explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Braud-Santoni N., Bloem R., Jacobs S.
Computer Aided Verification - 28th International Conference, CAV 2016, Proceedings, 28th International Conference on Computer Aided Verification, CAV 2016, 157-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9779)
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Springer, (DIMVA)
Jacobs S., Bloem R., Brenguier R., Ehlers R., Hell T., Könighofer R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A.
International Journal on Software Tools for Technology Transfer, 1-24
Reiter A., Zefferer T.
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, IEEE Mobile Cloud
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, Springer International Publishing, 70-90, (Lecture Notes in Business Information Processing; vol. 246)
Werner M., Wenger E., Mangard S.
Smart Card Research and Advanced Applications, International Conference on Smart Card Research and Advanced Applications
Jacobs S., Bloem R., Brenguier R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A., Könighofer R.
Electronic Proceedings in Theoretical Computer Science, Vol. 202, 27-57
Peßl P., Mangard S.
Topics in Cryptology - CT-RSA 2016, Cryptographers´ Track at the RSA Conference
Unterluggauer T., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2016, International Workshop on Constructive Side-Channel Analysis and Secure Design, 3-18, (LNCS; vol. 9689)
Peßl P., Gruß D., Maurice C., Schwarz M., Mangard S.
Proceedings of the 25th USENIX Security Symposium, 565-581
Groß H., Mangard S., Korak T.
TIS@CCS, ACM SIGWEB , 3
Gruß D., Maurice C., Wagner K., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings, 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, 279-299, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721)
Lipp M., Gruß D., Spreitzer R., Maurice C., Mangard S.
25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 549-564
Aichernig B., Bloem R., Pernkopf F., Röck F., Schrank T., Tappler M.
IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016
Priesnitz Filho W., Ribeiro C., Zefferer T.
CAiSE Forum 2016, CEUR-WS.org, 97-104, (CEUR Workshop Proceedings; vol. 1612)
Priesnitz Filho W., Ribeiro C., Zefferer T.
IEEE International Conference on Services Computing (SCC 2016), 2016 IEEE International Conference on Services Computing (SCC), 17-24
Hühnlein D., Frosch T., Schwenk J., Piswanger C., Sel M., Hühnlein T., Wich T., Nemmert D., Lottes R., Baszanowski S., Zeuner V., Rauh M., Somorovsky J., Mladenov V., Condovici C., Leitold H., Stalla-Bourdillon S., Tsakalakis N., Eichholz J., Kamm F., Urmann J., Kühne A., Wabisch D., Dean R., Shamah J., Kapanadze M., Ponte N., Martins J., Portela R., Karabat ., Stojičić S., Nedeljkovic S., Bouckaert V., Defays A., Anderson B., Jonas M., Hermanns C., Schubert T., Wegener D., Sazonov A.
Open Identity Summit 2016, Open Identity Summit 2016, 27, (Lecture Notes in Informatics; vol. P-264)
Leitold H., Schweighofer E., Mitrakas A., Rannenberg K.
, Österreichische Computergesellschaft
Grassi L., Rechberger C.
Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, Springer International Publishing AG , 322-342