We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2
Fasllija E., More S.
Availability, Reliability and Security
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection. SEC 2025.
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Fasllija E., Heher J., More S.
Network and System Security. NSS 2024.
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings
This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining
Marsalek A., Fasllija E., Ziegler D.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunication: SECRYPT
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
Fasllija E., Enişer H., Prünster B.
15th EAI International Conference on Security and Privacy in Communication Networks
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Policy-based access control for the IoT and Smart Cities
Omolola O., More S., Fasllija E., Wagner G., Alber L.
Open Identity Summit 2019, Proceedings
