explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015, 24th USENIX Security Symposium, 897-912
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS, International Conference on Smart Card Research and Advanced Applications, 225-241, (LNCS; vol. 9514)
Khalimov A., Bloem R., Veith H., Widder J., Konnov I., Rubin S., Jacobs S.
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings, 20th European Symposium on Research in Computer Security, ESORICS 2015, 108-122, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326)
Bloem R., Hein D., Röck F., Schumi R.
International Conference on Tests And Proofs, International Conference on Tests and Proofs
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective, 4th International Conference on Electronic Government and the Information Systems Perspective , 86-100
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 533-548, (Lecture Notes in Computer Science; vol. 9035)
Zefferer T.
11th International Conference on Web Information Systems and Technologies, 586-597
Zefferer T.
13th International Conference on e-Society 2015, 13th International Conference on e-Society (ES 2015), 191-198
Scherer R., Müller-Putz G., Friedrich E., Pammer-Schindler V., Wilding K., Keller S., Pirker J.
Handbook of Digital Games and Entertainment Technologies, 1-19
Pammer-Schindler V., Simon J., Wilding K., Keller S., Scherer R.
CHI PLAY '15, ACM SIGCHI Annual Symposium on Computer-Human Interaction in Play, 667-672
More S.
, Bachelor's Thesis
Fitzek A., Maierhofer C., Tauber A., Zwattendorfer B.
eGovernment Review, 16-17
Bloem R., Ehlers R., Könighofer R.
Automated Technology for Verification and Analysis (ATVA'15), International Symposium on Automated Technology for Verification and Analysis, 394-410, (Lecture Notes in Computer Science; vol. 9364)
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 612-630, (LNCS)
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015, International Conference on Information Security and Cryptology, 87-101, (LNCS; vol. 9558)
Ehlers R., Könighofer R., Bloem R.
2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 3478-3485
Bloem R., Chatterjee K., Jacobs S., Könighofer R.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 517-532, (Lecture Notes in Computer Science; vol. 9035)
Zefferer T.
IADIS International Journal on WWW/Internet, Vol. 13(2), 17-33