We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Fasllija E., Heher J., More S.
18th International Conference on Network and System Security Proceedings, 18th International Conference on Network and System Security, ( Lecture Notes in Computer Science)
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 19th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining
Marsalek A., Fasllija E., Ziegler D.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunication: SECRYPT, 17th International Conference on Security and Cryptography, 388-396
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
Fasllija E., Enişer H., Prünster B.
15th EAI International Conference on Security and Privacy in Communication Networks, 15th EAI International Conference on Security and Privacy in Communication Networks
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 626-633, (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019)
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 252--259
Policy-based access control for the IoT and Smart Cities
Omolola O., More S., Fasllija E., Wagner G., Alber L.
Open Identity Summit 2019, Proceedings, Open Identity Summit 2019, 157-163, (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293)