explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 410-424, (Lecture Notes in Computer Science; vol. 6174)
Bloem R., Cimatti A., Greimel K., Hofferek G., Könighofer R., Roveri M., Schuppan V., Seeber R.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 425-429, (Lecture Notes in Computer Science; vol. 6174)
Rössler T., Tauber A.
ISSE 2010 Securing Electronic Business Processes, Information Security Solutions Europe Conference, 122-130
Tauber A., Rössler T.
Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC 2010), IEEE Conference on Commerce and Enterprise Computing, 9-17
Tauber A., Rössler T.
The Proceedings of the 10th European Conference on eGovernment (ECEG 2010), European Conference on E-Government, 382-390
Zefferer T., Knall T.
Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010, 25th Annual ACM Symposium on Applied Computing, 1840-1845
Schmidt J., Plos T., Kirschbaum M., Hutter M., Medwed M., Herbst C.
Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, International Conference on Smart Card Research and Advanced Applications, 36-48, (LNCS)
Tauber A., Zwattendorfer B., Zefferer T., Mazhari Y., Chamakiotis E.
Electronic Government and the Information Systems Perspective , 1st International Conference on Electronic Government and the Information Systems Perspective, 120-133, (Lecture Notes in Computer Science; vol. 6267)
Leitold H., Zwattendorfer B.
ISSE 2010 Securing Electronic Business Processes, ISSE 2010 Security Conference, 131-142
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010, 10th Cryptographers' Track at the RSA Conference, 350-365, (Lecture Notes in Computer Science; vol. 5985)
Medwed M., Herbst C.
Workshop Proceedings COSADE 201, 1st International Workshop on Constructive Side-Channel Analysis and Secure Design, 56-71
Popp T., Kirschbaum M., Mangard S.
Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, Cryptographers´ Track at the RSA Conference, 211-225, (Lecture Notes in Computer Science)
Bloem R., Chatterjee K., Henziger T., Jobstmann B.
International Conference on Computer Aided Verification, 140-156
Ivkovic M., Leitold H., Rössler T.
7. Information Security Konferenz, Information Security Konferenz 2009, 175-190
Rechberger C.
, Doctoral Thesis
Mendel F., Rechberger C., Schläffer M.
Applied Cryptography and Network Security, 7th International Conference on Applied Cryptography and Network Security, 342-353, (Lecture Notes in Computer Science; vol. 5536)
Aumasson J., Dunkelman O., Mendel F., Rechberger C., Thomsen S.
Lecture Notes in Computer Science, 2nd International Conference on Cryptology in Africa, 14-28, (LNCS)
Rechberger C.
Tagungsband 11. Deutscher IT-Sicherheitskongress, Deutscher IT-Sicherheitskongress
Knudsen L., Mendel F., Rechberger C., Thomsen S.
Advances in Cryptology - EUROCRYPT 2009, Eurocrypt - International Conference on the Theory and Applications of Cryptographic Techniques, 106-120, (LNCS)