We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection, 40th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2025, (IFIP Advances in Information and Communication Technology)
Final Integrated Solution and Validation Results of the ERATOSTHENES Holistic IoT Devices Security and Privacy Respecting Architecture
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Giampaolo F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2025, Embedded World 2025
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Fasllija E., Heher J., More S.
18th International Conference on Network and System Security Proceedings, 18th International Conference on Network and System Security, ( Lecture Notes in Computer Science)
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 19th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Lifecycle Management of IoT Devices Via Digital Identities Management and Distributed Ledgers Solutions
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2024, Embedded World 2024
Trust and Privacy in a Heterogeneous World
More S.
, Doctoral Thesis
Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes
More S.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, 1173-1181, (ACM International Conference Proceeding Series)
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management
Loupos K., Niavis H., Michalopoulos F., Misiakoulis G., Skarmeta A., García J., Palomares A., Song H., Dautov R., Giampaolo F., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Bampatsikos M., Politis I., Krilakis K., Syvridis D.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Extending Expressive Access Policies with Privacy Features
More S., Ramacher S., Alber L., Herzl M.
The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022), 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 574-581
KRAKEN: A Privacy-Preserving Data Market for Authentic Data
Koch K., Krenn S., Marc T., More S., Ramacher S.
DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022, 2022 International Conference on Emerging Networking Experiments and Technologies, 15-20, (DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022)
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
More S., Alber L.
Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022, 17th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Offline-verifiable Data from Distributed Ledger-based Registries
More S., Heher J., Walluschek C.
Proceedings - 19th International Conference on Security and Cryptography (SECRYPT 2022), 19th International Conference on Security and Cryptography
Multidimensional study on users’ evaluation of the KRAKEN personal data sharing platform
Gabrielli S., Rizzi S., Mayora O., More S., Perez Baun J., Vandevelde W.
Applied Sciences, Vol. 12(7)
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
More S., Grassberger P., Hörandner F., Abraham A., Klausner L.
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings, 36th International Conference on ICT Systems Security and Privacy Protection, 19-35, (IFIP Advances in Information and Communication Technology; vol. 625)
Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World
Alber L., More S., Mödersheim S., Schlichtkrull A.
Lecture Notes in Informatics, Open Identity Summit 2021, 107-118
SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance
Abraham A., Schinnerl C., More S.
Proceedings of the 8th International Conference on Security and Cryptography (SECRYPT 2021), 18th International Conference on Security and Cryptography, 137-148
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation
Abraham A., Koch K., More S., Ramacher S., Stopar M.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 506-513, (Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021)
Revocable and Offline-Verifiable Self-Sovereign Identities
Abraham A., More S., Rabensteiner C., Hörandner F.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1020-1027, (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020)
Short-Lived Forward-Secure Delegation for TLS
Alber L., More S., Ramacher S.
CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, The ACM Cloud Computing Security Workshop in conjunction with the ACM Conference on Computer and Communications Security, 119-132, (CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop)
TPL: A Trust Policy Language
Mödersheim S., Schlichtkrull A., Wagner G., More S., Alber L.
Trust Management XIII, IFIPTM 2019, 209-223