explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Staber S., Jobstmann B., Bloem R.
Correct Hardware Design and Verification Methods, Advanced Research Working Conference on Correct Hardware Design and Verification Methods, 35-49, (Lecture notes in computer science)
Leitold H., Roessler T.
D-A-CH, D-A-CH Security Conference, 121-129
Leitold H., Posch R., Hayat A.
Proceedings of eGOV INTEROP'05, International Conference on Interoperability of eGovernment Services
Leitold H., Posch R.
Preprints of CIP Europe 2005, CIP Europe 2005, 50-60
Leitold H., Posch R., Roessler T.
Proceedings of eee2005, IEEE International Conference on e-Technology, e-Commerce and e-Service 2005 (eee2005), 480-485
Hayat A., Rechberger C.
EGOV05 - International Conference on E-Government, 374-381
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 261-275, (LNCS)
Matusiewicz K., Pieprzyk J., Pramstaller N., Rechberger C., Rijmen V.
Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468), Gesellschaft für Informatik , 123-134
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, Springer, (LNCS)
Rechberger C., Rijmen V.
Proceedings of Santa's Crypto Get-together 2005, 51-58
Griesmayer A., Bloem R., Hautzendorfer M., Wotawa F.
Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 783-788, (Lecture Notes in Computer Science ; vol. 3533)
Tauber A.
, Master's Thesis
Roessler T., Posch R., Hayat A.
Proceedings of IDABC-Conference 2005, Cross-Border e-Government Services for Administrations, Businesses and Citizens
Pramstaller N., Rechberger C., Rijmen V.
Cryptography and Coding. Cryptography and Coding 2005, 10th IMA International Conference Cryptography and Coding, 78-95, (Lecture Notes in Computer Science; vol. 3796)
Aigner M., Mangard S., Popp T.
Pramstaller N., Oswald M., Mangard S., Gürkaynak F., Häne S.
Proceedings of Austrochip 2004, Austrochip 2004, 77-81
Mangard S.
Topics in Cryptology - CT-RSA 2004, Cryptographers´ Track at the RSA Conference, 222-235, (Lecture Notes in Computer Science)
Leitold H., Posch K.
Security and Privacy in Advanced Networking Technologies, IOS Press, 231-236
Leitold H.
Journal für Rechtspolitik, Vol. 12(2), 77-84