Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Pramstaller N., Mangard S., Dominikus S., Wolkerstorfer J.
Proceedings of Fourth Conference on the Advanced Encryption Standard AES4, 98-112, (Lecture Notes in Computer Science
Popp T., Mangard S.
Cryptographic Hardware and Embedded Systems - CHES 2005, CHES, 172-186, (Lecture Notes in Computer Science (LNCS)
Payer U., Lamberger M., Teufl P.
Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops, International Network Conference, 11-18
Payer U., Teufl P., Kraxberger S., Lamberger M.
Computer Network Security, International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 448-453, (Lecture notes im computer science
Payer U., Teufl P., Lamberger M.
Detection of intrusions and malware, and vulnerability assessment, Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, 19-31, (Lecture notes im computer science
Griesmayer A., Bloem R., Hautzendorfer M., Wotawa F.
Innovations in Applied Artificial Intelligence, International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 783-788, (Lecture notes in computer science : Lecture notes in artificial intelligence
Staber S., Jobstmann B., Bloem R.
16th International Workshop on Principles of Diagnosis, International Workshop on Principles of Diagnosis, 169-174
Jobstmann B., Griesmayer A., Bloem R.
Computer Aided Verification, International Conference on Computer Aided Verification, 226-238, (LNCS
Griesmayer A., Bloem R.
Games in Design and Verification, Games in Design and Verification, ?-?
Staber S., Jobstmann B., Bloem R.
Correct Hardware Design and Verification Methods, Advanced Research Working Conference on Correct Hardware Design and Verification Methods, 35-49, (Lecture notes in computer science
Leitold H., Roessler T.
D-A-CH, D-A-CH Security Conference, 121-129
Leitold H., Posch R., Hayat A.
Proceedings of eGOV INTEROP'05, International Conference on Interoperability of eGovernment Services
Leitold H., Posch R.
Preprints of CIP Europe 2005, CIP Europe 2005, 50-60
Leitold H., Posch R., Roessler T.
Proceedings of eee2005, IEEE International Conference on e-Technology, e-Commerce and e-Service 2005 (eee2005), 480-485
Hayat A., Rechberger C.
EGOV05 - International Conference on E-Government, 374-381
Pramstaller N., Rechberger C., Rijmen V.
10th IMA International Conference on Cryptography and Coding, 78-95, (Lecture Notes in Computer Science
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, Selected Areas in Cryptography, 261-275, (LNCS
Matusiewicz K., Pieprzyk J., Pramstaller N., Rechberger C., Rijmen V.
Western European Workshop on Research in Cryptology - WEWoCR 2005, LNI P-74 (ISSN 1617-5468), 123-134
Pramstaller N., Rechberger C., Rijmen V.
Selected Areas in Cryptography, (LNCS
Rechberger C., Rijmen V.
Proceedings of Santa's Crypto Get-together 2005, 51-58