We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Genuine PDF Forgeries
Heher J., Pichler E., More S.
IFIP Advances in Information and Communication Technology
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection. SEC 2025.
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Fasllija E., Heher J., More S.
Network and System Security. NSS 2024.
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings
Offline-verifiable Data from Distributed Ledger-based Registries
More S., Heher J., Walluschek C.
Proceedings - 19th International Conference on Security and Cryptography (SECRYPT 2022)
