We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
How to Handle Assumptions in Synthesis
Bloem R., Ehlers R., Jacobs S., Könighofer R.
Proceedings 3rd Workshop on Synthesis (SYNT 2014)
Parameterized Synthesis Case Study: AMBA AHB
Khalimov A., Bloem R., Jacobs S.
SYNT 2014
Automating Test-Suite Augmentation
Bloem R., Könighofer R., Röck F., Tautschnig M.
International Conference on Quality Software
Security Concepts for a Distributed Architecture for Activity Logging and Analysis
Pammer-Schindler V., Stern H., Edler S., Hein D., Pirker M., Bloem R., Wertner A.
Proceeding i-KNOW '14 Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business
Measuring Usability to Improve the Efficiency of Electronic Signature-based E-Government Solutions
Zefferer T., Krnjic V., Stranacher K., Zwattendorfer B.
Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders, 45-74, 2014
A Comparative Survey of Cloud Identity Management-Models
Zwattendorfer B., Zefferer T., Stranacher K.
Web Information Systems and Technologies 2014, Springer, 128-144, 2014
An Implementation-Independent Evaluation Model for Server-Based Signature Solutions
Zefferer T., Zwattendorfer B.
10th International Conference on Web Information Systems and Technologies
An Overview of Cloud Identity Management-Models
Zwattendorfer B., Zefferer T., Stranacher K.
Proceedings of the 10th International Conference on Web Information Systems and Technologies
Synthesizing Robust Systems
Bloem R., Chatterjee K., Greimel K., Henzinger T., Hofferek G., Jobstmann B., Könighofer B., Könighofer R.
Acta informatica, Vol. 51(3), 2014
Synthesis of Synchronization using Uninterpreted Functions
Bloem R., Hofferek G., Könighofer B., Könighofer R., Außerlechner S., Spörk R.
Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design FMCAD 2014
An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
Tauber A.
IEEE Conference on Communications and Network Security
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014
Key Recovery Attacks on Recent Authenticated Ciphers
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014
Multi-platform Operating System Kernels
Gruß D.
Master's Thesis, 2014
Automatic Error Localization for Software using Deductive Verification
Könighofer R., Tögl R., Bloem R.
Hardware and Software: Verification and Testing - Proceedings of the 10th International Haifa Verification Conference (HVC 2014)
SAT-based methods for circuit synthesis
Bloem R., Egly U., Klampfl P., Könighofer R., Lonsing F.
Formal Methods in Computer-Aided Design
SAT-Based Synthesis Methods for Safety Specs
Bloem R., Könighofer R., Seidl M.
Verification, Model Checking, and Abstract Interpretation, 15th International Conference
A Server-Based Signature Solution for Mobile Devices
Zefferer T.
The 12th International Conference on Advances in Mobile Computing and Multimedia
STORK 2.0: Breaking New Grounds on eID and Mandates
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress
Supporting Decision Making and Policy Through Large Scale Pilots
Leitold H.
Advances in Human Factors and Ergonomics 2014
