explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Könighofer R., Tögl R., Bloem R.
Hardware and Software: Verification and Testing - Proceedings of the 10th International Haifa Verification Conference (HVC 2014), Haifa Verification Conference, 92-98, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8855)
Tauber A.
IEEE Conference on Communications and Network Security, IEEE Conference on Communications and Network Security
Bloem R., Egly U., Klampfl P., Könighofer R., Lonsing F.
Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 31-34
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014, 2014 Fast Software Encryption Workshop, 473-488, (Lecture Notes in Computer Science; vol. 8540)
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014, International Conference on Cryptology and Information Security in Latin America, 274-287, (LNCS)
Bloem R., Könighofer R., Seidl M.
Verification, Model Checking, and Abstract Interpretation, 15th International Conference, International Conference on Verification, Model Checking, and Abstract Interpretation, 1-20, (Lecture Notes in Computer Science; vol. 8318)
Gruß D.
, Master's Thesis
Zefferer T.
The 12th International Conference on Advances in Mobile Computing and Multimedia, 12th International Conference on Advances in Mobile Computing & Multimedia (MoMM2014), 175-184
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress, 2014 ID World International Congress, 1-8
Leitold H.
Advances in Human Factors and Ergonomics 2014, 5th International Conference on Applied Human Factors and Ergonomics, 2669-2679
Lenz T., Zwattendorfer B., Stranacher K., Tauber A.
eGovernment Review, 18-19
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 1-19, (Lecture Notes in Computer Science; vol. 8781)
Mangard S.
IEEE Security & Privacy, Vol. 11(4), 75-77
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India, 215-226
Bloem R., Greimel K., Könighofer R., Röck F.
VALID Proceedings, International Conference on Advances in System Testing and Validation Lifecycle, 1-6
Zefferer T., Tauber A., Zwattendorfer B.
Web Information Systems and Technologies, 331-346, (Lecture Notes in Business Information Processing)
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, IGI Global, 288-309, (Advances in Information Security, Privacy, and Ethics (AISPE))
Stranacher K., Krnjic V., Zefferer T.
eGovernment Review, Vol. 11, 30-31
Lenz T., Stranacher K., Zefferer T.
Webist 2013 Selected and revised papers, 173-188