explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Zwattendorfer B., Zefferer T., Stranacher K.
Web Information Systems and Technologies 2014, Springer, 128-144
Bloem R., Chatterjee K., Greimel K., Henzinger T., Hofferek G., Jobstmann B., Könighofer B., Könighofer R.
Acta informatica, Vol. 51(3), 193-220
Bloem R., Hofferek G., Könighofer B., Könighofer R., Außerlechner S., Spörk R.
Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design FMCAD 2014, International Conference on Formal Methods in Computer-Aided Design, 35-42
Zefferer T.
The 12th International Conference on Advances in Mobile Computing and Multimedia, 12th International Conference on Advances in Mobile Computing & Multimedia (MoMM2014), 175-184
Teufl P., Zefferer T., Wörgötter C., Oprisnik A., Hein D.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Zefferer T., Zwattendorfer B.
10th International Conference on Web Information Systems and Technologies, 10th International Conference on Web Information Systems and Technologies, 302-309
Zwattendorfer B., Zefferer T., Stranacher K.
Proceedings of the 10th International Conference on Web Information Systems and Technologies, 10th International Conference on Web Information Systems and Technologies, 82-92
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress, ID World International Congress, 1-8
Leitold H.
Proceeedings of AHFE 2014, 5th International Conference on Applied Human Factors and Ergonomics, 2669-2679
Könighofer R., Tögl R., Bloem R.
Hardware and Software: Verification and Testing - Proceedings of the 10th International Haifa Verification Conference (HVC 2014), Haifa Verification Conference, 92-98, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8855)
Bloem R., Egly U., Klampfl P., Könighofer R., Lonsing F.
Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 31-34
Bloem R., Könighofer R., Seidl M.
Verification, Model Checking, and Abstract Interpretation, 15th International Conference, International Conference on Verification, Model Checking, and Abstract Interpretation, 1-20, (Lecture Notes in Computer Science; vol. 8318)
Tauber A.
IEEE Conference on Communications and Network Security, IEEE Conference on Communications and Network Security
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014, 2014 Fast Software Encryption Workshop, 473-488, (Lecture Notes in Computer Science; vol. 8540)
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014, International Conference on Cryptology and Information Security in Latin America, 274-287, (LNCS)
Gruß D.
, Master's Thesis
Lenz T., Zwattendorfer B., Stranacher K., Tauber A.
eGovernment Review, 18-19
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 1-19, (Lecture Notes in Computer Science; vol. 8781)
Mangard S.
IEEE Security & Privacy, Vol. 11(4), 75-77