We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Practical memory deduplication attacks in sandboxed javascript
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings, 20th European Symposium on Research in Computer Security, ESORICS 2015, 108-122, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326)
Decidability of Parameterized Verification
Khalimov A., Bloem R., Veith H., Widder J., Konnov I., Rubin S., Jacobs S.
Case Study: Automatic Test Case Generation for a Secure Cache Implementation
Bloem R., Hein D., Röck F., Schumi R.
International Conference on Tests And Proofs, International Conference on Tests and Proofs
Shield Synthesis: - Runtime Enforcement for Reactive Systems
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 533-548, (Lecture Notes in Computer Science; vol. 9035)
Towards Transactional Electronic Services on Mobile End-User Devices - A Sustainable Architecture for Mobile Signature Solutions
Zefferer T.
11th International Conference on Web Information Systems and Technologies, 586-597
Towards a New Generation of Mobile Government
Zefferer T.
13th International Conference on e-Society 2015, 13th International Conference on e-Society (ES 2015), 191-198
Games for BCI Skill Learning
Scherer R., Müller-Putz G., Friedrich E., Pammer-Schindler V., Wilding K., Keller S., Pirker J.
Handbook of Digital Games and Entertainment Technologies, 1-19
Designing for Engaging BCI Training: A Jigsaw Puzzle
Pammer-Schindler V., Simon J., Wilding K., Keller S., Scherer R.
CHI PLAY '15, ACM SIGCHI Annual Symposium on Computer-Human Interaction in Play, 667-672
In Certificates We Trust - Revisited
Reimair F., Teufl P., Prünster B.
Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), 702-709
Attribute-based Encryption goes X.509
Reimair F., Feichtner J., Teufl P.
IEEE International Conference on e-Business Engineering (ICEBE), IEEE International Conference on e-Business Engineering, 393-400
WebCrySIL - Web Cryptographic Service Interoperability Layer
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies, 11th International Conference on Web Information Systems and Technologies, 35-44
MoCrySIL - Carry Your Cryptographic Keys in Your Pocket
Reimair F., Teufl P., Kollmann C., Thaller C.
12th International Conference on Security and Cryptography, 285-292
Fortgeschrittene PDF Signaturen mit PAdES
Fitzek A., Maierhofer C., Tauber A., Zwattendorfer B.
eGovernment Review, 16-17
Java Privacy Guard - The OpenPGP Message Format and an Implementation in Java
More S.
, Bachelor's Thesis
Analysis of SHA-512/224 and SHA-512/256
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 612-630, (LNCS)
Higher-Order Cryptanalysis of LowMC
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015, International Conference on Information Security and Cryptology, 87-101, (LNCS; vol. 9558)
Cooperative Reactive Synthesis
Bloem R., Ehlers R., Könighofer R.
Automated Technology for Verification and Analysis (ATVA'15), International Symposium on Automated Technology for Verification and Analysis, 394-410, (Lecture Notes in Computer Science; vol. 9364)
Synthesizing cooperative reactive mission plans
Ehlers R., Könighofer R., Bloem R.
2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 3478-3485
Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information
Bloem R., Chatterjee K., Jacobs S., Könighofer R.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 517-532, (Lecture Notes in Computer Science; vol. 9035)
Future Directions in Mobile Government
Zefferer T.
IADIS International Journal on WWW/Internet, Vol. 13(2), 17-33