyk, Wojciech; Wendzel, Steffen | Journal Article |
2018 | Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael | Conference Paper |
2018 | IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung
Wendzel, Steffen | Book |
2018 | ivisX: An Integrated Video Investigation Suite for Forensic Applications
Qu, Chengchao; Metzler, Jürgen; Monari, Eduardo | Conference Paper |
2018 | Joint Standard German and Bavarian Subdialect Identification of Broadcast Speech
Stadtschnitzer, Michael; Schmidt, Christoph Andreas | Conference Paper
|
2018 | MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Damer, Naser; Moseguí Saladié, Alexandra; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2018 | P-score: Performance aligned normalization and an evaluation in score-level multi-biometric fusion
Damer, Naser; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2018 | Post-quantum cryptography on FPGAs. The Niederreiter cryptosystem. Extended Abstract
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben | Abstract |
2018 | A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-case of Supply Chain Networks
Zare Garizy, Tirazheh; Fridgen, Gilbert; Wederhake, Lars | Journal Article
|
2018 | Privacy Preserving Forensics for JPEG Images
Liu, Huajian; Steinebach, Martin; Stein, Richard; Mayer, Felix | Conference Paper
|
2018 | Reflection analysis for face morphing attack detection
Seibold, C.; Hilsmann, A.; Eisert, P. | Conference Paper |
2018 | Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael | Conference Paper |
2018 | Secure your SSH Keys! Motivation and practical implementation of a HSM-based approach securing private SSH-Keys
Plaga, S.; Wiedermann, N.; Hansch, G.; Newe, T. | Conference Paper |
2018 | Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks
Fischer, T. | Conference Paper |
2018 | Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data
Ulmer, Alex; Schufrin, Marija; Sessler, David; Kohlhammer, Jörn | Conference Paper |
2018 | What can a single minutia tell about gender?
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan | Conference Paper
|
2018 | Where Technology Meets Security: Key Storage and Data Separation for System-on-Chips
Sigl, G.; Gross, M.; Pehl, M. | Conference Paper |
2018 | XMSS and Embedded Systems. XMSS Hardware Accelerators for RISC-V
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben | Electronic Publication
|
2018 | Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs - extended version
Immler, V.; Specht, R.; Unterstein, F. | Journal Article |
2017 | 27. SIT-SmartCard Workshop 2017: 15. und 16. Februar 2017, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt | Conference Proceedings |
2017 | Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen | Conference Paper |
2017 | AuthentiCap - a touchless vehicle authentication and personalization system
Frank, Sebastian; Kuijper, Arjan | Conference Paper |
2017 | Authorship verification based on compression-models
Halvani, Oren; Winter, Christian; Graner, Lukas | Report
|
2017 | Automated detection of instruction cache leaks in modular exponentiation software
Zankl, A.; Heyszl, J.; Sigl, G. | Conference Paper |
2017 | Automated face detection for occurrence and occupancy estimation in chimpanzees
Crunchant, A.-S.; Egerer, M.; Loos, A.; Burghardt, T.; Zuberbühler, K.; Corogenes, K.; Leinert, V.; Kulik, L.; Kühl, H.S. | Journal Article |
2017 | Automatic analysis of facial expressions in an advertising test with Chinese respondents
Dieckmann, Anja; Unfried, Matthias; Garbas, Jens; Mortillaro, Marcello | Report
|
2017 | Benefits of combining forensic image creation and file carving
Yannikos, York; Steinebach, Martin; Rettig, Michael | Conference Paper |
2017 | Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
Sepulveda, J.; Zankl, A.; Mischke, O. | Conference Paper |
2017 | ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications
Santis, F. de; Schauer, A.; Sigl, G. | Conference Paper |
2017 | Cloud Computing im Mittelstand 2017: Ergebnisse der Bedarfsanalyse der Mittelstand 4.0-Agentur Cloud
Frings, Sandra; Falkner, Jürgen; Kett, Holger | Study
|
2017 | Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
Eckert, C. | Journal Article |
2017 | Data residency challenges and opportunities for standardization
Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char | Report
|
2017 | Datenpotenziale sicher nutzen
Reis, Claudia; Jung, Christian; Ochs, Michael A. | Journal Article |
2017 | Design and architecture of an industrial IT security lab
Pfrang, Steffen; Kippe, Jörg; Meier, David; Haas, Christian | Conference Paper |
2017 | Detection of face morphing attacks by deep learning
Seibold, C.; Samek, W.; Hilsmann, A.; Eisert, P. | Conference Paper |
2017 | Digital watermarking for verification of perception-based integrity of audio data
Zmudzinski, Sascha; Waidner, Michael; Steinebach, Martin | Dissertation
|
2017 | Dissecting leakage resilient PRFs with multivariate localized EM attacks: A practical security evaluation on FPGA
Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R. | Conference Paper |
2017 | Efficient, accurate, and rotation-invariant iris code
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan | Journal Article
|
2017 | ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency
Reis, P.M.G.I.; Costa, J.P.C.L. da; Miranda, R.K.; Galdo, G. del | Journal Article |
2017 | Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
Hilgert, J.-N.; Lambertz, M.; Plohmann, D. | Journal Article
|
2017 | Forensic Image Inspection Assisted by Deep Learning
Steinebach, Martin; Mayer, Felix | Conference Paper |
2017 | Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2016
Fellner, Dieter W. (Hrsg.); Baier, Konrad (Red.); Ackeren, Janine van (Red.); Alexandrin, Max (Red.); Barth, Anna (Red.); Bockholt, Ulrich (Red.); Kopold, Franziska (Red.); Löwer, Chris (Red.); May, Thorsten (Red.); Peters, Wiebke (Red.); Wehner, Detlef (Red.); Gollnast, Anja; Bumke, Carina ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt | Annual Report
|
2017 | The Future of Digital Forensics: Challenges and the Road Ahead
Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech | Journal Article |
2017 | General borda count for multi-biometric retrieval
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2017 | Hiding secrecy leakage in leaky helper data
Hiller, M.; Önalan, A.G. | Conference Paper |
2017 | Indexing of single and multi-instance iris data based on LSH-forest and rotation invariant representation
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2017 | Internet-wide study of DNS cache injections
Klein, A.; Shulman, H.; Waidner, M. | Conference Paper |
2017 | Introducing remote attestation and hardware-based cryptography to OPC UA
Birnstill, Pascal; Haas, Christian; Hassler, D.; Beyerer, Jürgen | Conference Paper
|
2017 | Kryptographisches Verfahren zur Messung von Funklaufzeiten
Hadaschik, Niels; Breiling, Marco; Dräger, Tobias | Patent
|
2017 | Mythos Blockchain: Herausforderungen für den Öffentlichen Sektor
Welzel, Christian; Eckert, Klaus-Peter; Kirstein, Fabian; Jacumeit, Volker | Report
|
2017 | Neighbor distance ratios and dynamic weighting in multi-biometric fusion
Damer, Naser; Alkhatib, Wael; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2017 | Offline Mode for Corporate Mobile Client Security Architecture
Galibus, T.; Vieira, T.P.D.; Freitas, E.P. de; Albuquerque, R.D.; Costa, J.P.C.L. da; Sousa, R.T. de; Krasnoproshin, V.; Zaleski, A.; Vissia, H.E.R.M.; Galdo, G. del | Journal Article |
2017 | On the usefulness of compression models for authorship verification
Halvani, Oren; Winter, C.; Graner, L. | Conference Paper |
2017 | One key to sign them all considered vulnerable: Evaluation of DNSSEC in the internet
Shulman, Haya; Waidner, Michael | Conference Paper
|
2017 | Opportunities for biometric technologies in smart environments
Henniger, Olaf; Damer, Naser; Braun, Andreas | Conference Paper |
2017 | Positionspapier: Cybersicherheit in Deutschland
Waidner, Michael; Backes, Michael; Müller-Quade, Jörn; Waidner, Michael | Report |
2017 | Practical post-quantum cryptography. White Paper
Niederhagen, Ruben; Waidner, Michael | Report
|
2017 | Problems of video-based pain detection in patients with dementia: A road map to an interdisciplinary solution
Kunz, Miriam; Seuss, Dominik; Hassan, Teena; Garbas, Jens U.; Siebers, Michael; Schmid, Ute; Schöberl, Michael; Lautenbacher, Stefan | Journal Article
|
2017 | Ratgeber für eine sichere zentrale Softwareverteilung
Herfert, Michael; Kunz, Thomas; Wolf, Ruben; Waidner, Michael | Book |
2017 | Recent Advancements in Digital Forensics. Pt.1: Guest editors' introduction
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen | Journal Article |
2017 | Risikobeurteilung in der IT-Sicherheit Kritischer Infrastrukturen - Eine Analyse der Risikobeurteilung im Förderschwerpunkt ITS|KRITIS
Gurschler, Tamara; Großmann, Jürgen; Kotarski, David; Teichmann, Clemens; Thim, Christof; Eichler, Jörn; Göllner, Johannes; Gronau, Norbert; Lechner, Ulrike | Conference Paper |
2017 | Rolling DICE. Lightweight remote attestation for COTS IoT hardware
Jäger, L.; Petri, R.; Fuchs, A. | Conference Paper |
2017 | SecurePLUGandWORK. Abschlussbericht
Schleipen, Miriam; Henßen, Robert; Bischoff, Tino; Pfrommer, Julius; Sauer, Olaf; Schneider, Daniel; Jungbluth, Florian; Flatt, Holger; Barton, David; Fleischer, Jürgen; Bollhöfer, Esther; Moll, Cornelius; Lindauer, Jochen; Davis, Ralph; Baron, Heiko; Danner, Thomas; Hillerich, Thomas; Schmuck, Christian; Blume, Marco; Finster, Sören; Fechner, Andreas; Tschepat, Roman; Kazakov, Dmitry; Kühbauch, Reinhard; Klöblen, Wolfgang; Sproll, Dietmar; Fellhauer, Bruno; Osswald, Dirk; Sauer, Olaf (Hrsg.) | Report
|
2017 | Securing FPGA SoC configurations independent of their manufacturers
Jacob, N.; Wittmann, J.; Heyszl, J.; Hesselbarth, R.; Wilde, F.; Pehl, M.; Sigl, G.; Fischer, K. | Conference Paper |
2017 | Squeezing polynomial masking in tower fields. A higher-order masked AES S-box
Santis, F. de; Bauer, T.; Sigl, G. | Conference Paper |
2017 | A step towards measuring the fetal head circumference with the use of obstetric ultrasound in a low resource setting
Heuvel, T.L.A. van den; Petros, H.; Santini, S.; Korte, C.L. de; Ginneken, B. van | Conference Paper |
2017 | Towards Dependability Engineering of Cooperative Automotive Cyber-Physical Systems
Macher, Georg; Armengaud, Eric; Schneider, Daniel; Brenner, Eugen; Kreiner, Christian | Conference Paper |
2017 | Towards post-quantum security for IoT endpoints with NTRU
Guillen, O.M.; Pöppelmann, T.; Bermudo Mera, J.M.; Bongenaar, E.F.; Sigl, G.; Sepulveda, J. | Conference Paper |
2017 | Towards side-channel secure firmware updates: A minimalist anomaly detection approach
Guillen, O.M.; Santis, F. de; Brederlow, R.; Sigl, G. | Conference Paper |
2017 | Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G. | Conference Paper |
2017 | Trust the biometric mainstream: Multi-biometric fusion and score coherence
Damer, Naser; Rhaibani, Chadi Izzou; Braun, Andreas; Kuijper, Arjan | Conference Paper |
2017 | Umfassende Sicherheit - Safety und Security im Kontext autonomer Systeme
Schneider, Daniel; Trapp, Mario; Dörr, Jörg; Dukanovic, Sinisa; Henkel, Thorsten; Khondoker, Rahamatullah; Krauß, Christoph; Mauthofer, Sebastian; Scheuermann, Dirk; Zelle, Daniel | Journal Article |
2017 | Using echo state networks for cryptography
Ramamurthy, Rajkumar; Bauckhage, Christian; Buza, Krisztian; Wrobel, Stefan | Conference Paper |
2017 | Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A. | Conference Paper |
2017 | Die Volksverschlüsselung: Förderung vertrauenswürdiger Ende-zu-Ende-Verschlüsselung durch benutzerfreundliches Schlüssel- und Zertifikatsmanagement
Spychalski, Dominik; Eckstein, Levona; Herfert, Michael; Trick, Daniel; Rubinstein, Tatjana | Conference Paper
|
2017 | Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs
Immler, V.; Specht, R.; Unterstein, F. | Conference Paper |
2016 | 26. SIT-SmartCard Workshop 2016: Darmstadt, 17. und 18. Februar 2016
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt | Conference Proceedings |
2016 | AAC encoding detection and bitrate estimation using a convolutional neural network
Seichter, Daniel; Cuccovillo, Luca; Aichroth, Patrick | Conference Paper |
2016 | Analyzing the Spanish strip cipher by combining combinatorial and statistical methods
Sanguino, L.A.B.; Leander, G.; Paar, C.; Esslinger, B.; Niebel, I. | Journal Article |
2016 | Applying base value of fundamental frequency via the multivariate Kernel-Density in forensic speaker comparison
Rodrigues da Silva, Ronaldo; Carvalho Lustosa da Costa, Joao Paulo; Kehrle Miranda, Ricardo; Galdo, Giovanni del | Conference Paper |
2016 | Authentication and searchable symmetric encryption for cloud-based storage of geospatial data
Hiemenz, Benedikt; Kuijper, Arjan (1. Gutachten); Krämer, Michel (Betreuer) | Master Thesis |
2016 | Authorship verification for different languages, genres and topics
Halvani, Oren; Winter, Christian; Pflug, Anika | Journal Article
|
2016 | CoKey: Fast token-based cooperative cryptography
Horsch, Julian; Wessel, Sascha; Eckert, Claudia | Conference Paper
|
2016 | Combining low-level features of offline questionnaires for handwriting identification
Siegmund, Dirk; Ebert, Tina; Damer, Naser | Conference Paper |
2016 | Consumer oriented privacy preserving access control for electronic health records in the cloud
Fernando, Ruchith; Ranchal, Rohit; An, Byungchan; Ben Othmane, Lotfi; Bhargava, Bharat | Conference Paper |
2016 | CREDENTIAL: A framework for privacy-preserving cloud-based data sharing
Hörandner, Felix; Krenn, Stephan; Migliavacca, Andrea; Thiemer, Florian; Zwattendorfer, Bernd | Conference Paper |
2016 | Cryptographically enforced four-eyes principle
Bilzhause, A.; Huber, M.; Pöhls, H.C.; Samelin, K. | Conference Paper |
2016 | Datennutzungskontrolle mit IND2UCE
Jung, Christian; Feth, Denis | Book Article |
2016 | A deep neural network for image quality assessment
Bosse, S.; Maniry, D.; Wiegand, T.; Samek, W. | Conference Paper |
2016 | Developers are not the enemy!: The need for usable security APIs
Green, M.; Smith, M. | Journal Article |
2016 | Effects of image compression on ear biometrics
Rathgeb, C.; Pflug, A.; Wagner, J.; Busch, C. | Journal Article |
2016 | A flexible framework for mobile device forensics based on cold boot attacks
Huber, M.; Taubmann, B.; Wessel, S.; Reiser, H.P.; Sigl, G. | Journal Article
|
2016 | Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2015
Fellner, Dieter W. (Hrsg.); Baier, Konrad (Red.); Ackeren, Janine van (Red.); Bornemann, Heidrun (Red.); Wehner, Detlef (Red.); Bumke, Carina; Boysens, Oliver; Egner, Juliane ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt | Annual Report
|
2016 | Future digital forensics in an advanced trusted environment
Maybaum, M.; Toelle, J. | Conference Paper |
2016 | Jumping through hoops: Why do Java developers struggle with cryptography APIs?
Nadi, S.; Krüger, S.; Mezini, M.; Bodden, E. | Conference Paper |
2016 | Laientaugliche Schlüsselgenerierung für die End-zu-End-Verschlüsselung
Herfert, Michael; Selzer, Annika; Waldmann, Ulrich | Journal Article |
2016 | Laser vibration sensing at Fraunhofer IOSB: Review and applications
Lutzmann, Peter; Göhler, Benjamin; Hill, Chris A.; Putten, Frank van | Journal Article |
2016 | Low complexity blind separation technique to solve the permutation ambiguity of convolutive speech mixtures
Lima, Pedro F.C.; Kehrle Miranda, Ricardo; Costa, Joao Paulo C.L. da; Zelenovsky, Ricardo; Yuan, Yizheng; Galdo, Giovanni del | Conference Paper |
2016 | Low-resolution convolutional neural networks for video face recognition
Herrmann, C.; Willersinn, Dieter; Beyerer, Jürgen | Conference Paper |
2016 | Minimum requirements for evaluating side-channel attack resistance of elliptic curve implementations
Kasper, Michael; Petri, Richard; Feldhusen, Dirk; Gebhardt, Max; Illies, Georg; Lochter, Manfred; Stein, Oliver; Thumser, Wolfgang; Wicke, Guntram | Report
|
2016 | Mobile biometrics device for future border control
Strobl, B.; Monari, Eduardo | Conference Paper |
2016 | Multi-biometric continuous authentication. A trust model for an asynchronous system
Damer, Naser; Maul, Fabian; Busch, Christoph | Conference Paper |
2016 | NetCo: Reliable routing with unreliable routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens | Conference Paper |
2016 | Obfuscation combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya | Conference Paper |
2016 | Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya | Electronic Publication
|
2016 | Online reliability testing for PUF key derivation
Hiller, M.; Önalan, A.G.; Sigl, G.; Bossert, M. | Conference Paper |
2016 | Open-set microphone classification via blind channel analysis
Cuccovillo, Luca; Aichroth, Patrick | Conference Paper |
2016 | Policy-based implicit attestation for microkernel-based virtualized systems
Wagner, S.; Eckert, C. | Conference Paper |
2016 | Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys
Immler, V.; Hennig, M.; Kürzinger, L.; Sigl, G. | Conference Paper |
2016 | Practical view on face presentation attack detection
Damer, Naser; Dimitrov, Kristiyan | Conference Paper
|
2016 | Risks of Industrie 4.0 - an information technology perspective
Usländer, Thomas; Thomalla, Christoph | Abstract
|
2016 | SecuSpot: Toward cloud-assisted secure multi-tenant WiFi hotspot infrastructures
Schulz-Zander, J.; Lisicki, R.; Schmid, S.; Feldmann, A. | Conference Paper |
2016 | Simple photonic emission attack with reduced data complexity
Carmon, E.; Seifert, J.-P.; Wool, A. | Conference Paper |
2016 | Towards efficient evaluation of a time-driven cache attack on modern processors
Zankl, A.; Miller, K.; Heyszl, J.; Sigl, G. | Conference Paper |
2016 | Vernetzte IT-Sicherheit in kritischen Infrastrukturen. Tl.2: Informationssicherheit - PREVENT - Integriertes Risikomanagement zur Prävention von Cyber-Angriffen auf die Kernsysteme einer Bank
Großmann, Jürgen | Journal Article |
2016 | Verwundbarkeitsprüfungen mit Shodan
Simon, Kai; Moucha, Cornelius | Journal Article |
2016 | X25519 hardware implementation for low-latency applications
Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G. | Conference Paper |
2015 | 25. SmartCard Workshop 2015. Tagungsband: Darmstadt, 4./5. Februar 2015
Waldmann, U. ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt | Conference Proceedings |
2015 | 6doku: Towards secure over-the-air preloading of 6LoWPAN nodes using PHY key generation
Krentz, K.-F.; Wunder, G. | Conference Paper |
2015 | Bedeutung der Internationalen Norm ISO/IEC 27018 im Kontext von Cloud-Lösungen: IT-Sicherheit
Blind, Knut; Löhe, Martin | Journal Article
|
2015 | BOTWATCHER: Transparent and generic botnet tracking
Barabosch, T.; Dombeck, A.; Yakdan, K.; Gerhards-Padilla, E. | Conference Paper |
2015 | Cipher-suite negotiation for DNSSEC: Hop-by-hop or end-to-end?
Herzberg, Amir; Shulman, Haya | Journal Article |
2015 | Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs
Nyberg, R.; Heyszl, J.; Rabe, D.; Sigl, G. | Journal Article |
2015 | Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf | Journal Article |
2015 | Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf | Report |
2015 | Detection and forensics of domains hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Royeen, Carel van; Waidner, Michael | Conference Paper |
2015 | Face recognition for great apes: Identification of primates in videos
Loos, Alexander; Kalyanasundaram, Talat Anand Mohan | Conference Paper |
2015 | Face- and appearance-based person identification for forensic analysis of surveillance videos
Herrmann, C.; Metzler, Jürgen; Willersinn, Dieter; Beyerer, Jürgen | Conference Paper
|
2015 | Forensic readiness: Emerging discipline for creating reliable and secure digital evidence
Endicott-Popovsky, B.; Kuntze, N.; Rudolph, C. | Journal Article |
2015 | Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2014
Fellner, Dieter W. (Hrsg.); Baier, Konrad (Red.); Ackeren, Janine van (Red.); Bornemann, Heidrun (Red.); Fraunhoffer, Katrin (Red.); Wehner, Detlef (Red.) ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt | Annual Report
|
2015 | Fuzzy logic and multi-biometric fusion: An Overview
Maul, Fabian; Damer, Naser | Conference Paper |
2015 | Human authentication implemented for mobile applications based on ECG-data acquired from sensorized garments
Tantinger, D.; Zrenner, M.; Lang, N.R.; Leutheuser, H.; Eskofier, B.M.; Weigand, C.; Struck, M. | Conference Paper |
2015 | I feel like i'm taking selfies all day! Towards understanding biometric authentication on smartphones
Luca, A. de; Hang, A.; Zezschwitz, E. von; Hussmann, H. | Conference Paper |
2015 | Improving non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements
Specht, R.; Heyszl, J.; Kleinsteuber, M.; Sigl, G. | Conference Paper |
2015 | Industrial Software Defined Networking
Neff, Sebastian; Margraf, Marian; Müller, Andreas; Larbig, Pedro; Khondoker, Rahamatullah | Bachelor Thesis |
2015 | IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael | Journal Article |
2015 | A lightweight framework for cold boot based forensics on mobile devices
Taubmann, B.; Huber, M.; Wessel, S.; Heim, L.; Reiser, H.P.; Sigl, G. | Conference Paper |
2015 | Low-area reed decoding in a generalized concatenated code construction for PUFs
Hiller, M.; Kürzinger, L.; Sigl, G.; Müelich, S.; Puchinger, S.; Bossert, M. | Conference Paper |
2015 | Multi-biometric continuous authentication: Defining a trust model for an asynchronous system
Maul, Fabian; Busch, Christoph; Damer, Naser (Betreuer) | Master Thesis |
2015 | A new definition and classification of physical unclonable functions
Plaga, R.; Merli, D. | Conference Paper |
2015 | New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf | Journal Article |
2015 | New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf | Report |
2015 | Personalized face reference from video: Key-face selection and feature-level fusion
Damer, Naser; Samartzidis, Timotheos; Nouak, Alexander | Conference Paper |
2015 | Quantum cryptography over the FSO channel with PPM and FSK modulations
Roediger, J.; Perlot, N.; Freund, R. | Conference Paper |
2015 | Robust 2D face recognition under different illuminations using binarized partial face features: Towards protecting ID documents
Butt, Moazzam; Alkhatib, Wael | Conference Paper |
2015 | Schlussbericht zu BMBF-Projekt MisPel: Multi-Biometriebasierte Forensische Personensuche in Lichtbild- und Videomassendaten (MisPel). Teilvorhaben: Fernbereichsbiometrie und IT-Sicherheit: Laufzeit des Vorhabens: 01.01.2012 – 30.04.2015
Willersinn, Dieter ; Fraunhofer-Institut für Optronik, Systemtechnik und Bildauswertung -IOSB-, Karlsruhe | Report
|
2015 | Secure cloud-based risk assessment for urban areas
Frese, Sven; Kuijper, Arjan (1. Gutachter); Krämer, Michel (2. Gutachter) | Master Thesis |
2015 | Security overlay for distributed encrypted containers
Patzer, F.; Jakoby, A.; Kresken, Thomas; Müller, Wilmuth | Conference Paper
|
2015 | SoK: Secure messaging
Unger, N.; Dechand, S.; Bonneau, J.; Fahl, S.; Perl, H.; Goldberg, I.; Smith, M. | Conference Paper |
2015 | Supply chain network risk analysis - a privacy preserving approach
Fridgen, Gilbert; Zare Garizy, Tirazheh | Conference Paper |
2015 | Towards mobile and touchless fingerprint verification
Jonietz, Christof; Monari, Eduardo; Widak, Heiko; Qu, C. | Conference Paper
|
2015 | Towards secure integration of cryptographic software
Arzt, Steven; Nadi, S.; Ali, Karim; Bodden, Eric; Erdweg, S.; Mezini, Mira | Conference Paper |
2015 | Towards touchless palm and finger detection for fingerprint extraction with mobile devices
Jonietz, Christof; Monari, Eduardo; Qu, Chengchao | Conference Paper
|
2015 | Weighted integration of neighbors distance ratio in multi-biometric fusion
Damer, Naser; Nouak, Alexander | Conference Paper |