We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography
A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions
Zefferer T., Prünster B., Kollmann C., Corici A., Alber L., Czerny R., Podgorelec B.
DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research
Towards a Mobile-First Cross-Border eID Framework
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
Proceedings of the 24th Annual International Conference on Digital Government Research - Together in the Unstable World
Total Eclipse of the Heart – Disrupting the InterPlanetary File System
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium
AndroTIME: Identifying Timing Side Channels in the Android API
Palfinger G., Prünster B., Ziegler D.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
AndroPRINT: Analysing the Fingerprintability of the Android API
Palfinger G., Prünster B.
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality
Prünster B., Palfinger G., Ziegler D.
Network and System Security - 14th International Conference, NSS 2020, Proceedings
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
Fasllija E., Enişer H., Prünster B.
15th EAI International Conference on Security and Privacy in Communication Networks
Prying CoW: Inferring Secrets Across Virtual Machine Boundaries
Palfinger G., Prünster B., Ziegler D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Fides – Unleashing the Full Potential of Remote Attestation
Prünster B., Palfinger G., Kollmann C.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
SeDiCom
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings
SUNFISH ID1v2 – Identity Management and Access Control at Work
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
In Certificates We Trust - Revisited
Reimair F., Teufl P., Prünster B.
Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
