Publications
SYSSEC Publications (Coming from CRIS)
Victor Mayoral-Vilches, Jason Jabbour, Yu-Shun Hsiao, Zishen Wan, Martiño Crespo-Álvarez, Matthew Stewart, Juan Reina-Muñoz, Prateek Nagras, Gaurav Vikhe, Mohammad Bakhshalipour, Martin Pinzger, Stefan Rass, Smruti Panigrahi, Giulio Corradi, Niladri Roy, Phillip Gibbons, Sabrina Neuman, Brian Plancher, Vijay Reddi: RobotPerf: An open-source, vendor-agnostic, benchmarking suite for evaluating robotics computing system performance. Proceedings of the IEEE International Conference on Robotics and Automation (ICRA 2024), IEEE, Piscataway (NJ), 2024, S. 8288 - 8297.
Michael Sonntag, René Mayrhofer, Stefan Rass: Anonymously Publishing Liveness Signals withPlausible Deniability. Advances in Mobile Computing and Multimedia Intelligence, Springer, Cham, 14417, 2023, S. 3 - 19.
Víctor Vilches, Jason Jabbour, Yu-Shun Hsiao, Zishen Wan, Alejandra Martínez-Fariña, Martiño Crespo-Álvarez, Matthew Stewart, Juan Reina-Muñoz, Prateek Nagras, Gaurav Vikhe, Mohammad Bakhshalipour, Martin Pinzger, Stefan Rass, Smruti Panigrahi, Giulio Corradi, Niladri Roy, Phillip Gibbons, Sabrina Neuman, Brian Plancher, Vijay Reddi: RobotPerf: An open-source, vendor-agnostic, benchmarking suite for evaluating robotics computing system performance. arxiv.org, arXiv.org, Ithaca, NY, 2023,
Stefan Rass, Martin Pinzger: Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code. arxiv.org, arXiv.org, Ithaca, NY, 2023,
Gelei Deng, Yi Liu, Víctor Mayoral Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass: PentestGPT: An LLM-empowered Automatic Penetration Testing Tool. arXiv, arXiv.org, Ithaca, NY, 2023,
Víctor Mayoral Vilches, Gelei Deng, Yi Liu, Martin Pinzger, Stefan Rass: ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics. arXiv, arXiv.org, Ithaca, NY, 2023,
Shahzad Ahmad, Stefan Rass: How to Plausibly Deny Steganographic Secrets. Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023, SciTePress Digital Library, Setubal, 2023, S. 731 - 737.
Shahzad Ahmad, Stefan Rass, Peter Schartner: False-Bottom Encryption: Deniable Encryption From Secret Sharing. IEEE Access, IEEE, 11, Piscataway (NJ), 2023, S. 62549 - 62564.
Stefan Rass, Sandra König, Jasmin Wachter, Victor Mayoral-Vilches, Emmanouil Panaousis: Game-theoretic APT defense. Computers & Security, Elsevier, 132, 2023,
Christian Kop, Gerhard Leitner, Peter Schartner, Volodymyr Shekhovtsov, Claudia Steinberger, Eleni Zografou, Daniela Elisabeth Ströckl, Christoph Voutsinas, Herbert Groiss, Johannes Hölzl, Markus Irrasch: Towards a beneficial management of personal health records. Procedia Computer Science, Elsevier Ltd., 219, Oxford, 2023, S. 1145 - 1152.
Stefan Rass, Sandra König: Synchronization in Security Games. Decision and Game Theory for Security , Springer, Cham, 2023, S. 129 - 148.
Stefan Rass: Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks. arxiv.org, arXiv.org, Ithaca, NY, 2023,
Stefan Rass, Sandra König, Shahzad Ahmad, Maksim Goman: Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds. http://arxiv.org/, 2022,
Peter Schartner: Der lange Weg vom Rollsiegel zur qualifizierten elektronischen Unterschrift. Festschrift Peter Mader, LexisNexis Verlag ARD Orac GmbH & Co KG, Wien, 2022,
Miralem Mehic, Stefan Rass, Emir Dervisevic, Miroslav Voznak: Tackling Denial of Service Attacks in Software-Defined Quantum Key Distribution Networks. IEEE Access, IEEE, 10, Piscataway (NJ), 2022, S. 110512 - 110520.
Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, K. Liang, George Loukas, Emmanouil Panaousis: HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. IEEE Access, IEEE, 10, Piscataway (NJ), 2022, S. 104671 - 104685.
Miralem Mehic, Stefan Rass, Peppino Fazio, Miroslav Voznak: Quantum Key Distribution Networks. Springer Nature Switzerland AG, 2022,
Stefan Schauer, Thomas Hiebl, Benjamin Doppler, Wolfgang Mayr, Stefan Rass, Sandra König, Martin Latzenhofer: A Simulation-driven Tool for Supporting Risk and Resilience Assessment in Cities. Proceedings of the 60th ESReDA seminar, Publications Office of the European Union, Luxembourg, 2022, S. 93 - 104.
Stefanie Fasching, Ingrid Huber, Iris Mallweger-Grasser, Peter Mandl, David Sabitzer, Peter Schartner, Edith Schneider, Thomas Weissel: Tag der digitalen Grundbildung: Interdisziplinäre Vernetzung,Informationsaustausch und Wissenstransfer. Projektbezogene Kooperation von Schule und Universität, Waxmann Verlag GmbH, Münster, 2022, S. 241 - 260.
Stefan Rass, Sandra König, Stefan Schauer: Games over Probability Distributions Revisited: New Equilibrium Models and Refinements. Games, 13, 2022,
Stefan Rass, Sandra König, Jasmin Wachter, Manuel Philip Egger, Manuel Hobisch: Supervised Machine Learning with Plausible Deniability. Computers & Security, Elsevier, 112, 2021,
Branislav Bošanský, Cleotilde Gonzalez, Stefan Rass, Arunesh Sinha: Decision and Game Theory for Security. Lecture Notes in Computer Science, 2021,
Sandra König, Stefan Schauer, Stefan Rass: Multi-Categorical Risk Assessment for Urban Critical Infrastructures. Proceedings of the 16th International Conference on Critical Information Infrastructures Security (CRITIS 2021), Springer, Berlin, 2021,
Stefan Rass, Sandra König, Stefan Schauer: Semi‐automated Parameterization of a Probabilistic Model Using Logistic Regression—A Tutorial. Game Theory and Machine Learning for Cyber Security, John Wiley & Sons Inc., Hoboken (NJ), 2021, S. 438 - 484.
Victor Mayoral-Vilches, Alfonso Glera-Picón, Unai Ayúcar-Carbajo, Stefan Rass, Martin Pinzger, Federico Maggi, Endika Gil-Uriarte: Hacking planned obsolescense in robotics, towards security-oriented robot teardown. Electronic Communications of the EASST, 80, 2021,
Victor Mayoral-Vilches, Alfonso Glera-Picón, Unai Ayúcar-Carbajo, Stefan Rass, Martin Pinzger, Federico Maggi, Endika Gil-Uriarte: Robot Teardown: stripping industrial robots for good. International Journal of Cyber Forensics and Advanced Threat Investigations, 2021,
Quanyan Zhu, Stefan Rass, Bernhard Dieber, Víctor Mayoral Vilches: Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice. now publishers Inc, 9, Hanover, United States, 2021,
Antonia Nisioti, George Loukas, Stefan Rass, Emmanouil Panaousis: Game-Theoretic Decision Support for Cyber Forensic Investigations. Sensors, MDPI Publishing, 21, Basel, 2021,
Stefan Rass, Sandra König, Stefan Schauer, Vincent Bürgin, Jeremias Epperlein, Fabian Wirth: On Game Theory Using Stochastic Tail Orders. http://arxiv.org/, 2021,
Patrick Kubiak, Stefan Rass, Martin Pinzger, Stephan Schneider: A Method for the Joint Analysis of Numerical and Textual IT-System Data to Predict Critical System States. Communications in Computer and Information Science, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2021, S. 242 - 261.
Stefan Rass, Sandra König, Jasmin Wachter, Manuel Philip Egger, Manuel Hobisch: Supervised Machine Learning with PlausibleDeniability. http://arxiv.org/, 2021,
Stefan Schauer, Stefan Rass, Sandra König: Simulation-driven Risk Model for Interdependent Critical Infrastructures. Poceedings of the 18th ISCRAM Conference, 2021, S. 404 - 415.
G. Liuzzi, M. Locatelli, Veronica Piccialli, Stefan Rass: Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems. Computational Optimization and Applications, 79, 2021, S. 561 - 599.
Benjamin Breiling, Bernhard Dieber, Martin Pinzger, Stefan Rass: A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows. Smart Cities Cybersecurity and Privacy, Elsevier Press, 1, USA, 2021, S. 93 - 118.
Mathias Jesse, Claudia Steinberger, Peter Schartner: In Search of a Conversational User Interface for Personal Health Assistance. 14th International Conference on Health Informatic, 2021, S. 724 - 732.
Stefan Schauer, Martin Latzenhofer, Sandra König, Stefan Rass: Conceptual Approach Towards a Combined Risk and Resilience Framework for Interdependent Infrastructures. Proceedings of the 31st European Safety and Reliability Conference, Research Publishing, 2021, S. 2161 - 2171.
Christian Wankmüller, Stefan Rass, Friederike Wall: Ten expert views on the COVID-19 pandemic. Mind & Society, Springer International Publishing AG, 20, Cham, 2021, S. 111 - 112.
Stefan Schauer, Stefan Rass: Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities. IFIP Advances in Information and Communication Technology, Springer, 596, Berlin, 2020, S. 307 - 323.
Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martin, Stefan Schauer, Andreas Poppe, Christoph Pacher: Quantum Key Distribution. ACM Computing Surveys (CSUR), 53, 2020, S. 1 - 41.
Florian Skopik, Max Landauer, Markus Wurzenberger, Gernot Vormayr, Jelena Milosevic, Joachim Fabini, Wolfgang Prüggler, Oskar Kruschitz, Benjamin Widmann, Kevin Truckenthanner, Stefan Rass, Michael Simmer, Christoph Zauner: synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. Journal of Information Security and Applications , 54, 2020,
Stefan Rass: Judging the quality of (fake) news on the internet. Mind & Society, Springer International Publishing AG, Cham, 2020,
Sandra König, Antonios Gouglidis, Stefan Rass, Neil Adams, Paul Smith, David Hutchison: Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach. Guide to Disaster-Resilient Communication Networks, 2020, S. 769 - 789.
Daniela Elisabeth Ströckl, Claudia Steinberger, Vladimir A. Shekhovtsov, Gerhard Leitner, Christian Kop, Peter Schartner: Smart City Technology meets Smart Health Assistive Systems – on the example of the project AYUDO. Proceedings of the 13th ACM International Conference on Pervasive TechnologiesRelated to Assistive Environments, ACM Press, New York (NY), 2020, S. 1 - 7.
Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu: Cyber-Security in Critical Infrastructures. Springer Nature Switzerland AG, 2020,
Stefan Schauer, Stefan Rass: A Cross-Domain Simulation Model for Supporting Risk Analyses of Large Cities. Fourteenth IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2020,
G. Liuzzi, M. Locatelli, V. Piccialli, Stefan Rass: Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems. Optimization Online, 2020,
Sergei Bauer, Stefan Rass, Peter Schartner: Generic Parity-Based Concurrent Error Detection for Lightweight ARX Ciphers. IEEE Access, IEEE, 8, Piscataway (NJ), 2020, S. 142016 - 142025.
Stefan Schauer, Stefan Rass, Sandra König, Klaus Steinnocher, Thomas Schaberreiter, Gerald Quirchmayr: Cross-Domain Risk Analysis to Strengthen City Resilience: the ODYSSEUS approach. ISCRAM 2020 Conference Proceedings - 17th International Conference on Information Systems for Crisis Response and Management, International Community on information systems for crisis response and management (ISCRAM), Brussels, 2020, S. 652 - 662.
C. Cichy, Stefan Rass: Fuzzy Expert Systems for Automated Data Quality Assessment and Improvement Processes. Proceedings of the EKAW 2020 Posters and Demonstrations Session, 2751, 2020, S. 7 - 11.
Patrick Kubiak, Stefan Rass, Martin Pinzger: IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log Files. Proceedings of the 15th International Conference on Software Technologies (ICSOFT 2020), SCITEPRESS – Science and Technology Publications, SciTePress - Science and Technology Publications, Setubal, 2020, S. 589 - 596.
Christian Kollmitzer, Stefan Schauer, Stefan Rass, Benjamin Rainer: Quantum Random Number Generation - Theory and Practice. Springer Nature Switzerland AG, 2020,
Stefan Rass, Angelika Wiegele, Sandra König: Security Games over Lexicographic Orders. 11th Conference on Decision and Game Theory for Security , Springer, 12513, 2020, S. 422 - 441.
Sandra König, Thomas Alexander Grafenauer, Stefan Schauer, Manuel Warum, Stefan Rass: A Guideline on the Analysis of Stochastic Interdependencies in Critical Infrastructures. International Journal On Advances in Security, 12, 2019, S. 164 - 176.
Miralem Mehic, Peppino Fazio, Stefan Rass, Oliver Maurhart, Momtchil Peev, Andreas Poppe, Jan Rozhon, Marcin Niemiec, Miroslav Voznak: A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks . IEEE / ACM Transactions on Networking, IEEE, Piscataway (NJ), 2019, S. 1 - 10.
Peter Schartner: 16. Österreichischer IT-Sicherheitstag. 16. Österreichischer IT-Sicherheitstag, syssec (Klagenfurt), Klagenfurt, 2019,
C. Cichy, Stefan Rass: An Overview of Data Quality Frameworks. IEEE Access, IEEE, 7, Piscataway (NJ), 2019, S. 24634 - 24648.
Quanyan Zhu, Stefan Rass, Peter Schartner: Community-Based Security for the Internet of Things . Smart Cities Cybersecurity and Privacy, Elsevier Press, USA, 2019, S. 11 - 19.
Sergei Bauer, Martin Brunner, Peter Schartner: Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys . 2019 Third IEEE International Conference on Robotic Computing (IRC), 2019, S. 425 - 426.
Peter Schartner: Modul: IT-Sicherheit. Modul: IT-Sicherheit, 2019,
Sergei Bauer, Peter Schartner: Reducing Risk Potential by Evaluating Specialized Countermeasures for Electronic Control Units. Proceedings of 7th escar (Embedded Security in Cars) USA 2019, 2019, S. 13
C. Cichy, Stefan Rass: A Fuzzy-Approximation Approach to Explainable Information Quality Assessment . Proceedings of the 34th International Business Information Management Association Conference (IBIMA), International Business Information Management Association, 2019, S. 3919 - 3931.
Sandra König, Thomas Schaberreiter, Stefan Rass, Stefan Schauer: A Measure for Resilience of Critical Infrastructures . Critical Information Infrastructures Security, Springer Verlag GmbH, 11260, Berlin, Heidelberg, New York, 2019, S. 57 - 71.
Stefan Schauer, Thomas Alexander Grafenauer, Sandra König, Stefan Rass: A Simulation-driven Approach for Measuring Risk and Resilience in the Network of Critical Infrastructures. 56th ESReDA Seminar (23-24 May 2019, Linz, Austria), 2019, S. 212 - 223.
Stefan Rass, Sandra König, Emmanouil Panaousis: Cut-The-Rope: A Game of Stealthy Intrusion . Decision and Game Theory for Security, Springer, Berlin, 2019, S. 404 - 416.
Sandra König, Stefan Rass, Stefan Schauer: Cyber-Attack Impact Estimation for a Port . Proceedings of the Hamburg International Conference of Logistics (HICL), 2019, S. 163 - 183.
Stefan Schauer, Thomas Alexander Grafenauer, Sandra König, Manuel Warum, Stefan Rass: Estimating Cascading Effects in Cyber-Physical Critical Infrastructures. Critical Information Infrastructures Security , Springer Nature Switzerland AG, 2019, S. 43 - 56.
Nadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis: Honeypot Type Selection Games for Smart Grid Networks . Decision and Game Theory for Security, Springer, Berlin, 2019, S. 85 - 96.
Sandra König, Stefan Rass, Benjamin Rainer, Stefan Schauer: Hybrid Dependencies Between Cyber and Physical Systems . Intelligent Computing - Proceedings of the Computing Conference, 2, 2019, S. 550 - 565.
Stefan Rass, Stefan Schauer: Refining Stochastic Models of Critical Infrastructures by Observation. 56th ESReDA Seminar (23-24 May 2019, Linz, Austria), 2019, S. 198 - 211.
Stefan Rass, F. Skopik, Andreas Schorn: Trust and Distrust: On Sense and Nonsense in Big Data . IFIP Advances in Information and Communication Technology, Springer, 547, Berlin, 2019, S. 1 - 14.
Stefan Rass, Sandra König: 'HyRiM': Multicriteria Risk Management using Zero-Sum Games with vector-valued payoffs that are probability distributions . CRAN, R Core Developers, Wien, 2018,
Peter Schartner: 15. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2018,
Peter Schartner, Norbert Pohlmann: DACH Security 2018. syssec (Frechen), -, Frechen, 2018,
Stefan Schauer, Sandra König, Stefan Rass, Thomas Alexander Grafenauer, Jasmin Wachter, Thomas Schaberreiter, Gerald Quirchmayr, Simon Poledna, Martin Latzenhofer, Romana Stollnberger, Klaus Steinnocher: Risikobewertung für vernetzte kritische Infrastrukturen. DACH Security 2018, syssec (Frechen), -, Frechen, 2018, S. 313 - 322.
Jasmin Wachter, Stefan Rass, Sandra König: Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria. Games, 9, 2018,
Stefan Rass, Stefan Schauer: Game Theory for Security and Risk Management: From Theory to Practice . Springer International Publishing AG, Cham, 2018,
Stefan Schauer, Sandra König, Martin Latzenhofer, Stefan Rass, Thomas Alexander Grafenauer: Analyzing Cascading Effects among Critical Infrastructures: The CERBERUS Approach. Proceedings of the 15th ISCRAM Conference, International Community on information systems for crisis response and management (ISCRAM), Brussels, 2018, S. 428 - 437.
Stefan Rass, Sandra König: Password Security as a Game of Entropies. Entropy, MDPI Publishing, 20, Basel, 2018, S. 312
Quanyan Zhu, Stefan Rass: On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats . IEEE Access, IEEE, 6, Piscataway (NJ), 2018, S. 13958 - 13971.
Gabriele Frankl, Peter Schartner, Dietmar Jost: The "Secure Exam Environment". Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing, Springer, 515, Berlin, 2018, S. 179 - 188.
Stefan Rass, Peter Schartner, Jasmin Wachter: Authentic Quantum Nonces. SECURWARE 2018: The Twelfth International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2018, S. 139 - 142.
Gabriele Frankl, Sebastian Napetschnig, Peter Schartner: Pathways to Successful Online Testing: eExams with the “Secure Exam Environment” (SEE). Technology Enhanced Assessment, Springer, Berlin, 2018, S. 190 - 209.
Miralem Mehic, Peppino Fazio, Stefan Rass, Oliver Maurhart, Momtchil Peev, Andreas Poppe, Jan Rozhon, Marcin Niemiec, Miroslav Voznak: A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks. http://arxiv.org/, 2018,
Thomas Alexander Grafenauer, Sandra König, Stefan Rass, Stefan Schauer: A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), ACM Press, New York (NY), 2018, S. 1 - 8.
Patrick Kubiak, Stefan Rass: An overview of data-driven techniques for IT-service-management. IEEE Access, IEEE, 6, Piscataway (NJ), 2018, S. 63664 - 63688.
Stefan Rass: Decision Making When Consequences Are Random. Game Theory for Security and Risk Management: From Theory to Practice , Springer International Publishing AG, Cham, 2018, S. 21 - 46.
Jasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer: Disappointment-Aversion in Security Games. Decision and Game Theory for Security. GameSec 2018, Springer, Berlin, 2018, S. 314 - 325.
Quanyan Zhu, Stefan Rass: Game Theory Meets Network Security: A Tutorial at ACM CCS. http://arxiv.org/, 2018,
Sandra König, Stefan Rass: Investigating Stochastic Dependencies Between Critical Infrastructures. International Journal On Advances in Systems and Measurements, International Academy, Research and Industry Association (IARIA), 11, Valencia, 2018, S. 250 - 258.
Stefan Rass: Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks. http://arxiv.org/, 2018,
Sandra König, Thomas Alexander Grafenauer, Stefan Rass, Stefan Schauer: Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To. SECURWARE 2018: The Twelfth International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2018, S. 150 - 157.
Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Rass, Stefan Schauer: Risk Assessment Uncertainties in Cybersecurity Investments . Games, 9, 2018,
Stefan Rass: Security Strategies and Multi-Criteria Decision Making. Game Theory for Security and Risk Management: From Theory to Practice , Springer International Publishing AG, Cham, 2018, S. 47 - 71.
Bernhard Dieber, Benjamin Breiling, Sebastian Taurer, Severin Kacianka, Stefan Rass, Peter Schartner: Security for the Robot Operating System. Robotics and Autonomous Systems, Elsevier B.V., 98, Amsterdam, 2017, S. 192 - 203.
Stefan Rass, Johannes Winkler: Learning pairing-based cryptography by hands-on exercises. 6th International Conference on Teaching, Assessment, and Learning for Engineering (TALE), IEEE, -, Piscataway (NJ), 2017, S. 186 - 191.
Peter Schartner: 14. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2017,
Miralem Mehic, Oliver Maurhart, Stefan Rass, Dan Komosny, Filip Rezac, Miroslav Voznak: Analysis of the Public Channel of Quantum Key Distribution Link. Journal of Quantum Electronics, IEEE, 53, Piscataway (NJ), 2017, S. 1 - 8.
Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer: Decision and Game Theory for Security. Springer, 10575, Berlin, 2017,
Miralem Mehic, Oliver Maurhart, Stefan Rass, Miroslav Voznak: Implementation of Quantum Key Distribution Network Simulation Module in the Network Simulator NS-3. Quantum Information Processing, Springer, 16, Berlin, 2017,
Stefan Rass, Sandra König, Stefan Schauer: On the Cost of Game Playing: How to Controlthe Expenses in Mixed Strategies. Decision and Game Theory for Security, Springer, 10575, Berlin, 2017, S. 494 - 505.
Peter Schartner, Andrea Baumann: DACH Security 2017. syssec (Frechen), Frechen, 2017,
Stefan Schauer, Sandra König, Martin Latzenhofer, Stefan Rass: Identifying and Managing Risks in Interconnected Utility Networks. SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2017, S. 79 - 86.
Sandra König, Stefan Rass: Stochastic Dependencies Between Critical Infrastructures. SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2017, S. 106 - 110.
Stefan Rass, Jasmin Wachter, Stefan Schauer, Sandra König: Subjektive Risikobewertung – Über Datenerhebung und Opinion Pooling. DACH Security 2017, syssec (Frechen), Frechen, 2017, S. 225 - 237.
Jasmin Wachter, Thomas Alexander Grafenauer, Stefan Rass: Visual Risk Specification and Aggregation. SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2017, S. 93 - 98.
Ali Alshawish, Mohamed Amine Abid, Stefan Rass, Hermann de Meer: Playing a Multi-objective Spot-checking Game in Public Transportation Systems. 4th Workshop on Security in highly connected IT systems (SHICS), ACM - New York, New York, NY, 2017, S. 31 - 36.
Stefan Rass: Towards a Physical Oracle for the Partition Problem using Analogue Computing. Arxiv, 2017,
Benjamin Breiling, Bernhard Dieber, Peter Schartner: Secure communication for the Robot Operating System. 2017 Annual IEEE Systems Conference (SysCon), IEEE, Piscataway (NJ), 2017, S. 360 - 366.
Stefan Rass, Ali Alshawish, Mohamed Amine Abid, Stefan Schauer, Quanyan Zhu, Hermann de Meer: Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory. IEEE Access, IEEE, 5, Piscataway (NJ), 2017, S. 1
Stefan Rass, Sandra König, Stefan Schauer: Defending Against Advanced Persistent Threats Using Game-Theory. PLOS ONE, Public Library of Science, 12, San Francisco (CA), 2017, S. 1 - 43.
Stefan Rass, Johannes Göllner, Andreas Peer, Gerald Quirchmayr, Viliam Zathurecky: Global Supply Chain Network Risk Analysis and Monitoring for Global Cyber Defense.. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense., Springer International Publishing AG, Cham, 2017, S. 1 - 23.
Markus Wamser, Stefan Rass, Peter Schartner: Oblivious lookup-tables. Tatra Mountains, 67, 2016, S. 191 - 205.
Stefan Rass, Sandra König, Stefan Schauer: Decisions with Uncertain Consequences-A Total Ordering on Loss-Distributions. PLOS ONE, Public Library of Science, San Francisco (CA), 2016, S. 1 - 23.
Stefan Rass, Quanyan Zhu: GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies against Advanced Persistent Threats. Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Springer, 9996, Berlin, 2016, S. 314 - 326.
Stefan Schauer, Sandra König, Stefan Rass, Antonios Gouglidis, Ali Alshawish, Hermann de Meer: Risk Minimization in Physical Surveillance: Playing an Uncertain Cops-and-Robbers Game. Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Springer, 9996, Berlin, 2016, S. 471 - 471.
Sandra König, Stefan Schauer, Stefan Rass: A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. Secure IT Systems - 21st Nordic Conference, NordSec 2016, Springer, 10014, Berlin, 2016, S. 67 - 81.
Hermann Seuschek, Stefan Rass: Side-channel leakage models for RISC instruction set architectures from empirical data. Microprocessors and Microsystems, Elsevier B.V., 47, Amsterdam, 2016, S. 74 - 81.
Stefan Rass, Peter Schartner: On the Security of a Universal Cryptocomputer – The Chosen Instruction Attack. IEEE Access, IEEE, 4, Piscataway (NJ), 2016, S. 7874 - 7882.
Peter Schartner: 13. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2016,
Bernhard Dieber, Severin Kacianka, Stefan Rass, Peter Schartner: Application-level Security for ROS-based Applications. Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, IEEE, Piscataway (NJ), 2016, S. 4478 - 4482.
Jeremy Busby, Antonios Gouglidis, Stefan Rass, Sandra König: Modelling Security Risk in Critical Utilities: The System at Risk as a Three Player Game and Agent Society. IEEE, 2016, S. 1 - 6.
Peter Schartner: D⋅A⋅CH Security 2016. syssec (Klagenfurt), Klagenfurt, 2016,
Bernhard Dieber, Severin Kacianka, Stefan Rass, Peter Schartner: Sicherheit für ROS-basierte Applikationen auf Anwendungsebene . D⋅A⋅CH Security 2016, syssec (Klagenfurt), Klagenfurt, 2016, S. 363 - 370.
Stefan Schauer, Sandra König, Stefan Rass, Martin Latzenhofer: Spieltheoretische Risikominimierung in IKT-Infrastrukturen. D⋅A⋅CH Security 2016, syssec (Klagenfurt), Klagenfurt, 2016, S. 174 - 187.
Stefan Rass: On the Existence of Weak One-Way Functions. Arxiv, 2016, S. 1 - 39.
Alexander Beck, Stefan Rass: Using Neural Networks to Aid CVSS Risk Aggregation – An empirically Validated Approach . Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference (FLAIRS), AAAI Press, Menlo Park (CA), 2016, S. 294 - 297.
Stefan Rass, Raphael Wigoutschnigg: Arguable Anonymity from Key-Privacy: The Deterministic Crowds Protocol . Proceedings of of IEEE/IFIP Network Operations and Management Symposium , IEEE, Piscataway (NJ), 2016, S. 571 - 576.
Stefan Rass, Peter Schartner: Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing. CLOUD COMPUTING 2016 The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, International Academy, Research, and Industry Association (IARIA), 2016, S. 7 - 13.
Sandra König, Stefan Rass, Stefan Schauer, Alexander Beck: Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Advanced Computer Science and Applications (IJACSA), SAI – The Science and Information Organization, 7, New York, NY , 2016, S. 694 - 701.
Stefan Rass, Peter Schartner, Monika Brodbeck: Private function evaluation by local two-party computation. EURASIP Journal on Information Security, Springer, 7, Berlin, 2015,
Stefan Rass: On Game-Theoretic Risk Management (Part Two). arXiv:1511.08591 [q-fin.EC], 2015,
Stefan Rass, Sandra König, Stefan Schauer: Uncertainty in Games: Using Probability-Distributions as Payoffs. Decision and Game Theory for Security, Springer International Publishing AG, 9406, Cham, 2015, S. 346 - 357.
Peter Schartner: 12. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2015,
Stefan Rass: On Game-Theoretic Risk Management (Part One). arXiv:1506.07368 [q-fin.EC], 2015,
Stefan Rass, Peter Schartner, Markus Wamser: Oblivious Lookup Tables. 15th Central European Conference on Cryptology (CECC 2015), 2015,
Peter Schartner, Kerstin Lemke-Rust, Markus Ullmann: D•A•CH Security 2015. syssec (Klagenfurt), Klagenfurt, 2015,
Stefan Rass, Peter Schartner: Licensed Processing of Encrypted Information. Proceedings of IEEE Conference on Communications and Network Security (CNS), 2015, IEEE, Piscataway (NJ), 2015, S. 703 - 704.
Stefan Schauer, Christian Kollmitzer, Oliver Maurhart, Peter Schartner, Stefan Rass: Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf. D•A•CH Security 2015, syssec (Klagenfurt), Klagenfurt, 2015, S. 253 - 266.
Stefan Rass, Sandra König, Stefan Schauer: BB84 Quantum Key Distribution with Intrinsic Authentication. ICQNM 2015: The Ninth International Conference on Quantum, Nano/Bio, and Micro Technologies, International Academy, Research, and Industry Association (IARIA), 2015, S. 41 - 44.
Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer: Secure Communication over Software-Defined Networks. Journal of Mobile Networks and Applications, Springer International Publishing AG, 20, Cham, 2015, S. 105 - 110.
Hermann Seuschek, Stefan Rass: Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data. 2015 Euromicro Conference on Digital System Design, IEEE, Piscataway (NJ), 2015, S. 423 - 430.
Sandra König, Stefan Rass: Stochastic Models for Quantum Device Configuration and Self-Adaptation. International Journal on Advances in Systems and Measurements, International Academy, Research, and Industry Association (IARIA), 8, 2015, S. 124 - 134.
Peter Schartner, Stefan Rass: DuD Sonderheft 11/2014 "Hardware Security". DuD Sonderheft 11/2014 "Hardware Security", Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2014, S. 733 - 733.
Peter Schartner, Stefan Rass: Hardware Security. DuD Sonderheft 11/2014 "Hardware Security", Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2014, S. 733
Raphael Wigoutschnigg: Anonymität und Mehrwegeübertragung. DACH Security 2014, syssec (Klagenfurt), Klagenfurt, 2014, S. 82 - 93.
Raphael Wigoutschnigg: Anonymität und Mehrwegeübertragung. DACH Security 2014, syssec (Klagenfurt), Klagenfurt, 2014, S. 82 - 93.
Peter Schartner: 11. IT-Sicherheitstag. syssec (Frechen), Frechen, 2014,
Peter Schartner: 11. IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2014,
Stefan Rass, Peter Schartner: Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud. Sicherheit 2014, 2014, S. 187 - 199.
Peter Schartner, Peter Lipp: DACH Security 2014. syssec (Frechen), Frechen, 2014,
Peter Schartner, Peter Lipp: DACH Security 2014. syssec (Klagenfurt), Klagenfurt, 2014,
Patrick Horster, Franz Kollmann, Stefan Rass, Martin Schaffer, Peter Schartner: Kurseinheit ITS1: Systemsicherheit, revised edition. Zentrale für Fernstudien an Fachhochschulen, Koblenz, 2014,
Stefan Rass, Peter Schartner, Patrick Horster, Alexander Abl: Privacy-Preserving Speed-Limit Enforcement. International Journal of Traffic and Logistics Engineering, Engineering and Technology Publishing , Rowland Heights, 2014, S. 26 - 33.
Stefan Rass: Complexity of Network Design for Private Communication and the P-vs-NP question. International Journal of Advanced Computer Science and Applications , SAI – The Science and Information Organization, 5, New York, NY , 2014, S. 148 - 157.
Stefan Rass, Johannes Winkler: Computer Aided Teaching of Elliptic Curve Cryptography . Proceedings of the 17th International Conference on Interactive Collaborative Learning, IEEE, Piscataway (NJ), 2014,
Stefan Schauer, Johannes Göllner, Andreas Peer, Stefan Rass: Entwicklung einer Test-Umgebung für Risiko-Assessmenttools. DACH Security 2014, syssec (Klagenfurt), Klagenfurt, 2014, S. 157 - 169.
Stefan Rass, Benjamin Rainer: Numerical Computation of Multi-Goal Security Strategies. Decision and Game Theory for Security, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2014, S. 118 - 133.
Stefan Rass, Benjamin Rainer: Numerical Computation of Multi-Goal Security Strategies. Conference on Decision and Game Theory for Security, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2014, S. 118 - 133.
Fabrizio de Santis, Stefan Rass: On Efficient Leakage Resilient Pseudo-Random Functions from Hard-to-Invert Leakages. Proceedings of Third International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2014) , Springer International Publishing AG, Cham, 2014, S. 73 - 89.
Fabrizio de Santis, Stefan Rass: On Efficient Leakage Resilient Pseudo-Random Functions from Hard-to-Invert Leakages. Proceedings of Third International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2014), Springer International Publishing AG, Cham, 2014, S. 73 - 89.
Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Benjamin Schauer: Secure Communication over Software-Defined Networks. Proceedings of the International Conference on Software-Defined and Virtualized Future Wireless Networks, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), Brussels, 2014,
Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer: Secure Communication over Software-Defined Networks. Proceedings of the International Conference on Software-Defined and Virtualized Future Wireless Networks, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), Brussels, 2014,
Stefan Rass, Stefan Schauer, Johannes Göllner, Andreas Peer: Security Strategies towards Mutually Dependent Goals (extended abstract). 21st European Meeting on Cybernetics and Systems Research. BCSSS. Vienna, Bertalanffy Center for the Study of Systems Science (BCSSS), Vienna, 2014, S. 630 - 634.
Stefan Rass, Sandra König: Self-Adaption of Quantum Key Distribution Devices to Changing Working Conditions. Proceedings of the Eighth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2014), Xpert Publishing Services (XPS), Wilmington (DE), 2014, S. 1 - 7.
S. Rass, Stefan Rass: Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption. International Journal of Advanced Computer Science and Applications , SAI – The Science and Information Organization, 4, New York, NY , 2013, S. 47 - 56.
P. Schartner, P. Horster, Peter Schartner, Patrick Horster: 10. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2013,
D. Posch, H. Hellwagner, P. Schartner, Peter Schartner, Hermann Hellwagner, Daniel Posch: On-Demand Video Streaming based on Dynamic Adaptive Encrypted Content Chunks. Proceedings of the 8th International Workshop on Secure Network Protocols (NPSec' 13), IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 6 - 6.
Stefan Rass, Benjamin Rainer, Stefan Schauer: On the Practical Feasibility of Secure Multipath Communication. International Journal of Advanced Computer Science and Applications , SAI – The Science and Information Organization, 4, New York, NY , 2013, S. 99 - 108.
R. Wigoutschnigg, P. Schartner, St. Rass, Raphael Wigoutschnigg, Peter Schartner, Stefan Rass: Shared Crowds: A Token-Ring Approach to Hide the Receiver. The Eight International Workshop on Frontiers in Availability, Reliability and Security (FARES 2013 ), IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 383 - 389.
G. Frankl, R. Schoblick, G. Zebedin, P. Schartner, Gabriele Frankl, Peter Schartner, Gerald Zebedin, Robert Hans Schoblick: Sichere Online Prüfungen an der Alpen-Adria Universität Klagenfurt. Digitale Schule Österreich, Österreichische Computer Gesellschaft ÖCG, Wien, 2013,
R. Wigoutschnigg, P. Schartner, S. Rass, Stefan Rass, Raphael Wigoutschnigg, Peter Schartner: Extended Crowds with Adjustable Receiver Anonymity. IADIS e-society 2013, International Association for Development of the Information Society (IADIS), Lisbon, 2013, S. 472 - 476.
Peter Schartner, Peter Trommler: D•A•CH Security 2013. syssec (Frechen), Frechen, 2013,
P. Horster, S. Rass, P. Schartner, Stefan Rass, Peter Schartner, Patrick Horster: Lehreinheit "ITS6 - Sicherheitsinfrastrukturen". Fachhochschule Trier, Trier, 2013,
Stefan Rass, Benjamin Rainer, Matthias Vavti, Stefan Schauer: A Network Modeling and Analysis Tool for Perfectly Secure Communication. Proceedings of the 27th International Conference on Advanced Information Networking and Applications, IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 267 - 275.
Stefan Rass, Daniel Slamanig: Cryptography for Security and Privacy in Cloud Computing. Artech House, London - Boston, 2013,
S. Rass, Stefan Rass: Dynamic Proofs of Retrievability from Chameleon-Hashes. Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT), SciTePress - Science and Technology Publications, Setubal, 2013, S. 296 - 304.
Stefan Rass, Sebastian Kurowski: On Bayesian Trust and Risk Forecasting for Compound Systems. Proceedings of 7th International Conference on IT Security Incident Management & IT Forensics Jahr: 2013, IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 69 - 82.
Stefan Rass, Stefan Schauer, Andreas Peer, Johannes Göllner: Sicherheit auf Basis Multikriterieller Spieltheorie. DACH Security 2013, syssec (Frechen), Frechen, 2013, S. 289 - 301.
P. Schartner, P. Horster, Peter Schartner, Patrick Horster: 9. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2012,
P. Schartner, J. Taeger, Peter Schartner: DACH Security 2012. syssec (Frechen), Frechen, 2012,
S. Schauer, S. Rass, B. Rainer, Stefan Rass, Benjamin Rainer: IT-Security Risiko Management mit Elementen der Spieltheorie. DACH Security 2012, syssec (Frechen), Frechen, 2012, S. 106 - 117.
S. Rass, Stefan Rass: DuD Datenschutz und Datensicherheit. Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2012,
T. Fenzl, A. Golla, S. Herda, S. Rass, C. Kollmitzer, Stefan Rass, Thomas Fenzl, Sabine Herda, Archana Golla: Können Gesichter ein Passwort sein?. 10. Tagung der Österreichischen Gesellschaft für Psychologie. Tagungsband, Karl-Franzens-Universität Graz, Graz, 2012, S. 102 - 102.
S. Rass, P. Schartner, R. Wigoutschnigg, C. Kollmitzer, Stefan Rass, Raphael Wigoutschnigg, Peter Schartner: Anonymous Communication by Branch-and-Bound. Proceedings of the Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, IEEE, Piscataway (NJ), 2012, S. 94 - 102.
G. Frankl, P. Schartner, G. Zebedin, Gerald Zebedin, Peter Schartner, Gabriele Frankl: Secure Online Exams using students' devices. Proceedings of the 2012 IEEE Global Engineering Education Conference (EDUCON) , IEEE, Piscataway (NJ), 2012, S. 1 - 7.
P. Schartner, Peter Schartner: Unique domain-specific Citizen Identification for E-Government Applications. Proceedings of The Sixth International Conference on Digital Society ICDS 2012, Alpen-Adria-Universität Klagenfurt, Klagenfurt am Wörthersee, 2012, S. 23 - 28.
S. Rass, Stefan Rass: On Game-Theoretic Network Security Provisioning. Journal of Network and Systems Management, Springer Verlag GmbH, 21, Berlin, Heidelberg, New York, 2012, S. 47 - 64.
S. Rass, Stefan Rass: On Secure Communication over Wireless Sensor Networks. Proceedings of the International Conference on Security and Cryptography (SECRYPT), SciTePress - Science and Technology Publications, Setubal, 2012, S. 364 - 367.
S. Rass, Stefan Rass: Security Risk Measuring And Forecasting. Cryptography: Protocols, Design and Applications, Nova Science Publishers, Hauppauge (NY), 2012,
S. Rass, A. Ortner, Stefan Rass: Sunset/FFapl - An Integrated Development Environment for Teaching Cryptography. Proceedings of the 15th International Conference on Interactive Collaborative Learning, IEEE, Piscataway (NJ), 2012, S. 8 - 8.
S. Rass, S. König, Stefan Rass: Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries. International Journal On Advances in Systems and Measurements, International Academy, Research and Industry Association (IARIA), 5, Valencia, 2012, S. 22 - 33.
Thomas Fenzl, Stefan Rass: Usability of a face-recognition based login-challenge. Review of Psychology, 19, 2012, S. 62 - 62.
D. Fox, P. Schartner, Peter Schartner: DuD Datenschutz und Datensicherhheit. Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2011,
G. Frankl, P. Schartner, G. Zebedin, Peter Schartner, Gabriele Frankl: The "Secure Exam Environment" for Online Testing at the Alpen-Adria-Universität Klagenfurt / Austria. E-Learn 2011--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, volume 2011, Association for the Advancement of Computing in Education (AACE), Chesapeake (VA), 2011, S. 1201 - 1211.
P. Schartner, P. Horster, Peter Schartner, Patrick Horster: 8. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2011,
G. Frankl, P. Schartner, G. Zebedin, Gerald Zebedin, Peter Schartner, Gabriele Frankl: The "Secure Exam Environment" for Online Testing at the Alpen-Adria-Universität Klagenfurt/Austria. Proceedings of the E-Learn 2011. World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Association for the Advancement of Computing in Education (AACE), Chesapeake (VA), 2011, S. 498 - 505.
P. Schartner, J. Taeger, Peter Schartner: DACH Security 2011. syssec (Frechen), Frechen, 2011,
S. Rass, Machot F. Al, K. Kyamakya, Kyandoghere Kyamakya, Fadi Al Machot, Stefan Rass: Fine-Grained Diagnostics of Ontologies with Assurance. Efficient Decission Support Systems - Practice and Challenges From Current to Future, Intech, Vukovar, 2011, S. 79 - 98.
P. Schartner, Peter Schartner: A low-cost alternative for OAEP. syssec (Klagenfurt), Klagenfurt, 2011,
S. Rass, R. Wigoutschnigg, P. Schartner, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Crowds Based on Secret-Sharing. Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, Los Alamitos (CA), 2011, S. 359 - 364.
R. Wigoutschnigg, P. Schartner, S. Rass, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Crowds mit beeinflussbarer Empfängeranonymität. DACH Security 2011, syssec (Frechen), Frechen, 2011, S. 304 - 313.
S. Rass, R. Wigoutschnig, P. Schartner, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Innovative Information Science & Technology Research Group (ISYOU), 2, Seoul, 2011, S. 25 - 39.
S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Information-Leakage in Hybrid Randomized Protocols. Proceedings of the International Conference on Security and Cryptography (SECRYPT), SciTePress - Science and Technology Publications, Setubal, 2011, S. 134 - 143.
S. Rass, P. Schartner, Peter Schartner, Stefan Rass: The NP-complete face of information-theoretic security. Computer Technology and Application, David Publishing Company, 2, Libertyville (IL), 2011, S. 893 - 905.
S. Rass, Machot F. Al, K. Kyamakya, Stefan Rass: Fine Grained Diagnostics of Ontologies with Assurance. Efficient Decision Support Systems - Practice and Challenges From Current to Future, Intech, Vukovar, 2011, S. 79
S. Rass, Machot F. Al, K. Kyamakya, Fadi Al Machot, Stefan Rass, Kyandoghere Kyamakya: Fine-Grained Diagnostics of Ontologies with Assura. Efficient Decision Support Systems: Practice and Challenges - From current to Future / Book 1, Intech, 1, Vukovar, 2011,
S. Rass, S. König, Stefan Rass: Indirect Eavesdropping in Quantum Networks. Proceedings of the Fifth International Conference on Quantum, Nano and Micro Technologies (ICQNM), Xpert Publishing Services (XPS), Wilmington (DE), 2011, S. 83 - 88.
D. Slamanig, S. Rass, Stefan Rass: On Security and Privacy in Cloud Computing. Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER), SciTePress Digital Library, Setubal, 2011, S. 604 - 609.
S. König, S. Rass, Stefan Rass: On the transmission capacity of quantum networks. International Journal of Advanced Computer Science and Applications (IJACSA), SAI – The Science and Information Organization, 2, New York, NY , 2011, S. 9 - 16.
D. Slamanig, S. Rass, Stefan Rass: Redigierbare Digitale Signaturen – Theorie und Praxis. Datenschutz und Datensicherheit (DuD), 35, 2011, S. 757 - 762.
S. Rass, Stefan Rass: Towards a Rapid-Alert System for Security Incidents. Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics (IMF), IEEE Computer Society Press, Los Alamitos (CA), 2011, S. 122 - 136.
P. Schartner, P. Horster, Patrick Horster, Peter Schartner: 7. IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2010,
S. Rass, P. Schartner, Stefan Rass, Peter Schartner: Multipath Authentication without Shared Secrets and With Applications in Quantum Networks. Proceedings of the International Conference on Security and Management (SAM 2010), CSREA Press, Las Vegas (NV), 2010, S. 111 - 115.
P. Schartner, S. Bürger, Peter Schartner, Stefan Bürger: Attacking mTAN Applications like e-Banking and Mobile Signatures. syssec (Klagenfurt), Klagenfurt, 2010,
S. Rass, D. Schuller, C. Kollmitzer, Stefan Rass: Entropy of Graphical Passwords: Towards an Information-theoretic Analysis of Face-Recognition Based Authentication. Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 166 - 177.
S. Rass, P. Schartner, Stefan Rass, Peter Schartner: Non-Interactive Information Reconciliation for Quantum Key Distribution. 24th IEEE International Conference on Advanced Information Networking and Applications, IEEE, Piscataway (NJ), 2010, S. 1054 - 1060.
S. Rass, P. Schartner, R. Wigoutschnigg, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Security as a Game – Decisions from Incomplete Models. Decision Support Systems, Intech, Vukovar, 2010, S. 391 - 406.
S. Rass, P. Schartner, Stefan Rass, Peter Schartner: A unified framework for the analysis of availability, reliability and security, with applications to quantum networks. IEEE Transactions on Systems, Man, and Cybernetics, IEEE, Piscataway (NJ), 2010, S. 1 - 13.
S. Rass, A. Wiegele, P Schartner, Peter Schartner, Stefan Rass, Angelika Wiegele: Building a Quantum Network: How to Optimize Security and Expenses. Journal of Network and Systems Management, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 17 - 17.
P. Schartner, E. Weippl, Peter Schartner: DACH Security 2010. syssec (Klagenfurt), Klagenfurt, 2010,
S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Quantenkryptographie – Überblick und aktuelle Entwicklungen. Datenschutz und Datensicherheit (DuD), 34, 2010, S. 753 - 757.
P. Schartner, S. Rass, Stefan Rass, Peter Schartner: Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option. CD-Proceedings of “2010 International Computer Symposium (ICS)”, , IEEE, Piscataway (NJ), 2010,
P. Schartner, C. Kollmitzer, Peter Schartner: Quantum-cryptographic Networks from a Prototype to the Citizen. Applied Quantum Cryptography, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 173 - 184.
S. Rass, C. Kollmitzer, Stefan Rass: Adaptive Cascade. Applied Quantum Cryptography, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 49 - 69.
D. Slamanig, S Rass, Stefan Rass: Anonymous But Authorized Transactions Supporting Selective Traceability. Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT), IEEE, Piscataway (NJ), 2010, S. 132 - 141.
M. Schaffer, S Rass, Stefan Rass, Martin Schaffer: Fusion Discrete Logarithm Problems. Cornell University Library, Ithaca, NY, 2010,
D. Slamanig, S. Rass, Stefan Rass: Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 201 - 213.
P. Horster, P Schartner, Peter Schartner, Patrick Horster: 6. IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2009,
S Rass, Stefan Rass: On a convex optimization problem in system security. syssec (Klagenfurt), Klagenfurt, 2009,
D. Slamanig, P. Schartner, C Stingl, Christian Stingl, Peter Schartner: Practical Traceable Anonymous Identification. Proceedings of the International Conference on Security and Cryptography, SECRYPT 2009, INSTICC Press, Setubal, 2009, S. 225 - 232.
S. Rass, R. Wigoutschnigg, P Schartner, Stefan Rass, Peter Schartner, Raphael Wigoutschnigg: Sichere Speicherung von Patientendaten mittels Chipkarten. DACH Security 2009, syssec (Frechen), Frechen, 2009, S. 185 - 194.
P. Horster, P. Schartner, Patrick Horster, Peter Schartner: DACH Security 2009. syssec (Frechen), Frechen, 2009,
S. Fuchs, S. Rass, K. Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Handling Uncertainty in Context-Aware Driver Assistance Systems. Proceedings of the 2009 IEEE International Conference on Networking, Sensing and Control, ICNSC´09, Okayama, Japan, IEEE, Piscataway (NJ), 2009, S. 446 - 467.
S. Fuchs, S. Rass, K Kyamakya, Stefan Rass: Handling Uncertainty in Context-Aware Driver Assistance Systems. Proceedings of the 2009 IEEE International Conference on Networking, Sensind and Control, IEEE, Piscataway (NJ), 2009, S. 446 - 467.
S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Game-Theoretic Security Analysis of Quantum Networks. Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 20 - 25.
P. Schartner, S Rass, Peter Schartner, Stefan Rass: How to overcome the ’Trusted Node Model’ in Quantum Cryptography. Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, IEEE, Piscataway (NJ), 2009, S. 4 - 4.
S. Rass, P. Schartner, M. Greiler, Peter Schartner, Michaela Greiler, Stefan Rass: Quantum Coin-Flipping-Based Authentication. 2009 IEEE International Conference on Communications ICC 2009, IEEE, Piscataway (NJ), 2009, S. 5 - 5.
S. Rass, C. Kollmitzer, Stefan Rass: Adaptive Error Correction with Dynamic Initial Block Size in Quantum Cryptographic Key Distribution Protocols. 2009 Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 90 - 95.
M. Pivk, C. Kollmitzer, S. Rass, Stefan Rass, Mario Francesco Pivk: SSL/TLS with Quantum Cryptography. 2009 Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 96 - 101.
K. Lessiak, C. Kollmitzer, S. Schauer, J. Pilz, S. Rass, Jürgen Pilz, Stefan Rass: Statistical Analysis of QKD Networks in Real-life Environments. 2009 Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 109 - 114.
S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Security in Quantum Networks as an Optimization Problem. Proceedings of the International Conference on Availability, Reliability and Security, IEEE, Piscataway (NJ), 2009, S. 493 - 498.
S Rass, Stefan Rass: Simple Error Scattering Model for improved Information Reconciliation. Cornell University Library, Ithaca, NY, 2009,
S. Rass, Stefan Rass: Über Informationstheoretische Sicherheit: Aktuelle Probleme und Lösungen. Ausgezeichnete Informatikdissertationen 2009, Gesellschaft für Informatik e.V., Bonn, 2009, S. 201 - 210.
P. Schartner, M Schaffer, Martin Schaffer, Peter Schartner: Efficient Privacy-Enhancing Techniques for Medical Databases. Best papers of Biomedical Engineering Systems and Technologies 2008, Springer Verlag GmbH, 25, Berlin, Heidelberg, New York, 2008, S. 467 - 478.
P. Horster, P Schartner, Peter Schartner, Patrick Horster: 5. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2008,
S. Fuchs, S Rass, K. Kyamakya, Stefan Rass, Kyandoghere Kyamakya, Simone Fuchs: A Constraint-Based and Context-Aware Overtaking Assistant with Fuzzy-Probabilistic Risk Classification. Proceedings IADIS International Conference Wireless Applications and Computing 2008, International Association for Development of the Information Society (IADIS), Lisbon, 2008, S. 93 - 100.
S. Fuchs, S. Rass, K Kyamakya, Stefan Rass, Simone Fuchs, Kyandoghere Kyamakya: Constraint-based Context-Rule Representation and Risk Classification for Driver Assistance Systems. Proceedings First Annual International Symposium on Vehicular Computing Systems, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), Brussels, 2008, S. 53 - 98.
Simone Fuchs, Stefan Rass, Kyandoghere Kyamakya: Constraint-based Context-Rule Representation and Risk Classification for Driver Assistance Systems. Simone Fuchs, Stefan Rass, Kyandoghere Kyamakya, 2008,
S. Rass, S. Fuchs, M. Schaffer, K. Kyamakya, Simone Fuchs, Kyandoghere Kyamakya, Stefan Rass: How to Protect Privacy in Floating Car Data Systems. Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET) 2008-10-07, ACM - San Francisco, San Francisco (CA), 2008, S. 17 - 22.
S. Rass, S. Fuchs, K Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Towards a Game-Theoretic Model of Co-Operative Context-Aware Driving under Random Influences. Proceedings of the International Conference on Vehicular Electronics and Safety (ICVES) 2008, IEEE, Piscataway (NJ), 2008, S. 22 - 26.
S. Fuchs, S. Rass, K. Kyamakya, Simone Fuchs, Kyandoghere Kyamakya, Stefan Rass: A context-aware overtaking assistance system with fuzzy-probabilistic risk classification. Proceedings of the Lakeside Conference in Safety in Mobility 2008, Lakeside Science & Technology Park GmbH, Klagenfurt, 2008,
R. Wigoutschnigg, P Schartner, Raphael Wigoutschnigg, Peter Schartner: Java-basierte Simulation von Smartcards. DACH Security, syssec (Frechen), Frechen, 2008, S. 509 - 518.
M. Schaffer, P Schartner, Peter Schartner, Martin Schaffer: Über die lokale und verteilte Erzeugung systemweit eindeutiger Zufallszahlen. DACH Security 2008, syssec (Frechen), Frechen, 2008, S. 519 - 531.
Rass S., Fuchs S., Schaffer M., Kyamakya K., Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass, Martin Schaffer: On Privacy Issues in Floating Car Data Systems. Alpen-Adria-Universität Klagenfurt, Klagenfurt am Wörthersee, 2008,
M. Greiler, P Schartner, Michaela Greiler, Peter Schartner: Secure Resource Sharing in Ad Hoc Networks. Proceedings of the 2008 International Conference on Security and Management (SAM08), University of Georgia, Athens (GA), 2008, S. 278 - 284.
S. Fuchs, S. Rass, K Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems. Proceedings 1st International Workshop on Context-aware Adaptation Mechanisms for Pervasive and Ubiquitous Services (CAMPUS'08), University of Oslo, Oslo, 2008, S. 5 - 16.
P Horster, Patrick Horster: DACH Security 2008. syssec (Frechen), Frechen, 2008,
B. Lamprecht, S. Rass, S. Fuchs, K Kyamakya, Simone Fuchs, Kyandoghere Kyamakya, Stefan Rass, Bernhard Lamprecht: Fusion of an Uncalibrated Camera with Velocity Information for Distance Measurement from a Moving Camera on Highways. Proceeding of the 5th workshop on positioning, navigation and communication 2008 (WPNC´08), IEEE, Piscataway (NJ), 2008, S. 165 - 172.
S. Rass, Sfaxi M. Ali, S. Ghernaouti-Hélie, K. Kyamakya, Kyandoghere Kyamakya, Stefan Rass: Secure Message Relay over Networks with QKD-Links. Proceedings of the Second International Conference on Quantum-, Nano- and Micro-technologies ICQNM 2008, IEEE, Piscataway (NJ), 2008, S. 10 - 15.
S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya, Simone Fuchs, Stefan Rass, Bernhard Lamprecht, Kyandoghere Kyamakya: A Model for Ontology-Based Scene Description for Context-Aware Driver Assistance Systems. 1st International Conference on Ambient Media and System, ACM - Quebec City, Quebec City (CA), 2008, S. 1 - 8.
P. Schartner, M Schaffer, Martin Schaffer, Peter Schartner: Protecting Privacy in Medical Databases - Efficient Local Generation of System-Wide Unique Health IDs. Proceedings of the International Conference on Health Informatics, INSTICC Press, Setubal, 2008, S. 51 - 58.
P. Schartner, Peter Schartner: Kurseinheit ITS5 -- Chipkarten -- Technologie und Anwendungen. Fachhochschule Trier, Trier, 2008,
S. Rass, S. Fuchs, K. Kyamakya, Kyandoghere Kyamakya, Stefan Rass, Simone Fuchs: A Game-theoretic Approach to Co-operative Context-aware Driving with Partially Random Behavior. Proceedings of the Third European Conference on Smart Sensing and Context (EuroSSC 2008), , Springer Verlag GmbH, Berlin, Heidelberg, New York, 2008, S. 154 - 167.
C. Kollmitzer, O. Maurhart, S. Rass, S Schauer, Stefan Schauer, Stefan Rass: Application Framework for High Security Requirements in R&D Environments Based on Quantum Cryptography. Proceedings of the Third Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), IEEE, Piscataway (NJ), 2008,
S. Rass, Stefan Rass: Information-theoretic Security in Practice - Multipath Transmission and Quantum Networks. Südwestdeutscher Verlag für Hochschulschriften, Saarbrücken, 2008,
P. Horster, P Schartner, Patrick Horster, Peter Schartner: 4. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2007,
P. Horster, P Schartner, Patrick Horster, Peter Schartner: Szenarien, die die Welt verändern. Information und Gesellschaft -- Technologien einer sozialen Beziehung, DUV/GWV-Fachverlage GmbH, Wiesbaden, 2007, S. 129 - 157.
B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya, Bernhard Lamprecht, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Extrinsic Camera Calibration for an On-board Two-Camera System without overlapping Field of View. Proceedings of the 2007 IEEE Intelligent Transportation Systems, IEEE, Piscataway (NJ), 2007, S. 265 - 270.
M. Schaffer, S Rass, Stefan Rass, Martin Schaffer: The Fusion Discrete Logarithm Problem Family. syssec (Klagenfurt), Klagenfurt, 2007,
S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass, Bernhard Lamprecht: Context-Awareness and Collaborative Driving for Intelligent Vehicles and Smart Roads. 1st International Workshop on ITS for an Ubiquitous ROADS, IEEE, Piscataway (NJ), 2007, S. 1 - 6.
M. Schaffer, P Schartner, Peter Schartner, Martin Schaffer: Implementing Collision-Free Number Generators on JavaCards. syssec (Klagenfurt), Klagenfurt, 2007,
M. Schaffer, P. Schartner, S Rass, Martin Schaffer, Stefan Rass, Peter Schartner: Untraceable Network Devices. syssec (Klagenfurt), Klagenfurt, 2007,
M. Schaffer, P. Schartner, S Rass, Stefan Rass, Martin Schaffer, Peter Schartner: Universally Unique Identifiers: How to ensure Uniqueness while protecting the Issuer's Privacy. Proceedings of the 2007 International Conference on Security and Management, CSREA Press, Las Vegas (NV), 2007, S. 198 - 204.
Horster Patrick, Patrick Horster: DACH Security 2007. syssec (Frechen), Frechen, 2007,
P Schartner, Peter Schartner: Privacy in RFID-Systemen. 10 Jahre IRIS: Bilanz und Ausblick -- Tagungsband des 10. Internationalen Rechtisinformatik-Symposions IRIS 2007, Richard Boorberg Verlag, Stuttgart, 2007, S. 289 - 295.
M. Schaffer, P. Schartner, S Rass, Martin Schaffer, Stefan Rass, Peter Schartner: Efficient Generation of Unique Numbers for Secure Applications. syssec (Klagenfurt), Klagenfurt, 2007,
Kollmann Franz, Schaffer Martin, Schartner Peter, Franz Kollmann, Martin Schaffer, Peter Schartner: Kurseinheit ITS7: Praktikum (2. überarbeitete Auflage). Fachhochschule Trier, Trier, 2007,
Horster Patrick, Schartner Peter, Peter Schartner, Patrick Horster: Kurseinheit ITS3: Angewandte Kryptologie. 2006,
P. Horster, P. Schartner, Patrick Horster, Peter Schartner: 3. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2006,
P. Schartner, M Schaffer, Peter Schartner, Martin Schaffer: Vertrauenswürdige Fotografie & Bildbearbeitung. DACH Mobility 2006, 2006, S. 10 - 10.
Horster Patrick, Patrick Horster: DACH Mobility 2006. 2006,
Rass Stefan, Schaffer Martin, Martin Schaffer, Stefan Rass: Cryptographic Applications of Quadratic Imaginary Fields. syssec (Klagenfurt), Klagenfurt, 2006,
Rass Stefan, Stefan Rass: A Method of Authentication for Quantum Networks. International Journal of Information Technology, 2006, S. 7 - 7.
Rass Stefan, Schaffer Martin, Schartner Peter, Stefan Rass, Martin Schaffer, Peter Schartner: Shared Generation of System-wide Unique Keys for Discrete-Log Based Cryptosystems. syssec (Klagenfurt), Klagenfurt, 2006,
Horster Patrick, Patrick Horster: DACH Security 2006. 2006,
S. Rass, M. Schaffer, P Schartner, Peter Schartner, Martin Schaffer, Stefan Rass: Anonymes digitales Spielen im Casino. DACH Mobility 2006, 2006, S. 15 - 15.
M. Schaffer, P Schartner, Martin Schaffer, Peter Schartner: Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. Seventh Smart Card Research and Advanced Application IFIP Conference, 2006, S. 16 - 16.
G. Friedrich, S. Rass, K Shchekotykhin, Kostyantyn Shchekotykhin, Gerhard Friedrich, Stefan Rass: A general method for diagnosing axioms. DX'06 - 17th International Workshop on Principles of Diagnosis, 2006, S. 101 - 108.
S. Rass, Stefan Rass: A Method of Authentication for Quantum Networks. Proceedings of the International Conference on Computer Science (ICCS 2006), 2006, S. 6 - 6.
S Rass, Stefan Rass: A Method of Authentication for Quantum Networks. International Conference on Computer Science, 2006, S. 6 - 6.
S. Rass, Sfaxi M. Ali, S Ghernaouti-Helie, Stefan Rass: Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, 2006, S. 4 - 4.
S. Rass, K. Kyamakya, Kyandoghere Kyamakya, Stefan Rass: Artificial Intelligence Techniques in Traffic Control. Journal der Österreichischen Gesellschaft für Artificial Intelligence, Österreichische Gesellschaft für Artificial Intelligence (ÖGAI), 25, Wien, 2006, S. 7 - 7.
Rass Stefan, Stefan Rass: Efficient Key Exchange with tight Bounds on Eavesdropping Success Probability. 2006,
Schartner Peter, Schaffer Martin, Peter Schartner, Martin Schaffer: Non-interactive local Generation of globally unique Quasi-Random Numbers. syssec (Klagenfurt), Klagenfurt, 2005,
Rass Stefan, Stefan Rass: On Information-theoretically Secure Authentication in Quantum Networks. 2005,
Schartner Peter, Horster. Patrick, Patrick Horster, Peter Schartner: 2. Österreichischer IT-Sicherheitstag 2005. 2005,
Schaffer Martin, Schartner Peter, Peter Schartner, Martin Schaffer: Key Escrow with Tree-based Access Structure. Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2005), 2005, S. 6 - 6.
Schartner Peter, Schaffer Martin, Martin Schaffer, Peter Schartner: Unique User-generated Digital Pseudonyms. Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2005), 2005, S. 10 - 10.
Schaffer Martin, Schartner Peter, Peter Schartner, Martin Schaffer: Video Surveillance: A Distributed Approach to protect Privacy. Communications and Multimedia Security, 2005, S. 10 - 10.
Rass Stefan, Stefan Rass: How to Send Messages over Quantum Networks in an Unconditionally Secure Manner. 2005,
Schaffer Martin, Schartner Peter, Peter Schartner, Martin Schaffer: Hierarchical Key Escrow with Passive Adversaries. syssec (Klagenfurt), Klagenfurt, 2005,
E. Hanschitz, J. Leitner, B. Marktl, J. Michael, I. Preiml, P. Horster, P. Schartner, Judith Michael, Patrick Horster, Peter Schartner: go2algo - Das Algorithmen-Visualisierungstool. Informatics in Secondary Schools: Evolution and Perspectives - Innovative Concepts for Teaching Informatics, 2005, S. 10 - 10.
F. Kollmann, M. Schaffer, P Schartner, Franz Kollmann, Peter Schartner, Martin Schaffer: Vertrauliche Videoüberwachung mit geeigneter Zugriffsstruktur. DACH Security 2005, 2005, S. 15 - 15.
Horster. Patrick, Patrick Horster: DACH Security 2005. 2005,
Horster Patrick, Kollmann Franz, Schaffer Martin, Schartner Peter, Patrick Horster, Peter Schartner, Martin Schaffer, Franz Kollmann: Kurseinheit ITS1: Systemsicherheit. 2005,
Horster Patrick, Schartner Peter, Patrick Horster, Peter Schartner: 1. Österreichischer IT-Sicherheitstag 2004. 2004,
Schartner Peter, Peter Schartner: Kurseinheit IS 5: Chipkarten und Anwendungen. 2004,
Kollmann Franz, Schaffer Martin, Schartner Peter, Peter Schartner, Franz Kollmann, Martin Schaffer: Kurseinheit IS7: Praktikum IT-Sicherheit. 2004,
Horster. Patrick, Patrick Horster: DACH Security 2004. 2004,
P Horster, Patrick Horster: Elektronische Geschäftsprozesse 2004. 2004,
H. C Mayr, Heinrich C. Mayr, Patrick Horster: Elektronische Geschäftsprozesse: Von der Idee zum Nutzen. Elektronische Geschäftsprozesse, 2004,
F. Kollmann, P Schartner, Peter Schartner, Franz Kollmann: PDA-based Signature Device. BIOSIG 2003, 2003,
F. Kollmann, P Schartner, Peter Schartner, Franz Kollmann: PDA-based Signature Device. BIOSIG 2003: Proceedings of the First Conference on Biometrics and Electronic Signatures of the GI Working Group BIOSIG; 24. July 2003 Darmstadt, 31, 2003,
P Schartner, Peter Schartner: PDAs und Chipkarten - Synergieeffekte. 13. SIT-SmartCardWorkshop. 4./5. Februar 2003 in Darmstadt, 2003, S. 11 - 11.
P Horster, Patrick Horster: DACH Security. 2003,
P Horster, Patrick Horster: 1. IT-Sicherheitstag NRW. 2002,
P Schartner, Patrick Horster, Peter Schartner: Mobile (Un)Sicherheit. IT Security Europe 2002, 2002, S. 499 - 516.
P Schartner, Peter Schartner: Chipkarten - Technologie, Bedrohungen, Anwendungen. eBusiness-Workshop - Managing eSecurity, Klagenfurt, May 23-24, 2002, 2002,
S. Janisch, P Schartner, Peter Schartner: Internetbanking. Datenschutz und Datensicherheit DuD, 2002, S. 162 - 169.
P. Schartner, P. Horster, Peter Schartner, Patrick Horster: Block Cipher Modes for non-standard Applications. Conference Proceedings "IFIP/SEC 2000: Information Security - Information Security for Global information Infrastructures", Beijing, August 21-25, 2000, 2002,
P. Schartner, Peter Schartner: Die Schlüssel-Schloß-Problematik. 2002,
P. Horster, P Schartner, Patrick Horster, Peter Schartner: e-Business-Workshop - Managing IT-Security. syssec (Klagenfurt), Klagenfurt, 2002,
P Schartner, Peter Schartner: Internetbanking - Technischer Hintergrund. Internetbanking - Von der Euphorie zur Normalität, 92, 2002, S. 220 - 242.
P Horster, Patrick Horster: Enterprise Security. Grundlagen - Strategien - Anwendungen - Realisierungen. 2002,
P Horster, Patrick Horster: Sichere Geschäftsprozesse. Grundlagen - Konzepte - Anwendungen - Perspektiven. 2002,
P. Horster, S Teiwes, Patrick Horster: Wirtschaftliche Faktoren zur Einführung von IT-Sicherheitsinfrastrukturen. Enterprise Security, 2002, S. 26 - 36.
S. Janisch, P Schartner, Peter Schartner: Internetbanking und Drittmissbrauch – Eine technische und rechtliche Analyse. Elektronische Geschäftsprozesse, 2001, S. 361 - 378.
P. Horster, M. Schaffer, P. Schartner, D Sommer, Patrick Horster, Martin Schaffer, Peter Schartner: Secure Internet Phone. IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS01), 2001, S. 11 - 11.
P. Horster, M. Schaffer, P. Schartner, D Sommer, Martin Schaffer, Peter Schartner, Patrick Horster: Sicheres Telefonsystem für das Internet - Entwurf und Implementierung. Kommunikationssicherheit im Zeichen des Internet, 2001, S. 24 - 24.
P Horster, Patrick Horster: AES - Advanced Encryption Standard. IT-Security Europe 2001, 2001, S. 497 - 512.
P Horster, Patrick Horster: AES – Verschlüsselung ohne Hintertür. IT Security - Sicherheit im Unternehmen, 2001, S. 10 - 19.
P Horster, Patrick Horster: Elektronische Geschäftsprozesse. 2001,
P Horster, Patrick Horster: IT Security Europe 2001. 2001,
P Horster, Patrick Horster: Kommunikationssicherheit im Zeichen des Internet. 2001,
P Horster, Patrick Horster: Kryptologie. Informatik für Ingenieure, 2001, S. 377 - 416.
P. Horster, P. Kraaibeek, Patrick Horster: Proceedings Workshop eSecurity – Managing Security Technologies. 2001,
P. Horster, S Teiwes, Patrick Horster: Strategische Bedeutung von Public-Key-Infrastrukturen im eCommerce. Elektronische Geschäftsprozesse, 2001, S. 446 - 458.
P. Horster, S Teiwes, Patrick Horster: Vertrauensbildung im elektronischen B2B-Commerce. Kommunikationssicherheit im Zeichen des Internet, 2001, S. 294 - 306.
P. Horster, S Teiwes, Patrick Horster: Migration und Evolution von PKI in Unternehmen, Teil 2: Umrüstung und Migration von PKI - Von der Raupe zum Schmetterling. IT Security, 2000, S. 26 - 29.
P. Horster, S Teiwes, Patrick Horster: Migration und Evolution von PKI in Unternehmen, Teil 1: Vom PKI-Einzelsystem zum hierarchischen PKI-Bau. IT Security, 2000, S. 14 - 18.
P. Horster, S Teiwes, Patrick Horster: Aufbau, Migration und Management von Public-Key-Infrastrukturen. IT Security Europe 2000, 2000, S. 12 - 12.
P. Schartner, P Horster, Peter Schartner, Patrick Horster: Authentifikation in schwach vernetzen Systemen. Systemsicherheit - Grundlagen, Konzepte, Realisierungen, Anwendungen, 2000, S. 151 - 166.
P. Schartner, P Horster, Peter Schartner, Patrick Horster: Block Cipher Modes for non-standard Applications. Conference Proceedings "IFIP/SEC 2000: Information Security - Information Security for Global information Infrastructures", August 21-25, Beijing, 2000,
Horster Patrick, Kraaibeek Peter, Patrick Horster: Grundlegende Aspekte der Systemsicherheit. 2000, S. 15 - 15.
P Horster, Patrick Horster: Kryptologie. Informatik für Ingenieure, 2000, S. 377 - 416.
P Horster, Patrick Horster: Systemsicherheit. 2000,
P. Horster, P Schartner, Patrick Horster, Peter Schartner: Bemerkungen zur Erzeugung dublettenfreier Primzahlen. Sicherheistinfrastrukturen - Grundlagen, Realisierungen, Rechtliche Aspekte, Anwendungen, 1999, S. 358 - 368.
Horster P., Fox D., Patrick Horster: Datenschutz und Datensicherheit. 1999,
Horster Patrick, Teiweis S., Patrick Horster: Public-Key-Infrastrukturen in Unternehmen und Organisationen. IsSec 99 - Sicherheitsinfrastrukturen in der Informationstechnik, 1999, S. 10 - 10.
Fox D., Horster P., Patrick Horster: Realisierung von Public-Key-Infrastrukturen. 1999,
Horster P., Patrick Horster: Sicherheitsinfrastrukturen. 1999,
Horster P., Kraaibeek P., Wohlmacher P., Patrick Horster, Petra Wohlmacher: Sicherheitsinfrastrukturen - Basiskonzepte. ?, 1999, S. 16 - 16.
Horster Patrick, Patrick Horster: Von der Schwierigkeit, sichere Kryptosysteme zu entwerfen. Angewandte Mathematik, insbesondere Mathematik, 1999,
P. Horster, P. Schartner, P Wohlmacher, Petra Wohlmacher, Patrick Horster, Peter Schartner: Key-Management. Global IT Security - Proceedings of the XV. IFIP World Computer Congress, 116, 1998,
P. Horster, P. Schartner, P Wohlmacher, Peter Schartner, Patrick Horster, Petra Wohlmacher: Special Aspects of Key Generation. Information Technology: Science-Technique-Technology-Educational-Health, 1998, S. 345 - 350.
Horster P., Patrick Horster: Basismechanismen der Kryptologie, 4. Kurseinheit der Lehreinheit Informationssicherheit-, Systemsicherheit und Datenschutz. 1998,
Horster P., Wohlmacher P., Petra Wohlmacher, Patrick Horster: Grundüberlegungen zur Gestaltung von Sicherheitsinfrastrukturen. 1998,
Horster Patrick, Patrick Horster: Lehreinheit IT-Sicherheit. 1998,
Dittmann J., Horster P., Steinmetz R., Wohlmacher P., Petra Wohlmacher, Patrick Horster: Workshop of Multimedia and Security. 1998,
-> Note that the publication lists in the University Research Information System (CRIS) might be incomplete. More information can be found on the personal homepages of the team members.
All Publications of the Department of Artificial Intelligence and Cybersecurity (AICS) can also be found in the University Research Information System (CRIS).
Quicklinks
Information for
Address
Universitätsstraße 65-67
9020 Klagenfurt am Wörthersee
Austria
+43 463 2700
uni [at] aau [dot] at
www.aau.at
Campus Plan