We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Analysis of symbolic SCC hull algorithms
Bloem R., Somenzi F., Ravi K.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 88-105
Fair simulation minimization
Bloem R., Gurumurthy S., Somenzi F.
International Conference on Computer Aided Verification, Springer, 610-623
Identification and Confidentiality for e-Government
Leitold H., Posch R.
Certification and Security in E-Services: From E-Government to E-Business, 25-30
Low-cost AES
Rechberger C., Popp T., Tillich S.
Proceedings of Austrochip 2002, October 4, 2002, Graz, Austria, Austrochip 2008, 131-136
Elliptic Curve Cryptography in Practice — The Austrian Citizen Card for e-Government Applications
Großschädl J., Kamendje Tchokobou G., Oswald M., Posch R.
Proceedings of the International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W), International Conference on Advances in Infrastructure for Electronic Business, Education, Science and Medicine on the Internet (SSGRR 2002W), -
A New Approach to DNS Security (DNSSEC)
Mangard S., Giuseppe A.
Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), ACM Conference on Computer and Communications Security, 86-95
Search Techniques and Automata for Symbolic Model Checking
Bloem R.
, Doctoral Thesis
Divide and compose: SCC refinement for language emptiness
Wang C., Bloem R., Hachtel G., Ravi K., Somenzi F.
CONCUR 2001 - Concurrency Theory, International Conference on Concurrency Theory, 456-471, (Lecture notes in computer science)
A comparison of tree transductions defined by monadic second order logic and by attribute grammars
Bloem R., Engelfriet J.
Journal of Computer and System Sciences, Vol. 61(1), 1-50
An algorithm for strongly connected component analysis in n log n symbolic steps
Bloem R., Gabow H., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 37-54
A comparative study of symbolic algorithms for the computation of fair cycles
Bloem R., Ravi K., Somenzi F.
International Conference on Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 143-160
Symbolic guided search for CTL model checking
Bloem R., Ravi K., Somenzi F.
Design Automation Conference, 29-34
Efficient Büchi automata from LTL formulae
Bloem R., Somenzi F.
International Conference on Computer Aided Verification, Springer, 248-263
Approximations for fixpoint computations in symbolic model chec king
Bloem R., Moon I., Ravi K., Somenzi F.
World Multiconference on Systemics, Cybernetics and Informatics, 701-706
Efficient decision procedures for model checking of linear time logic properties
Bloem R., Ravi K., Somenzi F.
International Conference on Computer Aided Verification, International Conference on Computer Aided Verification, 222-235
Monadic second order logic and node relations on graphs and trees
Bloem R., Engelfriet J.
Lecture notes in computer science 1261, Springer, 144-161
Attribute Grammars and Monadic Second Order Logic
Bloem R.
, Master's Thesis
Bildschirmtext - an Open Videotex Network for Text and Graphic Applications
Fellner W., Posch R.
Computers & Graphics, Vol. 11(4), 359-367
Graphik-Hardware - die Nutzung von VLSI-Design gezeigt am Beispiel einer Kreismaschine
Posch K., Fellner W., Posch R.
Die Zukunft der Informationssysteme : Lehren der 80er Jahre, Gemeinsame Fachtagung der ÖGI und der GI, 164-185, (Betriebs- und Wirtschaftsinformatik)
PC mit Btx-Frontend-Prozessor - Kommunikationslandschaft der Zukunft?
Fellner W., Posch R., Welser M.
Eurosoft '86 ; 3, Euro-Software, ---