explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015, 2015 Fast Software Encryption Workshop, 282-296, (Lecture Notes in Computer Science(; vol. 9054)
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014, 2014 International Conference on Smart Card Research and Advanced Applications, 233-244, ( Lecture Notes in Computer Science; vol. 8968)
Bloem R., Ehlers R., Jacobs S., Könighofer R.
Proceedings 3rd Workshop on Synthesis (SYNT 2014), Workshop on Synthesis (SYNT 2014), 34-50, (EPTCS; vol. 157)
Khalimov A., Bloem R., Jacobs S.
SYNT 2014, 68-83
Bloem R., Könighofer R., Röck F., Tautschnig M.
International Conference on Quality Software, International Conference on Quality Software, 67-72
Pammer-Schindler V., Stern H., Edler S., Hein D., Pirker M., Bloem R., Wertner A.
Proceeding i-KNOW '14 Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business, 14th International Conference on Knowledge Technologies and Data-driven Business (i-KNOW 2014), ?-?
Zefferer T., Krnjic V., Stranacher K., Zwattendorfer B.
Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders, 45-74
Zwattendorfer B., Zefferer T., Stranacher K.
Web Information Systems and Technologies 2014, Springer, 128-144
Teufl P., Zefferer T., Wörgötter C., Oprisnik A., Hein D.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Bloem R., Chatterjee K., Greimel K., Henzinger T., Hofferek G., Jobstmann B., Könighofer B., Könighofer R.
Acta informatica, Vol. 51(3), 193-220
Bloem R., Hofferek G., Könighofer B., Könighofer R., Außerlechner S., Spörk R.
Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design FMCAD 2014, International Conference on Formal Methods in Computer-Aided Design, 35-42
Zefferer T., Zwattendorfer B.
10th International Conference on Web Information Systems and Technologies, 10th International Conference on Web Information Systems and Technologies, 302-309
Zwattendorfer B., Zefferer T., Stranacher K.
Proceedings of the 10th International Conference on Web Information Systems and Technologies, 10th International Conference on Web Information Systems and Technologies, 82-92
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Könighofer R., Tögl R., Bloem R.
Hardware and Software: Verification and Testing - Proceedings of the 10th International Haifa Verification Conference (HVC 2014), Haifa Verification Conference, 92-98, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8855)
Bloem R., Egly U., Klampfl P., Könighofer R., Lonsing F.
Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 31-34
Bloem R., Könighofer R., Seidl M.
Verification, Model Checking, and Abstract Interpretation, 15th International Conference, International Conference on Verification, Model Checking, and Abstract Interpretation, 1-20, (Lecture Notes in Computer Science; vol. 8318)
Tauber A.
IEEE Conference on Communications and Network Security, IEEE Conference on Communications and Network Security
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014, 2014 Fast Software Encryption Workshop, 473-488, (Lecture Notes in Computer Science; vol. 8540)
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014, International Conference on Cryptology and Information Security in Latin America, 274-287, (LNCS)