explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Ehlers R., Könighofer R., Bloem R.
2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 3478-3485
Bloem R., Chatterjee K., Jacobs S., Könighofer R.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 517-532, (Lecture Notes in Computer Science; vol. 9035)
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 612-630, (LNCS)
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015, International Conference on Information Security and Cryptology, 87-101, (LNCS; vol. 9558)
Zefferer T.
IADIS International Journal on WWW/Internet, Vol. 13(2), 17-33
Rath C., Roth S., Bratko H., Zefferer T.
Electronic Government and the Information Systems Perspective. EGOVIS 2015, 4th International Conference on Electronic Government and the Information Systems Perspective , 71-85, (Lecture Notes in Computer Science; vol. 9265)
Reiter A., Zefferer T.
2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 4th International Conference on Cloud Networking, 226-231
Reiter A., Zefferer T.
3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015), 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 89-98
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies, 11th International Conference on Web Information Systems and Technologies, 35-44
Zwattendorfer B., Tauber A.
International Journal of Internet Technology and Secured Transactions, Vol. 5(4), 291-306
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 490-509, ( Lecture Notes in Computer Science; vol. 9453)
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015, 22nd International Workshop on Selected Areas in Cryptography, 479-492, (Lecture Notes in Computer Science; vol. 9566)
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015, Cryptographers´ Track at the RSA Conference, 371-387, (Lecture Notes in Computer Science; vol. 9048)
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015, 2015 Fast Software Encryption Workshop, 282-296, (Lecture Notes in Computer Science(; vol. 9054)
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014, 2014 International Conference on Smart Card Research and Advanced Applications, 233-244, ( Lecture Notes in Computer Science; vol. 8968)
Bloem R., Ehlers R., Jacobs S., Könighofer R.
Proceedings 3rd Workshop on Synthesis (SYNT 2014), Workshop on Synthesis (SYNT 2014), 34-50, (EPTCS; vol. 157)
Khalimov A., Bloem R., Jacobs S.
SYNT 2014, 68-83
Bloem R., Könighofer R., Röck F., Tautschnig M.
International Conference on Quality Software, International Conference on Quality Software, 67-72
Pammer-Schindler V., Stern H., Edler S., Hein D., Pirker M., Bloem R., Wertner A.
Proceeding i-KNOW '14 Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business, 14th International Conference on Knowledge Technologies and Data-driven Business (i-KNOW 2014), ?-?
Zefferer T., Krnjic V., Stranacher K., Zwattendorfer B.
Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders, 45-74