explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Zefferer T.
11th International Conference on Web Information Systems and Technologies, 586-597
Zefferer T.
13th International Conference on e-Society 2015, 13th International Conference on e-Society (ES 2015), 191-198
Scherer R., Müller-Putz G., Friedrich E., Pammer-Schindler V., Wilding K., Keller S., Pirker J.
Handbook of Digital Games and Entertainment Technologies, 1-19
Pammer-Schindler V., Simon J., Wilding K., Keller S., Scherer R.
CHI PLAY '15, ACM SIGCHI Annual Symposium on Computer-Human Interaction in Play, 667-672
More S.
, Bachelor's Thesis
Bloem R., Ehlers R., Könighofer R.
Automated Technology for Verification and Analysis (ATVA'15), International Symposium on Automated Technology for Verification and Analysis, 394-410, (Lecture Notes in Computer Science; vol. 9364)
Fitzek A., Maierhofer C., Tauber A., Zwattendorfer B.
eGovernment Review, 16-17
Ehlers R., Könighofer R., Bloem R.
2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 3478-3485
Bloem R., Chatterjee K., Jacobs S., Könighofer R.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 517-532, (Lecture Notes in Computer Science; vol. 9035)
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 612-630, (LNCS)
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015, International Conference on Information Security and Cryptology, 87-101, (LNCS; vol. 9558)
Zefferer T.
IADIS International Journal on WWW/Internet, Vol. 13(2), 17-33
Rath C., Roth S., Bratko H., Zefferer T.
Electronic Government and the Information Systems Perspective. EGOVIS 2015, 4th International Conference on Electronic Government and the Information Systems Perspective , 71-85, (Lecture Notes in Computer Science; vol. 9265)
Reiter A., Zefferer T.
2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 4th International Conference on Cloud Networking, 226-231
Reiter A., Zefferer T.
3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015), 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 89-98
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies, 11th International Conference on Web Information Systems and Technologies, 35-44
Zwattendorfer B., Tauber A.
International Journal of Internet Technology and Secured Transactions, Vol. 5(4), 291-306
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 490-509, ( Lecture Notes in Computer Science; vol. 9453)
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015, 22nd International Workshop on Selected Areas in Cryptography, 479-492, (Lecture Notes in Computer Science; vol. 9566)
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015, Cryptographers´ Track at the RSA Conference, 371-387, (Lecture Notes in Computer Science; vol. 9048)