We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Cooperative Reactive Synthesis
Bloem R., Ehlers R., Könighofer R.
Automated Technology for Verification and Analysis (ATVA'15)
Synthesizing cooperative reactive mission plans
Ehlers R., Könighofer R., Bloem R.
2015 IEEE/RSJ International Conference on Intelligent Robots and Systems
Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information
Bloem R., Chatterjee K., Jacobs S., Könighofer R.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference
Future Directions in Mobile Government
Zefferer T.
IADIS International Journal on WWW/Internet, Vol. 13(2), 2015
Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation
Rath C., Roth S., Bratko H., Zefferer T.
Electronic Government and the Information Systems Perspective. EGOVIS 2015
POWER: A Cloud-based Mobile Augmentation Approach for Web- and Cross-Platform Applications
Reiter A., Zefferer T.
2015 IEEE 4th International Conference on Cloud Networking (CloudNet)
Paving the Way for Security in Cloud-Based Mobile Augmentation Systems
Reiter A., Zefferer T.
3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015)
WebCrySIL - Web Cryptographic Service Interoperability Layer
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies
Secure single sign-on authentication using eIDs across public clouds
Zwattendorfer B., Tauber A.
International Journal of Internet Technology and Secured Transactions, Vol. 5(4), 2015
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015
Forgery Attacks on round-reduced ICEPOLE-128
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015
Cryptanalysis of Ascon
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015
Related-Key Forgeries for Proest-OTR
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015
On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014
How to Handle Assumptions in Synthesis
Bloem R., Ehlers R., Jacobs S., Könighofer R.
Proceedings 3rd Workshop on Synthesis (SYNT 2014)
Parameterized Synthesis Case Study: AMBA AHB
Khalimov A., Bloem R., Jacobs S.
SYNT 2014
Automating Test-Suite Augmentation
Bloem R., Könighofer R., Röck F., Tautschnig M.
International Conference on Quality Software
Security Concepts for a Distributed Architecture for Activity Logging and Analysis
Pammer-Schindler V., Stern H., Edler S., Hein D., Pirker M., Bloem R., Wertner A.
Proceeding i-KNOW '14 Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business
Measuring Usability to Improve the Efficiency of Electronic Signature-based E-Government Solutions
Zefferer T., Krnjic V., Stranacher K., Zwattendorfer B.
Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders, 45-74, 2014
A Comparative Survey of Cloud Identity Management-Models
Zwattendorfer B., Zefferer T., Stranacher K.
Web Information Systems and Technologies 2014, Springer, 128-144, 2014
