Campus-System

  • Research Information System
  • Staff Search
  • Courses
  • Exams

Employees-Portal

  • Organization handbook
  • Operational messages
  • Internal messages
  • Personal messages

Information for

  • Pupils
  • Alumni & Career
  • Prospective Students
  • Continuing Education
  • Researchers
  • Students
  • Staff
  • Partners & Sponsors
  • International

Links

  • Webmail
  • Library
  • Vacancies
  • University bulletin
  • Bulletin Board
  • Staff Search
  • Campus Map
  • IT Services
  • USI
  • OEH Klagenfurt
Gütesiegel evalagGütesiegel Betriebliche GesundheitsförderungPrix VersaillesEMAS SiegelGütezeichen hochschuleundfamilie
Deutsch
search
Quicklinks +
  • English English English en
  • Deutsch Deutsch German de
  • Twitter
  • Facebook
  • Youtube
  • Instagram
University of Klagenfurt
  • Home
  • University
        • Organisation
          • Management
          • Academic affairs and organisation
          • Faculties, departments and centres
          • University centres
          • University Executive support offices
          • Administration and management
          • Representations and commissioners
          • Organisational plan
          • Statute
        • Profile
          • Mission statement
          • Quality strategy
          • Rankings
          • University history
          • Roll of honour
          • Health Management
          • Gender and equality
          • The Carinthian University Conference
          • Alps-Adriatic Rectors‘ Conference
          • The university and the region
        • Campus
          • On Campus
          • Art and Culture
          • Accommodation
          • Catering
          • Sports and leisure
          • Green campus
          • Car parks and parking regulations
          • More light, air, and openness
        • Contact
          • Vacancies
          • University bulletin
          • Partners & Sponsors
          • Media services
          • Family services
          • Services for disabled students
          • University library
          • Covid19 Information
  • Study
        • Courses offered
          • List of degree programmes
          • Extension programmes & extension curricula
          • Specialist courses & optional subjects
          • Continuing education programmes
          • Doctoral Degree Programme
          • Degree Programmes in English
        • Studying at AAU
          • New starter checklists
          • Applying to study
          • Starting your programme
          • During your programme
          • Completing your programme
          • Search for courses
        • Student Life
          • Scholarships & grants
          • Offices and services
          • Campus
          • Accommodation
          • Catering
          • Accessibility
          • Sport & leisure
          • Work & study
          • Family & study
        • Study abroad
          • Study in Klagenfurt
          • Study abroad
          • Summer schools
          • Support & advice
        • Support & Information
          • Term dates and deadlines
          • FAQs
          • Admissions and Examinations Office
          • Office of Academic Affairs
          • Student Guidance Service
          • Union of Students (ÖH)
          • International Office
          • Doc.Service
          • Student Ombudsman
          • Alumni & careers
          • University library
  • Research
        • Research profile
          • Grants & Winners
          • Main research areas
          • Institutional partnerships
          • Good academic practice
          • Institutional Review Board for Research Ethics
          • Open Access
          • Knowledge transfer
          • Kollegs
        • Research funding
          • Internal funding
          • External funding
        • Career progression for young researchers
          • Thematic Doctoral Programmes
          • Young scientists mentoring
          • Career paths
          • Continuing education programme for young researchers
          • Think Tank
        • Support & communications
          • The Research Support Service
          • Science communications
          • Research Information System (FoDok)
  • International
        • International Profile
          • Courses offered in English
          • Partner universities
        • Study abroad
          • Joint-Study
          • Joint and double degrees
          • Short-term research placements abroad
          • Summer schools
          • Further outgoing grants
          • FAQ for outgoing students
          • Erasmus+ student mobility
        • Work and research abroad
          • Lecturers
          • Young researchers
          • General staff
          • Subject-specific international placements
          • Teaching German abroad
          • Erasmus+ student internships
        • Study in Klagenfurt
          • Students in mobility programmes
          • Entry & Residence (VISA)
          • Accommodation
          • MORE programme for refugees
        • Information & advice
          • International Office
          • Admissions and Examinations Office
          • Language Centre German in Austria
          • Entrée - ESN Klagenfurt
          • ÖH Referat Interkulturalität
          • Language certificates

DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND CYBERSECURITY

AAU1/...Department of Artificial Intelligence and Cybersecurity2/Research Groups3/Research Group System Security4/Publications

Publications

SYSSEC Publications (Coming from CRIS)

Patrick Horster

Peter Schartner

Stefan Rass

Raphael Wigoutschnigg

    2020
  • Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martin, Stefan Schauer, Andreas Poppe, Christoph Pacher: Quantum Key Distribution. ACM Computing Surveys (CSUR), 53, 2020, S. 1 - 41.

  • Christian Wankmüller, Stefan Rass, Friederike Wall: Ten expert views on the COVID-19 pandemic. Mind & Society, Springer International Publishing AG, Cham, 2020,

  • Stefan Rass: Judging the quality of (fake) news on the internet. Mind & Society, Springer International Publishing AG, Cham, 2020,

  • Sandra König, Antonios Gouglidis, Stefan Rass, Neil Adams, Paul Smith, David Hutchison: Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach. Guide to Disaster-Resilient Communication Networks, 2020, S. 769 - 789.

  • Daniela Elisabeth Ströckl, Claudia Steinberger, Vladimir A. Shekhovtsov, Gerhard Leitner, Christian Kop, Peter Schartner: Smart City Technology meets Smart Health Assistive Systems – on the example of the project AYUDO. Proceedings of the 13th ACM International Conference on Pervasive TechnologiesRelated to Assistive Environments, ACM Press, New York (NY), 2020, S. 1 - 7.

  • 2019
  • Miralem Mehic, Peppino Fazio, Stefan Rass, Oliver Maurhart, Momtchil Peev, Andreas Poppe, Jan Rozhon, Marcin Niemiec, Miroslav Voznak: A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks . IEEE / ACM Transactions on Networking, IEEE, Piscataway (NJ), 2019, S. 1 - 10.

  • Peter Schartner: 16. Österreichischer IT-Sicherheitstag. 16. Österreichischer IT-Sicherheitstag, syssec (Klagenfurt), Klagenfurt, 2019,

  • C. Cichy, Stefan Rass: An Overview of Data Quality Frameworks. IEEE Access, IEEE, 7, Piscataway (NJ), 2019, S. 24634 - 24648.

  • Sandra König, Stefan Rass, Stefan Schauer: Cyber-Attack Impact Estimation for a Port . Proceedings of the Hamburg International Conference of Logistics (HICL), 2019, S. 163 - 183.

  • Sergei Bauer, Martin Brunner, Peter Schartner: Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys . 2019 Third IEEE International Conference on Robotic Computing (IRC), 2019, S. 425 - 426.

  • Peter Schartner: Modul: IT-Sicherheit. Modul: IT-Sicherheit, 2019,

  • Stefan Rass, Stefan Schauer: Refining Stochastic Models of Critical Infrastructures by Observation. 56th ESReDA Seminar (23-24 May 2019, Linz, Austria), 2019, S. 198 - 211.

  • Stefan Schauer, Thomas Alexander Grafenauer, Sandra König, Stefan Rass: A Simulation-driven Approach for Measuring Risk and Resilience in the Network of Critical Infrastructures. 56th ESReDA Seminar (23-24 May 2019, Linz, Austria), 2019, S. 212 - 223.

  • Sergei Bauer, Peter Schartner: Reducing Risk Potential by Evaluating Specialized Countermeasures for Electronic Control Units. Proceedings of 7th escar (Embedded Security in Cars) USA 2019, 2019, S. 13

  • Stefan Rass, Sandra König, Emmanouil Panaousis: Cut-The-Rope: A Game of Stealthy Intrusion . Decision and Game Theory for Security, Springer, Berlin, 2019, S. 404 - 416.

  • Sandra König, Stefan Rass, Benjamin Rainer, Stefan Schauer: Hybrid Dependencies Between Cyber and Physical Systems . Intelligent Computing - Proceedings of the Computing Conference, 2, 2019, S. 550 - 565.

  • Sandra König, Thomas Schaberreiter, Stefan Rass, Stefan Schauer: A Measure for Resilience of Critical Infrastructures . Critical Information Infrastructures Security, Springer Verlag GmbH, 11260, Berlin, Heidelberg, New York, 2019, S. 57 - 71.

  • C. Cichy, Stefan Rass: A Fuzzy-Approximation Approach to Explainable Information Quality Assessment . Proceedings of the 34th International Business Information Management Association Conference (IBIMA), International Business Information Management Association, 2019, S. 3919 - 3931.

  • Stefan Rass, F. Skopik, Andreas Schorn: Trust and Distrust: On Sense and Nonsense in Big Data . IFIP Advances in Information and Communication Technology, Springer, 547, Berlin, 2019, S. 1 - 14.

  • Quanyan Zhu, Stefan Rass, Peter Schartner: Community-Based Security for the Internet of Things . Smart Cities Cybersecurity and Privacy, Elsevier Press, USA, 2019, S. 11 - 19.

  • Nadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis: Honeypot Type Selection Games for Smart Grid Networks . Decision and Game Theory for Security, Springer, Berlin, 2019, S. 85 - 96.

  • 2018
  • Stefan Rass, Sandra König: 'HyRiM': Multicriteria Risk Management using Zero-Sum Games with vector-valued payoffs that are probability distributions . CRAN, R Core Developers, Wien, 2018,

  • Peter Schartner: 15. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2018,

  • Stefan Schauer, Sandra König, Stefan Rass, Thomas Alexander Grafenauer, Jasmin Wachter, Thomas Schaberreiter, Gerald Quirchmayr, Simon Poledna, Martin Latzenhofer, Romana Stollnberger, Klaus Steinnocher: Risikobewertung für vernetzte kritische Infrastrukturen. DACH Security 2018, syssec (Frechen), -, Frechen, 2018, S. 313 - 322.

  • Peter Schartner, Norbert Pohlmann: DACH Security 2018. syssec (Frechen), -, Frechen, 2018,

  • Jasmin Wachter, Stefan Rass, Sandra König: Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria. Games, 9, 2018,

  • Stefan Rass, Stefan Schauer: Game Theory for Security and Risk Management: From Theory to Practice . Springer International Publishing AG, Cham, 2018,

  • Stefan Schauer, Sandra König, Martin Latzenhofer, Stefan Rass, Thomas Alexander Grafenauer: Analyzing Cascading Effects among Critical Infrastructures: The CERBERUS Approach. Proceedings of the 15th ISCRAM Conference, International Community on information systems for crisis response and management (ISCRAM), Brussels, 2018, S. 428 - 437.

  • Stefan Rass, Sandra König: Password Security as a Game of Entropies. Entropy, MDPI Publishing, 20, Basel, 2018, S. 312

  • Quanyan Zhu, Stefan Rass: On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats . IEEE Access, IEEE, 6, Piscataway (NJ), 2018, S. 13958 - 13971.

  • Gabriele Frankl, Peter Schartner, Dietmar Jost: The "Secure Exam Environment". Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing, Springer, 515, Berlin, 2018, S. 179 - 188.

  • Stefan Rass: Security Strategies and Multi-Criteria Decision Making. Game Theory for Security and Risk Management: From Theory to Practice , Springer International Publishing AG, Cham, 2018, S. 47 - 71.

  • Thomas Alexander Grafenauer, Sandra König, Stefan Rass, Stefan Schauer: A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), ACM Press, New York (NY), 2018, S. 1 - 8.

  • Sandra König, Stefan Rass: Investigating Stochastic Dependencies Between Critical Infrastructures. International Journal On Advances in Systems and Measurements, International Academy, Research and Industry Association (IARIA), 11, Valencia, 2018, S. 250 - 258.

  • Miralem Mehic, Peppino Fazio, Stefan Rass, Oliver Maurhart, Momtchil Peev, Andreas Poppe, Jan Rozhon, Marcin Niemiec, Miroslav Voznak: A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks. http://arxiv.org/, 2018,

  • Stefan Rass: Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks. http://arxiv.org/, 2018,

  • Quanyan Zhu, Stefan Rass: Game Theory Meets Network Security: A Tutorial at ACM CCS. http://arxiv.org/, 2018,

  • Stefan Rass: Decision Making When Consequences Are Random. Game Theory for Security and Risk Management: From Theory to Practice , Springer International Publishing AG, Cham, 2018, S. 21 - 46.

  • Stefan Rass, Peter Schartner, Jasmin Wachter: Authentic Quantum Nonces. SECURWARE 2018: The Twelfth International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2018, S. 139 - 142.

  • Sandra König, Thomas Alexander Grafenauer, Stefan Rass, Stefan Schauer: Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To. SECURWARE 2018: The Twelfth International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2018, S. 150 - 157.

  • Gabriele Frankl, Sebastian Napetschnig, Peter Schartner: Pathways to Successful Online Testing: eExams with the “Secure Exam Environment” (SEE). Technology Enhanced Assessment, Springer, Berlin, 2018, S. 190 - 209.

  • Patrick Kubiak, Stefan Rass: An overview of data-driven techniques for IT-service-management. IEEE Access, IEEE, 6, Piscataway (NJ), 2018, S. 63664 - 63688.

  • Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Rass, Stefan Schauer: Risk Assessment Uncertainties in Cybersecurity Investments . Games, 9, 2018,

  • Jasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer: Disappointment-Aversion in Security Games. Decision and Game Theory for Security. GameSec 2018, Springer, Berlin, 2018, S. 314 - 325.

  • 2017
  • Bernhard Dieber, Benjamin Breiling, Sebastian Taurer, Severin Kacianka, Stefan Rass, Peter Schartner: Security for the Robot Operating System. Robotics and Autonomous Systems, Elsevier B.V., 98, Amsterdam, 2017, S. 192 - 203.

  • Stefan Rass, Johannes Winkler: Learning pairing-based cryptography by hands-on exercises. 6th International Conference on Teaching, Assessment, and Learning for Engineering (TALE), IEEE, -, Piscataway (NJ), 2017, S. 186 - 191.

  • Miralem Mehic, Oliver Maurhart, Stefan Rass, Dan Komosny, Filip Rezac, Miroslav Voznak: Analysis of the Public Channel of Quantum Key Distribution Link. Journal of Quantum Electronics, IEEE, 53, Piscataway (NJ), 2017, S. 1 - 8.

  • Peter Schartner: 14. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2017,

  • Stefan Rass, Sandra König, Stefan Schauer: On the Cost of Game Playing: How to Controlthe Expenses in Mixed Strategies. Decision and Game Theory for Security, Springer, 10575, Berlin, 2017, S. 494 - 505.

  • Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer: Decision and Game Theory for Security. Springer, 10575, Berlin, 2017,

  • Miralem Mehic, Oliver Maurhart, Stefan Rass, Miroslav Voznak: Implementation of Quantum Key Distribution Network Simulation Module in the Network Simulator NS-3. Quantum Information Processing, Springer, 16, Berlin, 2017,

  • Peter Schartner, Andrea Baumann: DACH Security 2017. syssec (Frechen), Frechen, 2017,

  • Jasmin Wachter, Thomas Alexander Grafenauer, Stefan Rass: Visual Risk Specification and Aggregation. SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2017, S. 93 - 98.

  • Sandra König, Stefan Rass: Stochastic Dependencies Between Critical Infrastructures. SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2017, S. 106 - 110.

  • Stefan Rass, Jasmin Wachter, Stefan Schauer, Sandra König: Subjektive Risikobewertung – Über Datenerhebung und Opinion Pooling. DACH Security 2017, syssec (Frechen), Frechen, 2017, S. 225 - 237.

  • Stefan Schauer, Sandra König, Martin Latzenhofer, Stefan Rass: Identifying and Managing Risks in Interconnected Utility Networks. SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, International Academy, Research, and Industry Association (IARIA), 2017, S. 79 - 86.

  • Ali Alshawish, Mohamed Amine Abid, Stefan Rass, Hermann de Meer: Playing a Multi-objective Spot-checking Game in Public Transportation Systems. 4th Workshop on Security in highly connected IT systems (SHICS), ACM - New York, New York, NY, 2017, S. 31 - 36.

  • Stefan Rass: Towards a Physical Oracle for the Partition Problem using Analogue Computing. Arxiv, 2017,

  • Benjamin Breiling, Bernhard Dieber, Peter Schartner: Secure communication for the Robot Operating System. 2017 Annual IEEE Systems Conference (SysCon), IEEE, Piscataway (NJ), 2017, S. 360 - 366.

  • Stefan Rass, Ali Alshawish, Mohamed Amine Abid, Stefan Schauer, Quanyan Zhu, Hermann de Meer: Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory. IEEE Access, IEEE, 5, Piscataway (NJ), 2017, S. 1

  • Stefan Rass, Sandra König, Stefan Schauer: Defending Against Advanced Persistent Threats Using Game-Theory. PLOS ONE, Public Library of Science, 12, San Francisco (CA), 2017, S. 1 - 43.

  • Stefan Rass, Johannes Göllner, Andreas Peer, Gerald Quirchmayr, Viliam Zathurecky: Global Supply Chain Network Risk Analysis and Monitoring for Global Cyber Defense.. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense., Springer International Publishing AG, Cham, 2017, S. 1 - 23.

  • 2016
  • Stefan Rass, Sandra König, Stefan Schauer: Decisions with Uncertain Consequences-A Total Ordering on Loss-Distributions. PLOS ONE, Public Library of Science, San Francisco (CA), 2016, S. 1 - 23.

  • Markus Wamser, Stefan Rass, Peter Schartner: Oblivious lookup-tables. Tatra Mountains, 67, 2016, S. 191 - 205.

  • Stefan Schauer, Sandra König, Stefan Rass, Antonios Gouglidis, Ali Alshawish, Hermann de Meer: Risk Minimization in Physical Surveillance: Playing an Uncertain Cops-and-Robbers Game. Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Springer, 9996, Berlin, 2016, S. 471 - 471.

  • Stefan Rass, Quanyan Zhu: GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies against Advanced Persistent Threats. Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Springer, 9996, Berlin, 2016, S. 314 - 326.

  • Hermann Seuschek, Stefan Rass: Side-channel leakage models for RISC instruction set architectures from empirical data. Microprocessors and Microsystems, Elsevier B.V., 47, Amsterdam, 2016, S. 74 - 81.

  • Sandra König, Stefan Schauer, Stefan Rass: A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. Secure IT Systems - 21st Nordic Conference, NordSec 2016, Springer, 10014, Berlin, 2016, S. 67 - 81.

  • Stefan Rass, Peter Schartner: On the Security of a Universal Cryptocomputer – The Chosen Instruction Attack. IEEE Access, IEEE, 4, Piscataway (NJ), 2016, S. 7874 - 7882.

  • Peter Schartner: 13. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2016,

  • Bernhard Dieber, Severin Kacianka, Stefan Rass, Peter Schartner: Application-level Security for ROS-based Applications. Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, IEEE, Piscataway (NJ), 2016, S. 4478 - 4482.

  • Jeremy Busby, Antonios Gouglidis, Stefan Rass, Sandra König: Modelling Security Risk in Critical Utilities: The System at Risk as a Three Player Game and Agent Society. IEEE, 2016, S. 1 - 6.

  • Bernhard Dieber, Severin Kacianka, Stefan Rass, Peter Schartner: Sicherheit für ROS-basierte Applikationen auf Anwendungsebene . D⋅A⋅CH Security 2016, syssec (Klagenfurt), Klagenfurt, 2016, S. 363 - 370.

  • Peter Schartner: D⋅A⋅CH Security 2016. syssec (Klagenfurt), Klagenfurt, 2016,

  • Stefan Schauer, Sandra König, Stefan Rass, Martin Latzenhofer: Spieltheoretische Risikominimierung in IKT-Infrastrukturen. D⋅A⋅CH Security 2016, syssec (Klagenfurt), Klagenfurt, 2016, S. 174 - 187.

  • Stefan Rass: On the Existence of Weak One-Way Functions. Arxiv, 2016, S. 1 - 39.

  • Alexander Beck, Stefan Rass: Using Neural Networks to Aid CVSS Risk Aggregation – An empirically Validated Approach . Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference (FLAIRS), AAAI Press, Menlo Park (CA), 2016, S. 294 - 297.

  • Stefan Rass, Raphael Wigoutschnigg: Arguable Anonymity from Key-Privacy: The Deterministic Crowds Protocol . Proceedings of of IEEE/IFIP Network Operations and Management Symposium , IEEE, Piscataway (NJ), 2016, S. 571 - 576.

  • Stefan Rass, Peter Schartner: Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing. CLOUD COMPUTING 2016 The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, International Academy, Research, and Industry Association (IARIA), 2016, S. 7 - 13.

  • Sandra König, Stefan Rass, Stefan Schauer, Alexander Beck: Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Advanced Computer Science and Applications (IJACSA), SAI – The Science and Information Organization, 7, New York, NY , 2016, S. 694 - 701.

  • 2015
  • Stefan Rass, Peter Schartner, Monika Brodbeck: Private function evaluation by local two-party computation. EURASIP Journal on Information Security, Springer, 7, Berlin, 2015,

  • Stefan Rass: On Game-Theoretic Risk Management (Part Two). arXiv:1511.08591 [q-fin.EC], 2015,

  • Stefan Rass, Sandra König, Stefan Schauer: Uncertainty in Games: Using Probability-Distributions as Payoffs. Decision and Game Theory for Security, Springer International Publishing AG, 9406, Cham, 2015, S. 346 - 357.

  • Peter Schartner: 12. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2015,

  • Stefan Rass: On Game-Theoretic Risk Management (Part One). arXiv:1506.07368 [q-fin.EC], 2015,

  • Stefan Rass, Peter Schartner, Markus Wamser: Oblivious Lookup Tables. 15th Central European Conference on Cryptology (CECC 2015), 2015,

  • Stefan Schauer, Christian Kollmitzer, Oliver Maurhart, Peter Schartner, Stefan Rass: Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf. D•A•CH Security 2015, syssec (Klagenfurt), Klagenfurt, 2015, S. 253 - 266.

  • Hermann Seuschek, Stefan Rass: Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data. 2015 Euromicro Conference on Digital System Design, IEEE, Piscataway (NJ), 2015, S. 423 - 430.

  • Peter Schartner, Kerstin Lemke-Rust, Markus Ullmann: D•A•CH Security 2015. syssec (Klagenfurt), Klagenfurt, 2015,

  • Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer: Secure Communication over Software-Defined Networks. Journal of Mobile Networks and Applications, Springer International Publishing AG, 20, Cham, 2015, S. 105 - 110.

  • Stefan Rass, Sandra König, Stefan Schauer: BB84 Quantum Key Distribution with Intrinsic Authentication. ICQNM 2015: The Ninth International Conference on Quantum, Nano/Bio, and Micro Technologies, International Academy, Research, and Industry Association (IARIA), 2015, S. 41 - 44.

  • Sandra König, Stefan Rass: Stochastic Models for Quantum Device Configuration and Self-Adaptation. International Journal on Advances in Systems and Measurements, International Academy, Research, and Industry Association (IARIA), 8, 2015, S. 124 - 134.

  • Stefan Rass, Peter Schartner: Licensed Processing of Encrypted Information. Proceedings of IEEE Conference on Communications and Network Security (CNS), 2015, IEEE, Piscataway (NJ), 2015, S. 703 - 704.

  • 2014
  • Peter Schartner, Stefan Rass: Hardware Security. DuD Sonderheft 11/2014 "Hardware Security", Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2014, S. 733

  • Peter Schartner, Stefan Rass: DuD Sonderheft 11/2014 "Hardware Security". DuD Sonderheft 11/2014 "Hardware Security", Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2014, S. 733 - 733.

  • Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer: Secure Communication over Software-Defined Networks. Proceedings of the International Conference on Software-Defined and Virtualized Future Wireless Networks, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), Brussels, 2014,

  • Stefan Rass, Stefan Schauer, Johannes Göllner, Andreas Peer: Security Strategies towards Mutually Dependent Goals (extended abstract). 21st European Meeting on Cybernetics and Systems Research. BCSSS. Vienna, Bertalanffy Center for the Study of Systems Science (BCSSS), Vienna, 2014, S. 630 - 634.

  • Fabrizio de Santis, Stefan Rass: On Efficient Leakage Resilient Pseudo-Random Functions from Hard-to-Invert Leakages. Proceedings of Third International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2014), Springer International Publishing AG, Cham, 2014, S. 73 - 89.

  • Stefan Rass, Johannes Winkler: Computer Aided Teaching of Elliptic Curve Cryptography . Proceedings of the 17th International Conference on Interactive Collaborative Learning, IEEE, Piscataway (NJ), 2014,

  • Raphael Wigoutschnigg: Anonymität und Mehrwegeübertragung. DACH Security 2014, syssec (Klagenfurt), Klagenfurt, 2014, S. 82 - 93.

  • Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Benjamin Schauer: Secure Communication over Software-Defined Networks. Proceedings of the International Conference on Software-Defined and Virtualized Future Wireless Networks, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), Brussels, 2014,

  • Stefan Schauer, Johannes Göllner, Andreas Peer, Stefan Rass: Entwicklung einer Test-Umgebung für Risiko-Assessmenttools. DACH Security 2014, syssec (Klagenfurt), Klagenfurt, 2014, S. 157 - 169.

  • Stefan Rass, Sandra König: Self-Adaption of Quantum Key Distribution Devices to Changing Working Conditions. Proceedings of the Eighth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2014), Xpert Publishing Services (XPS), Wilmington (DE), 2014, S. 1 - 7.

  • Stefan Rass, Benjamin Rainer: Numerical Computation of Multi-Goal Security Strategies. Decision and Game Theory for Security, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2014, S. 118 - 133.

  • Stefan Rass, Benjamin Rainer: Numerical Computation of Multi-Goal Security Strategies. Conference on Decision and Game Theory for Security, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2014, S. 118 - 133.

  • Fabrizio de Santis, Stefan Rass: On Efficient Leakage Resilient Pseudo-Random Functions from Hard-to-Invert Leakages. Proceedings of Third International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2014) , Springer International Publishing AG, Cham, 2014, S. 73 - 89.

  • Stefan Rass: Complexity of Network Design for Private Communication and the P-vs-NP question. International Journal of Advanced Computer Science and Applications , SAI – The Science and Information Organization, 5, New York, NY , 2014, S. 148 - 157.

  • Raphael Wigoutschnigg: Anonymität und Mehrwegeübertragung. DACH Security 2014, syssec (Klagenfurt), Klagenfurt, 2014, S. 82 - 93.

  • Peter Schartner, Peter Lipp: DACH Security 2014. syssec (Klagenfurt), Klagenfurt, 2014,

  • Peter Schartner: 11. IT-Sicherheitstag. syssec (Frechen), Frechen, 2014,

  • Stefan Rass, Peter Schartner: Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud. Sicherheit 2014, 2014, S. 187 - 199.

  • Patrick Horster, Franz Kollmann, Stefan Rass, Martin Schaffer, Peter Schartner: Kurseinheit ITS1: Systemsicherheit, revised edition. Zentrale für Fernstudien an Fachhochschulen, Koblenz, 2014,

  • Peter Schartner, Peter Lipp: DACH Security 2014. syssec (Frechen), Frechen, 2014,

  • Peter Schartner: 11. IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2014,

  • Stefan Rass, Peter Schartner, Patrick Horster, Alexander Abl: Privacy-Preserving Speed-Limit Enforcement. International Journal of Traffic and Logistics Engineering, Engineering and Technology Publishing , Rowland Heights, 2014, S. 26 - 33.

  • 2013
  • S. Rass, Stefan Rass: Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption. International Journal of Advanced Computer Science and Applications , SAI – The Science and Information Organization, 4, New York, NY , 2013, S. 47 - 56.

  • D. Posch, H. Hellwagner, P. Schartner, Peter Schartner, Hermann Hellwagner, Daniel Posch: On-Demand Video Streaming based on Dynamic Adaptive Encrypted Content Chunks. Proceedings of the 8th International Workshop on Secure Network Protocols (NPSec' 13), IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 6 - 6.

  • Stefan Rass, Benjamin Rainer, Stefan Schauer: On the Practical Feasibility of Secure Multipath Communication. International Journal of Advanced Computer Science and Applications , SAI – The Science and Information Organization, 4, New York, NY , 2013, S. 99 - 108.

  • P. Schartner, P. Horster, Peter Schartner, Patrick Horster: 10. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2013,

  • G. Frankl, R. Schoblick, G. Zebedin, P. Schartner, Gabriele Frankl, Peter Schartner, Gerald Zebedin, Robert Hans Schoblick: Sichere Online Prüfungen an der Alpen-Adria Universität Klagenfurt. Digitale Schule Österreich, Österreichische Computer Gesellschaft ÖCG, Wien, 2013,

  • R. Wigoutschnigg, P. Schartner, St. Rass, Raphael Wigoutschnigg, Peter Schartner, Stefan Rass: Shared Crowds: A Token-Ring Approach to Hide the Receiver. The Eight International Workshop on Frontiers in Availability, Reliability and Security (FARES 2013 ), IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 383 - 389.

  • R. Wigoutschnigg, P. Schartner, S. Rass, Stefan Rass, Raphael Wigoutschnigg, Peter Schartner: Extended Crowds with Adjustable Receiver Anonymity. IADIS e-society 2013, International Association for Development of the Information Society (IADIS), Lisbon, 2013, S. 472 - 476.

  • P. Horster, S. Rass, P. Schartner, Stefan Rass, Peter Schartner, Patrick Horster: Lehreinheit "ITS6 - Sicherheitsinfrastrukturen". Fachhochschule Trier, Trier, 2013,

  • Stefan Rass, Stefan Schauer, Andreas Peer, Johannes Göllner: Sicherheit auf Basis Multikriterieller Spieltheorie. DACH Security 2013, syssec (Frechen), Frechen, 2013, S. 289 - 301.

  • Peter Schartner, Peter Trommler: D•A•CH Security 2013. syssec (Frechen), Frechen, 2013,

  • Stefan Rass, Benjamin Rainer, Matthias Vavti, Stefan Schauer: A Network Modeling and Analysis Tool for Perfectly Secure Communication. Proceedings of the 27th International Conference on Advanced Information Networking and Applications, IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 267 - 275.

  • Stefan Rass, Sebastian Kurowski: On Bayesian Trust and Risk Forecasting for Compound Systems. Proceedings of 7th International Conference on IT Security Incident Management & IT Forensics Jahr: 2013, IEEE Computer Society Press, Los Alamitos (CA), 2013, S. 69 - 82.

  • Stefan Rass, Daniel Slamanig: Cryptography for Security and Privacy in Cloud Computing. Artech House, London - Boston, 2013,

  • S. Rass, Stefan Rass: Dynamic Proofs of Retrievability from Chameleon-Hashes. Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT), SciTePress - Science and Technology Publications, Setubal, 2013, S. 296 - 304.

  • 2012
  • P. Schartner, P. Horster, Peter Schartner, Patrick Horster: 9. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2012,

  • P. Schartner, J. Taeger, Peter Schartner: DACH Security 2012. syssec (Frechen), Frechen, 2012,

  • S. Schauer, S. Rass, B. Rainer, Stefan Rass, Benjamin Rainer: IT-Security Risiko Management mit Elementen der Spieltheorie. DACH Security 2012, syssec (Frechen), Frechen, 2012, S. 106 - 117.

  • S. Rass, Stefan Rass: DuD Datenschutz und Datensicherheit. Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2012,

  • T. Fenzl, A. Golla, S. Herda, S. Rass, C. Kollmitzer, Stefan Rass, Thomas Fenzl, Sabine Herda, Archana Golla: Können Gesichter ein Passwort sein?. 10. Tagung der Österreichischen Gesellschaft für Psychologie. Tagungsband, Karl-Franzens-Universität Graz, Graz, 2012, S. 102 - 102.

  • S. Rass, A. Ortner, Stefan Rass: Sunset/FFapl - An Integrated Development Environment for Teaching Cryptography. Proceedings of the 15th International Conference on Interactive Collaborative Learning, IEEE, Piscataway (NJ), 2012, S. 8 - 8.

  • S. Rass, P. Schartner, R. Wigoutschnigg, C. Kollmitzer, Stefan Rass, Raphael Wigoutschnigg, Peter Schartner: Anonymous Communication by Branch-and-Bound. Proceedings of the Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, IEEE, Piscataway (NJ), 2012, S. 94 - 102.

  • S. Rass, Stefan Rass: On Game-Theoretic Network Security Provisioning. Journal of Network and Systems Management, Springer Verlag GmbH, 21, Berlin, Heidelberg, New York, 2012, S. 47 - 64.

  • Thomas Fenzl, Stefan Rass: Usability of a face-recognition based login-challenge. Review of Psychology, 19, 2012, S. 62 - 62.

  • S. Rass, S. König, Stefan Rass: Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries. International Journal On Advances in Systems and Measurements, International Academy, Research and Industry Association (IARIA), 5, Valencia, 2012, S. 22 - 33.

  • S. Rass, Stefan Rass: Security Risk Measuring And Forecasting. Cryptography: Protocols, Design and Applications, Nova Science Publishers, Hauppauge (NY), 2012,

  • P. Schartner, Peter Schartner: Unique domain-specific Citizen Identification for E-Government Applications. Proceedings of The Sixth International Conference on Digital Society ICDS 2012, Alpen-Adria-Universität Klagenfurt, Klagenfurt am Wörthersee, 2012, S. 23 - 28.

  • G. Frankl, P. Schartner, G. Zebedin, Gerald Zebedin, Peter Schartner, Gabriele Frankl: Secure Online Exams using students' devices. Proceedings of the 2012 IEEE Global Engineering Education Conference (EDUCON) , IEEE, Piscataway (NJ), 2012, S. 1 - 7.

  • S. Rass, Stefan Rass: On Secure Communication over Wireless Sensor Networks. Proceedings of the International Conference on Security and Cryptography (SECRYPT), SciTePress - Science and Technology Publications, Setubal, 2012, S. 364 - 367.

  • 2011
  • D. Fox, P. Schartner, Peter Schartner: DuD Datenschutz und Datensicherhheit. Gabler Verlag/GWV-Fachverlage GmbH, Wiesbaden, 2011,

  • G. Frankl, P. Schartner, G. Zebedin, Peter Schartner, Gabriele Frankl: The "Secure Exam Environment" for Online Testing at the Alpen-Adria-Universität Klagenfurt / Austria. E-Learn 2011--World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, volume 2011, Association for the Advancement of Computing in Education (AACE), Chesapeake (VA), 2011, S. 1201 - 1211.

  • P. Schartner, P. Horster, Peter Schartner, Patrick Horster: 8. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2011,

  • G. Frankl, P. Schartner, G. Zebedin, Gerald Zebedin, Peter Schartner, Gabriele Frankl: The "Secure Exam Environment" for Online Testing at the Alpen-Adria-Universität Klagenfurt/Austria. Proceedings of the E-Learn 2011. World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Association for the Advancement of Computing in Education (AACE), Chesapeake (VA), 2011, S. 498 - 505.

  • P. Schartner, J. Taeger, Peter Schartner: DACH Security 2011. syssec (Frechen), Frechen, 2011,

  • S. Rass, Machot F. Al, K. Kyamakya, Kyandoghere Kyamakya, Fadi Al Machot, Stefan Rass: Fine-Grained Diagnostics of Ontologies with Assurance. Efficient Decission Support Systems - Practice and Challenges From Current to Future, Intech, Vukovar, 2011, S. 79 - 98.

  • P. Schartner, Peter Schartner: A low-cost alternative for OAEP. syssec (Klagenfurt), Klagenfurt, 2011,

  • S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Information-Leakage in Hybrid Randomized Protocols. Proceedings of the International Conference on Security and Cryptography (SECRYPT), SciTePress - Science and Technology Publications, Setubal, 2011, S. 134 - 143.

  • S. Rass, S. König, Stefan Rass: Indirect Eavesdropping in Quantum Networks. Proceedings of the Fifth International Conference on Quantum, Nano and Micro Technologies (ICQNM), Xpert Publishing Services (XPS), Wilmington (DE), 2011, S. 83 - 88.

  • S. König, S. Rass, Stefan Rass: On the transmission capacity of quantum networks. International Journal of Advanced Computer Science and Applications (IJACSA), SAI – The Science and Information Organization, 2, New York, NY , 2011, S. 9 - 16.

  • S. Rass, Machot F. Al, K. Kyamakya, Stefan Rass: Fine Grained Diagnostics of Ontologies with Assurance. Efficient Decision Support Systems - Practice and Challenges From Current to Future, Intech, Vukovar, 2011, S. 79

  • D. Slamanig, S. Rass, Stefan Rass: On Security and Privacy in Cloud Computing. Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER), SciTePress Digital Library, Setubal, 2011, S. 604 - 609.

  • S. Rass, R. Wigoutschnigg, P. Schartner, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Crowds Based on Secret-Sharing. Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, Los Alamitos (CA), 2011, S. 359 - 364.

  • R. Wigoutschnigg, P. Schartner, S. Rass, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Crowds mit beeinflussbarer Empfängeranonymität. DACH Security 2011, syssec (Frechen), Frechen, 2011, S. 304 - 313.

  • S. Rass, R. Wigoutschnig, P. Schartner, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Innovative Information Science & Technology Research Group (ISYOU), 2, Seoul, 2011, S. 25 - 39.

  • S. Rass, Machot F. Al, K. Kyamakya, Fadi Al Machot, Stefan Rass, Kyandoghere Kyamakya: Fine-Grained Diagnostics of Ontologies with Assura. Efficient Decision Support Systems: Practice and Challenges - From current to Future / Book 1, Intech, 1, Vukovar, 2011,

  • S. Rass, Stefan Rass: Towards a Rapid-Alert System for Security Incidents. Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics (IMF), IEEE Computer Society Press, Los Alamitos (CA), 2011, S. 122 - 136.

  • D. Slamanig, S. Rass, Stefan Rass: Redigierbare Digitale Signaturen – Theorie und Praxis. Datenschutz und Datensicherheit (DuD), 35, 2011, S. 757 - 762.

  • S. Rass, P. Schartner, Peter Schartner, Stefan Rass: The NP-complete face of information-theoretic security. Computer Technology and Application, David Publishing Company, 2, Libertyville (IL), 2011, S. 893 - 905.

  • 2010
  • P. Schartner, P. Horster, Patrick Horster, Peter Schartner: 7. IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2010,

  • S. Rass, P. Schartner, Stefan Rass, Peter Schartner: Multipath Authentication without Shared Secrets and With Applications in Quantum Networks. Proceedings of the International Conference on Security and Management (SAM 2010), CSREA Press, Las Vegas (NV), 2010, S. 111 - 115.

  • P. Schartner, S. Bürger, Peter Schartner, Stefan Bürger: Attacking mTAN Applications like e-Banking and Mobile Signatures. syssec (Klagenfurt), Klagenfurt, 2010,

  • S. Rass, D. Schuller, C. Kollmitzer, Stefan Rass: Entropy of Graphical Passwords: Towards an Information-theoretic Analysis of Face-Recognition Based Authentication. Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 166 - 177.

  • S. Rass, P. Schartner, Stefan Rass, Peter Schartner: Non-Interactive Information Reconciliation for Quantum Key Distribution. 24th IEEE International Conference on Advanced Information Networking and Applications, IEEE, Piscataway (NJ), 2010, S. 1054 - 1060.

  • S. Rass, A. Wiegele, P Schartner, Peter Schartner, Stefan Rass, Angelika Wiegele: Building a Quantum Network: How to Optimize Security and Expenses. Journal of Network and Systems Management, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 17 - 17.

  • P. Schartner, C. Kollmitzer, Peter Schartner: Quantum-cryptographic Networks from a Prototype to the Citizen. Applied Quantum Cryptography, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 173 - 184.

  • S. Rass, P. Schartner, R. Wigoutschnigg, Peter Schartner, Raphael Wigoutschnigg, Stefan Rass: Security as a Game – Decisions from Incomplete Models. Decision Support Systems, Intech, Vukovar, 2010, S. 391 - 406.

  • S. Rass, P. Schartner, Stefan Rass, Peter Schartner: A unified framework for the analysis of availability, reliability and security, with applications to quantum networks. IEEE Transactions on Systems, Man, and Cybernetics, IEEE, Piscataway (NJ), 2010, S. 1 - 13.

  • S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Quantenkryptographie – Überblick und aktuelle Entwicklungen. Datenschutz und Datensicherheit (DuD), 34, 2010, S. 753 - 757.

  • P. Schartner, E. Weippl, Peter Schartner: DACH Security 2010. syssec (Klagenfurt), Klagenfurt, 2010,

  • M. Schaffer, S Rass, Stefan Rass, Martin Schaffer: Fusion Discrete Logarithm Problems. Cornell University Library, Ithaca, NY, 2010,

  • S. Rass, C. Kollmitzer, Stefan Rass: Adaptive Cascade. Applied Quantum Cryptography, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 49 - 69.

  • D. Slamanig, S. Rass, Stefan Rass: Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Verlag GmbH, Berlin, Heidelberg, New York, 2010, S. 201 - 213.

  • P. Schartner, S. Rass, Stefan Rass, Peter Schartner: Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option. CD-Proceedings of “2010 International Computer Symposium (ICS)”, , IEEE, Piscataway (NJ), 2010,

  • D. Slamanig, S Rass, Stefan Rass: Anonymous But Authorized Transactions Supporting Selective Traceability. Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT), IEEE, Piscataway (NJ), 2010, S. 132 - 141.

  • 2009
  • P. Horster, P Schartner, Peter Schartner, Patrick Horster: 6. IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2009,

  • S Rass, Stefan Rass: On a convex optimization problem in system security. syssec (Klagenfurt), Klagenfurt, 2009,

  • D. Slamanig, P. Schartner, C Stingl, Christian Stingl, Peter Schartner: Practical Traceable Anonymous Identification. Proceedings of the International Conference on Security and Cryptography, SECRYPT 2009, INSTICC Press, Setubal, 2009, S. 225 - 232.

  • P. Horster, P. Schartner, Patrick Horster, Peter Schartner: DACH Security 2009. syssec (Frechen), Frechen, 2009,

  • S. Rass, R. Wigoutschnigg, P Schartner, Stefan Rass, Peter Schartner, Raphael Wigoutschnigg: Sichere Speicherung von Patientendaten mittels Chipkarten. DACH Security 2009, syssec (Frechen), Frechen, 2009, S. 185 - 194.

  • S. Fuchs, S. Rass, K Kyamakya, Stefan Rass: Handling Uncertainty in Context-Aware Driver Assistance Systems. Proceedings of the 2009 IEEE International Conference on Networking, Sensind and Control, IEEE, Piscataway (NJ), 2009, S. 446 - 467.

  • S. Fuchs, S. Rass, K. Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Handling Uncertainty in Context-Aware Driver Assistance Systems. Proceedings of the 2009 IEEE International Conference on Networking, Sensing and Control, ICNSC´09, Okayama, Japan, IEEE, Piscataway (NJ), 2009, S. 446 - 467.

  • K. Lessiak, C. Kollmitzer, S. Schauer, J. Pilz, S. Rass, Jürgen Pilz, Stefan Rass: Statistical Analysis of QKD Networks in Real-life Environments. 2009 Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 109 - 114.

  • S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Game-Theoretic Security Analysis of Quantum Networks. Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 20 - 25.

  • S. Rass, C. Kollmitzer, Stefan Rass: Adaptive Error Correction with Dynamic Initial Block Size in Quantum Cryptographic Key Distribution Protocols. 2009 Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 90 - 95.

  • P. Schartner, S Rass, Peter Schartner, Stefan Rass: How to overcome the ’Trusted Node Model’ in Quantum Cryptography. Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, IEEE, Piscataway (NJ), 2009, S. 4 - 4.

  • S. Rass, P. Schartner, M. Greiler, Peter Schartner, Michaela Greiler, Stefan Rass: Quantum Coin-Flipping-Based Authentication. 2009 IEEE International Conference on Communications ICC 2009, IEEE, Piscataway (NJ), 2009, S. 5 - 5.

  • M. Pivk, C. Kollmitzer, S. Rass, Stefan Rass, Mario Francesco Pivk: SSL/TLS with Quantum Cryptography. 2009 Third International Conference on Quantum, Nano and Micro Technologies, IEEE, Piscataway (NJ), 2009, S. 96 - 101.

  • S Rass, Stefan Rass: Simple Error Scattering Model for improved Information Reconciliation. Cornell University Library, Ithaca, NY, 2009,

  • S. Rass, P. Schartner, Peter Schartner, Stefan Rass: Security in Quantum Networks as an Optimization Problem. Proceedings of the International Conference on Availability, Reliability and Security, IEEE, Piscataway (NJ), 2009, S. 493 - 498.

  • S. Rass, Stefan Rass: Über Informationstheoretische Sicherheit: Aktuelle Probleme und Lösungen. Ausgezeichnete Informatikdissertationen 2009, Gesellschaft für Informatik e.V., Bonn, 2009, S. 201 - 210.

  • 2008
  • P. Schartner, M Schaffer, Martin Schaffer, Peter Schartner: Efficient Privacy-Enhancing Techniques for Medical Databases. Best papers of Biomedical Engineering Systems and Technologies 2008, Springer Verlag GmbH, 25, Berlin, Heidelberg, New York, 2008, S. 467 - 478.

  • P. Horster, P Schartner, Peter Schartner, Patrick Horster: 5. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2008,

  • S. Fuchs, S Rass, K. Kyamakya, Stefan Rass, Kyandoghere Kyamakya, Simone Fuchs: A Constraint-Based and Context-Aware Overtaking Assistant with Fuzzy-Probabilistic Risk Classification. Proceedings IADIS International Conference Wireless Applications and Computing 2008, International Association for Development of the Information Society (IADIS), Lisbon, 2008, S. 93 - 100.

  • S. Fuchs, S. Rass, K Kyamakya, Stefan Rass, Simone Fuchs, Kyandoghere Kyamakya: Constraint-based Context-Rule Representation and Risk Classification for Driver Assistance Systems. Proceedings First Annual International Symposium on Vehicular Computing Systems, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), Brussels, 2008, S. 53 - 98.

  • Simone Fuchs, Stefan Rass, Kyandoghere Kyamakya: Constraint-based Context-Rule Representation and Risk Classification for Driver Assistance Systems. Simone Fuchs, Stefan Rass, Kyandoghere Kyamakya, 2008,

  • S. Rass, S. Fuchs, K Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Towards a Game-Theoretic Model of Co-Operative Context-Aware Driving under Random Influences. Proceedings of the International Conference on Vehicular Electronics and Safety (ICVES) 2008, IEEE, Piscataway (NJ), 2008, S. 22 - 26.

  • S. Rass, S. Fuchs, M. Schaffer, K. Kyamakya, Simone Fuchs, Kyandoghere Kyamakya, Stefan Rass: How to Protect Privacy in Floating Car Data Systems. Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET) 2008-10-07, ACM - San Francisco, San Francisco (CA), 2008, S. 17 - 22.

  • S. Fuchs, S. Rass, K. Kyamakya, Simone Fuchs, Kyandoghere Kyamakya, Stefan Rass: A context-aware overtaking assistance system with fuzzy-probabilistic risk classification. Proceedings of the Lakeside Conference in Safety in Mobility 2008, Lakeside Science & Technology Park GmbH, Klagenfurt, 2008,

  • R. Wigoutschnigg, P Schartner, Raphael Wigoutschnigg, Peter Schartner: Java-basierte Simulation von Smartcards. DACH Security, syssec (Frechen), Frechen, 2008, S. 509 - 518.

  • M. Schaffer, P Schartner, Peter Schartner, Martin Schaffer: Über die lokale und verteilte Erzeugung systemweit eindeutiger Zufallszahlen. DACH Security 2008, syssec (Frechen), Frechen, 2008, S. 519 - 531.

  • Rass S., Fuchs S., Schaffer M., Kyamakya K., Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass, Martin Schaffer: On Privacy Issues in Floating Car Data Systems. Alpen-Adria-Universität Klagenfurt, Klagenfurt am Wörthersee, 2008,

  • M. Greiler, P Schartner, Michaela Greiler, Peter Schartner: Secure Resource Sharing in Ad Hoc Networks. Proceedings of the 2008 International Conference on Security and Management (SAM08), University of Georgia, Athens (GA), 2008, S. 278 - 284.

  • S. Fuchs, S. Rass, K Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems. Proceedings 1st International Workshop on Context-aware Adaptation Mechanisms for Pervasive and Ubiquitous Services (CAMPUS'08), University of Oslo, Oslo, 2008, S. 5 - 16.

  • P Horster, Patrick Horster: DACH Security 2008. syssec (Frechen), Frechen, 2008,

  • B. Lamprecht, S. Rass, S. Fuchs, K Kyamakya, Simone Fuchs, Kyandoghere Kyamakya, Stefan Rass, Bernhard Lamprecht: Fusion of an Uncalibrated Camera with Velocity Information for Distance Measurement from a Moving Camera on Highways. Proceeding of the 5th workshop on positioning, navigation and communication 2008 (WPNC´08), IEEE, Piscataway (NJ), 2008, S. 165 - 172.

  • S. Rass, Sfaxi M. Ali, S. Ghernaouti-Hélie, K. Kyamakya, Kyandoghere Kyamakya, Stefan Rass: Secure Message Relay over Networks with QKD-Links. Proceedings of the Second International Conference on Quantum-, Nano- and Micro-technologies ICQNM 2008, IEEE, Piscataway (NJ), 2008, S. 10 - 15.

  • S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya, Simone Fuchs, Stefan Rass, Bernhard Lamprecht, Kyandoghere Kyamakya: A Model for Ontology-Based Scene Description for Context-Aware Driver Assistance Systems. 1st International Conference on Ambient Media and System, ACM - Quebec City, Quebec City (CA), 2008, S. 1 - 8.

  • P. Schartner, M Schaffer, Martin Schaffer, Peter Schartner: Protecting Privacy in Medical Databases - Efficient Local Generation of System-Wide Unique Health IDs. Proceedings of the International Conference on Health Informatics, INSTICC Press, Setubal, 2008, S. 51 - 58.

  • S. Rass, Stefan Rass: Information-theoretic Security in Practice - Multipath Transmission and Quantum Networks. Südwestdeutscher Verlag für Hochschulschriften, Saarbrücken, 2008,

  • S. Rass, S. Fuchs, K. Kyamakya, Kyandoghere Kyamakya, Stefan Rass, Simone Fuchs: A Game-theoretic Approach to Co-operative Context-aware Driving with Partially Random Behavior. Proceedings of the Third European Conference on Smart Sensing and Context (EuroSSC 2008), , Springer Verlag GmbH, Berlin, Heidelberg, New York, 2008, S. 154 - 167.

  • P. Schartner, Peter Schartner: Kurseinheit ITS5 -- Chipkarten -- Technologie und Anwendungen. Fachhochschule Trier, Trier, 2008,

  • C. Kollmitzer, O. Maurhart, S. Rass, S Schauer, Stefan Schauer, Stefan Rass: Application Framework for High Security Requirements in R&D Environments Based on Quantum Cryptography. Proceedings of the Third Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), IEEE, Piscataway (NJ), 2008,

  • 2007
  • P. Horster, P Schartner, Patrick Horster, Peter Schartner: 4. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2007,

  • P. Horster, P Schartner, Patrick Horster, Peter Schartner: Szenarien, die die Welt verändern. Information und Gesellschaft -- Technologien einer sozialen Beziehung, DUV/GWV-Fachverlage GmbH, Wiesbaden, 2007, S. 129 - 157.

  • B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya, Bernhard Lamprecht, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass: Extrinsic Camera Calibration for an On-board Two-Camera System without overlapping Field of View. Proceedings of the 2007 IEEE Intelligent Transportation Systems, IEEE, Piscataway (NJ), 2007, S. 265 - 270.

  • M. Schaffer, S Rass, Stefan Rass, Martin Schaffer: The Fusion Discrete Logarithm Problem Family. syssec (Klagenfurt), Klagenfurt, 2007,

  • S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya, Kyandoghere Kyamakya, Simone Fuchs, Stefan Rass, Bernhard Lamprecht: Context-Awareness and Collaborative Driving for Intelligent Vehicles and Smart Roads. 1st International Workshop on ITS for an Ubiquitous ROADS, IEEE, Piscataway (NJ), 2007, S. 1 - 6.

  • M. Schaffer, P. Schartner, S Rass, Martin Schaffer, Stefan Rass, Peter Schartner: Untraceable Network Devices. syssec (Klagenfurt), Klagenfurt, 2007,

  • M. Schaffer, P Schartner, Peter Schartner, Martin Schaffer: Implementing Collision-Free Number Generators on JavaCards. syssec (Klagenfurt), Klagenfurt, 2007,

  • M. Schaffer, P. Schartner, S Rass, Stefan Rass, Martin Schaffer, Peter Schartner: Universally Unique Identifiers: How to ensure Uniqueness while protecting the Issuer's Privacy. Proceedings of the 2007 International Conference on Security and Management, CSREA Press, Las Vegas (NV), 2007, S. 198 - 204.

  • Horster Patrick, Patrick Horster: DACH Security 2007. syssec (Frechen), Frechen, 2007,

  • P Schartner, Peter Schartner: Privacy in RFID-Systemen. 10 Jahre IRIS: Bilanz und Ausblick -- Tagungsband des 10. Internationalen Rechtisinformatik-Symposions IRIS 2007, Richard Boorberg Verlag, Stuttgart, 2007, S. 289 - 295.

  • M. Schaffer, P. Schartner, S Rass, Martin Schaffer, Stefan Rass, Peter Schartner: Efficient Generation of Unique Numbers for Secure Applications. syssec (Klagenfurt), Klagenfurt, 2007,

  • Kollmann Franz, Schaffer Martin, Schartner Peter, Franz Kollmann, Martin Schaffer, Peter Schartner: Kurseinheit ITS7: Praktikum (2. überarbeitete Auflage). Fachhochschule Trier, Trier, 2007,

  • 2006
  • Horster Patrick, Schartner Peter, Peter Schartner, Patrick Horster: Kurseinheit ITS3: Angewandte Kryptologie. 2006,

  • P. Horster, P. Schartner, Patrick Horster, Peter Schartner: 3. Österreichischer IT-Sicherheitstag. syssec (Klagenfurt), Klagenfurt, 2006,

  • Horster Patrick, Patrick Horster: DACH Mobility 2006. 2006,

  • P. Schartner, M Schaffer, Peter Schartner, Martin Schaffer: Vertrauenswürdige Fotografie & Bildbearbeitung. DACH Mobility 2006, 2006, S. 10 - 10.

  • Rass Stefan, Schaffer Martin, Martin Schaffer, Stefan Rass: Cryptographic Applications of Quadratic Imaginary Fields. syssec (Klagenfurt), Klagenfurt, 2006,

  • Rass Stefan, Stefan Rass: A Method of Authentication for Quantum Networks. International Journal of Information Technology, 2006, S. 7 - 7.

  • Rass Stefan, Schaffer Martin, Schartner Peter, Stefan Rass, Martin Schaffer, Peter Schartner: Shared Generation of System-wide Unique Keys for Discrete-Log Based Cryptosystems. syssec (Klagenfurt), Klagenfurt, 2006,

  • Horster Patrick, Patrick Horster: DACH Security 2006. 2006,

  • Rass Stefan, Stefan Rass: Efficient Key Exchange with tight Bounds on Eavesdropping Success Probability. 2006,

  • M. Schaffer, P Schartner, Martin Schaffer, Peter Schartner: Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. Seventh Smart Card Research and Advanced Application IFIP Conference, 2006, S. 16 - 16.

  • S. Rass, Sfaxi M. Ali, S Ghernaouti-Helie, Stefan Rass: Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, 2006, S. 4 - 4.

  • S. Rass, M. Schaffer, P Schartner, Peter Schartner, Martin Schaffer, Stefan Rass: Anonymes digitales Spielen im Casino. DACH Mobility 2006, 2006, S. 15 - 15.

  • S Rass, Stefan Rass: A Method of Authentication for Quantum Networks. International Conference on Computer Science, 2006, S. 6 - 6.

  • S. Rass, Stefan Rass: A Method of Authentication for Quantum Networks. Proceedings of the International Conference on Computer Science (ICCS 2006), 2006, S. 6 - 6.

  • G. Friedrich, S. Rass, K Shchekotykhin, Kostyantyn Shchekotykhin, Gerhard Friedrich, Stefan Rass: A general method for diagnosing axioms. DX'06 - 17th International Workshop on Principles of Diagnosis, 2006, S. 101 - 108.

  • S. Rass, K. Kyamakya, Kyandoghere Kyamakya, Stefan Rass: Artificial Intelligence Techniques in Traffic Control. Journal der Österreichischen Gesellschaft für Artificial Intelligence, Österreichische Gesellschaft für Artificial Intelligence (ÖGAI), 25, Wien, 2006, S. 7 - 7.

  • 2005
  • Rass Stefan, Stefan Rass: On Information-theoretically Secure Authentication in Quantum Networks. 2005,

  • Schartner Peter, Schaffer Martin, Peter Schartner, Martin Schaffer: Non-interactive local Generation of globally unique Quasi-Random Numbers. syssec (Klagenfurt), Klagenfurt, 2005,

  • Schartner Peter, Horster. Patrick, Patrick Horster, Peter Schartner: 2. Österreichischer IT-Sicherheitstag 2005. 2005,

  • Schaffer Martin, Schartner Peter, Peter Schartner, Martin Schaffer: Key Escrow with Tree-based Access Structure. Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2005), 2005, S. 6 - 6.

  • Schartner Peter, Schaffer Martin, Martin Schaffer, Peter Schartner: Unique User-generated Digital Pseudonyms. Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2005), 2005, S. 10 - 10.

  • Schaffer Martin, Schartner Peter, Peter Schartner, Martin Schaffer: Video Surveillance: A Distributed Approach to protect Privacy. Communications and Multimedia Security, 2005, S. 10 - 10.

  • Rass Stefan, Stefan Rass: How to Send Messages over Quantum Networks in an Unconditionally Secure Manner. 2005,

  • Schaffer Martin, Schartner Peter, Peter Schartner, Martin Schaffer: Hierarchical Key Escrow with Passive Adversaries. syssec (Klagenfurt), Klagenfurt, 2005,

  • E. Hanschitz, J. Leitner, B. Marktl, J. Michael, I. Preiml, P. Horster, P. Schartner, Judith Michael, Patrick Horster, Peter Schartner: go2algo - Das Algorithmen-Visualisierungstool. Informatics in Secondary Schools: Evolution and Perspectives - Innovative Concepts for Teaching Informatics, 2005, S. 10 - 10.

  • F. Kollmann, M. Schaffer, P Schartner, Franz Kollmann, Peter Schartner, Martin Schaffer: Vertrauliche Videoüberwachung mit geeigneter Zugriffsstruktur. DACH Security 2005, 2005, S. 15 - 15.

  • Horster. Patrick, Patrick Horster: DACH Security 2005. 2005,

  • Horster Patrick, Kollmann Franz, Schaffer Martin, Schartner Peter, Patrick Horster, Peter Schartner, Martin Schaffer, Franz Kollmann: Kurseinheit ITS1: Systemsicherheit. 2005,

  • 2004
  • Horster Patrick, Schartner Peter, Patrick Horster, Peter Schartner: 1. Österreichischer IT-Sicherheitstag 2004. 2004,

  • Schartner Peter, Peter Schartner: Kurseinheit IS 5: Chipkarten und Anwendungen. 2004,

  • Horster. Patrick, Patrick Horster: DACH Security 2004. 2004,

  • H. C Mayr, Heinrich C. Mayr, Patrick Horster: Elektronische Geschäftsprozesse: Von der Idee zum Nutzen. Elektronische Geschäftsprozesse, 2004,

  • Kollmann Franz, Schaffer Martin, Schartner Peter, Peter Schartner, Franz Kollmann, Martin Schaffer: Kurseinheit IS7: Praktikum IT-Sicherheit. 2004,

  • P Horster, Patrick Horster: Elektronische Geschäftsprozesse 2004. 2004,

  • 2003
  • F. Kollmann, P Schartner, Peter Schartner, Franz Kollmann: PDA-based Signature Device. BIOSIG 2003, 2003,

  • P Schartner, Peter Schartner: PDAs und Chipkarten - Synergieeffekte. 13. SIT-SmartCardWorkshop. 4./5. Februar 2003 in Darmstadt, 2003, S. 11 - 11.

  • P Horster, Patrick Horster: DACH Security. 2003,

  • F. Kollmann, P Schartner, Peter Schartner, Franz Kollmann: PDA-based Signature Device. BIOSIG 2003: Proceedings of the First Conference on Biometrics and Electronic Signatures of the GI Working Group BIOSIG; 24. July 2003 Darmstadt, 31, 2003,

  • 2002
  • P Horster, Patrick Horster: 1. IT-Sicherheitstag NRW. 2002,

  • P Schartner, Patrick Horster, Peter Schartner: Mobile (Un)Sicherheit. IT Security Europe 2002, 2002, S. 499 - 516.

  • P Schartner, Peter Schartner: Chipkarten - Technologie, Bedrohungen, Anwendungen. eBusiness-Workshop - Managing eSecurity, Klagenfurt, May 23-24, 2002, 2002,

  • S. Janisch, P Schartner, Peter Schartner: Internetbanking. Datenschutz und Datensicherheit – DuD, 2002, S. 162 - 169.

  • P Horster, Patrick Horster: Enterprise Security. Grundlagen - Strategien - Anwendungen - Realisierungen. 2002,

  • P. Horster, P Schartner, Patrick Horster, Peter Schartner: e-Business-Workshop - Managing IT-Security. syssec (Klagenfurt), Klagenfurt, 2002,

  • P. Schartner, Peter Schartner: Die Schlüssel-Schloß-Problematik. 2002,

  • P. Horster, S Teiwes, Patrick Horster: Wirtschaftliche Faktoren zur Einführung von IT-Sicherheitsinfrastrukturen. Enterprise Security, 2002, S. 26 - 36.

  • P Schartner, Peter Schartner: Internetbanking - Technischer Hintergrund. Internetbanking - Von der Euphorie zur Normalität, 92, 2002, S. 220 - 242.

  • P Horster, Patrick Horster: Sichere Geschäftsprozesse. Grundlagen - Konzepte - Anwendungen - Perspektiven. 2002,

  • P. Schartner, P. Horster, Peter Schartner, Patrick Horster: Block Cipher Modes for non-standard Applications. Conference Proceedings "IFIP/SEC 2000: Information Security - Information Security for Global information Infrastructures", Beijing, August 21-25, 2000, 2002,

  • 2001
  • S. Janisch, P Schartner, Peter Schartner: Internetbanking und Drittmissbrauch – Eine technische und rechtliche Analyse. Elektronische Geschäftsprozesse, 2001, S. 361 - 378.

  • P. Horster, M. Schaffer, P. Schartner, D Sommer, Patrick Horster, Martin Schaffer, Peter Schartner: Secure Internet Phone. IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01), 2001, S. 11 - 11.

  • P. Horster, M. Schaffer, P. Schartner, D Sommer, Martin Schaffer, Peter Schartner, Patrick Horster: Sicheres Telefonsystem für das Internet - Entwurf und Implementierung. Kommunikationssicherheit im Zeichen des Internet, 2001, S. 24 - 24.

  • P Horster, Patrick Horster: IT Security Europe 2001. 2001,

  • P Horster, Patrick Horster: AES – Verschlüsselung ohne Hintertür. IT Security - Sicherheit im Unternehmen, 2001, S. 10 - 19.

  • P Horster, Patrick Horster: AES - Advanced Encryption Standard. IT-Security Europe 2001, 2001, S. 497 - 512.

  • P Horster, Patrick Horster: Elektronische Geschäftsprozesse. 2001,

  • P. Horster, P. Kraaibeek, Patrick Horster: Proceedings Workshop eSecurity – Managing Security Technologies. 2001,

  • P. Horster, S Teiwes, Patrick Horster: Vertrauensbildung im elektronischen B2B-Commerce. Kommunikationssicherheit im Zeichen des Internet, 2001, S. 294 - 306.

  • P. Horster, S Teiwes, Patrick Horster: Strategische Bedeutung von Public-Key-Infrastrukturen im eCommerce. Elektronische Geschäftsprozesse, 2001, S. 446 - 458.

  • P Horster, Patrick Horster: Kommunikationssicherheit im Zeichen des Internet. 2001,

  • P Horster, Patrick Horster: Kryptologie. Informatik für Ingenieure, 2001, S. 377 - 416.

  • 2000
  • P. Horster, S Teiwes, Patrick Horster: Migration und Evolution von PKI in Unternehmen, Teil 2: Umrüstung und Migration von PKI - Von der Raupe zum Schmetterling. IT Security, 2000, S. 26 - 29.

  • P. Horster, S Teiwes, Patrick Horster: Migration und Evolution von PKI in Unternehmen, Teil 1: Vom PKI-Einzelsystem zum hierarchischen PKI-Bau. IT Security, 2000, S. 14 - 18.

  • P. Horster, S Teiwes, Patrick Horster: Aufbau, Migration und Management von Public-Key-Infrastrukturen. IT Security Europe 2000, 2000, S. 12 - 12.

  • P. Schartner, P Horster, Peter Schartner, Patrick Horster: Authentifikation in schwach vernetzen Systemen. Systemsicherheit - Grundlagen, Konzepte, Realisierungen, Anwendungen, 2000, S. 151 - 166.

  • P Horster, Patrick Horster: Systemsicherheit. 2000,

  • P Horster, Patrick Horster: Kryptologie. Informatik für Ingenieure, 2000, S. 377 - 416.

  • Horster Patrick, Kraaibeek Peter, Patrick Horster: Grundlegende Aspekte der Systemsicherheit. 2000, S. 15 - 15.

  • P. Schartner, P Horster, Peter Schartner, Patrick Horster: Block Cipher Modes for non-standard Applications. Conference Proceedings "IFIP/SEC 2000: Information Security - Information Security for Global information Infrastructures", August 21-25, Beijing, 2000,

  • 1999
  • Horster Patrick, Patrick Horster: Von der Schwierigkeit, sichere Kryptosysteme zu entwerfen. Angewandte Mathematik, insbesondere Mathematik, 1999,

  • P. Horster, P Schartner, Patrick Horster, Peter Schartner: Bemerkungen zur Erzeugung dublettenfreier Primzahlen. Sicherheistinfrastrukturen - Grundlagen, Realisierungen, Rechtliche Aspekte, Anwendungen, 1999, S. 358 - 368.

  • Horster Patrick, Teiweis S., Patrick Horster: Public-Key-Infrastrukturen in Unternehmen und Organisationen. IsSec 99 - Sicherheitsinfrastrukturen in der Informationstechnik, 1999, S. 10 - 10.

  • Fox D., Horster P., Patrick Horster: Realisierung von Public-Key-Infrastrukturen. 1999,

  • Horster P., Fox D., Patrick Horster: Datenschutz und Datensicherheit. 1999,

  • Horster P., Patrick Horster: Sicherheitsinfrastrukturen. 1999,

  • Horster P., Kraaibeek P., Wohlmacher P., Patrick Horster, Petra Wohlmacher: Sicherheitsinfrastrukturen - Basiskonzepte. ?, 1999, S. 16 - 16.

  • 1998
  • Horster P., Patrick Horster: Basismechanismen der Kryptologie, 4. Kurseinheit der Lehreinheit Informationssicherheit-, Systemsicherheit und Datenschutz. 1998,

  • P. Horster, P. Schartner, P Wohlmacher, Peter Schartner, Patrick Horster, Petra Wohlmacher: Special Aspects of Key Generation. Information Technology: Science-Technique-Technology-Educational-Health, 1998, S. 345 - 350.

  • Horster Patrick, Patrick Horster: Lehreinheit IT-Sicherheit. 1998,

  • Horster P., Wohlmacher P., Petra Wohlmacher, Patrick Horster: Grundüberlegungen zur Gestaltung von Sicherheitsinfrastrukturen. 1998,

  • P. Horster, P. Schartner, P Wohlmacher, Petra Wohlmacher, Patrick Horster, Peter Schartner: Key-Management. Global IT Security - Proceedings of the XV. IFIP World Computer Congress, 116, 1998,

  • Dittmann J., Horster P., Steinmetz R., Wohlmacher P., Petra Wohlmacher, Patrick Horster: Workshop of Multimedia and Security. 1998,

-> Note that the publication lists in the University Research Information System (CRIS) might be incomplete. More information can be found on the personal homepages of the team members.

All Publications of the Department of Artificial Intelligence and Cybersecurity (AICS) can also be found in the University Research Information System (CRIS).

  • Department of Artificial Intelligence and Cybersecurity
    • News
      • News in German (extern, new Tab)
    • Team
    • Research Groups
      • Information Systems
        • Team
          • Dietmar Jannach
        • Publications
        • Projects
        • Teaching
      • Intelligent Systems and Business Informatics
        • Team
        • Publications
        • Projects
        • Teaching
      • Production Systems
        • Team
        • Publications
        • Projects
        • Teaching
      • Semantic Systems
        • Team
        • Publications
        • Projects
        • Teaching
      • System Security
        • Team
        • Publications
        • Projects
        • Teaching (extern)
        • Events (extern, German)
      • Cybersecurity
    • Research
      • Publications
      • Projects (extern CRIS)
    • Teaching
      • Studying Technical Sciences
      • Templates
    • Administrative Functions at AICS
    • Contact

Quicklinks

  • Webmail
  • University bulletin
  • Library
  • Bulletin Board
  • Staff Search
  • Campus Map
  • IT Services
  • USI
  • OEH Klagenfurt
  • Index A-Z

Portals

  • Campus-­System
  • Employees-­Portal
  • Moodle
  • Facebook
  • Twitter
  • Youtube
  • Instagram
Siegel der Alpen-Adria-Universität Klagenfurt

Information for

  • Pupils
  • Alumni & Career
  • Prospective Students
  • Continuing Education
  • Researchers
  • Students
  • Staff
  • Partners & Sponsors
  • International

Address

Alpen-Adria-Universität Klagenfurt
Universitätsstraße 65-67
9020 Klagenfurt am Wörthersee
Austria

+43 463 2700
uni [at] aau [dot] at
www.aau.at
Campus Plan
Gütesiegel evalag Gütesiegel Betriebliche Gesundheitsförderung EMAS Siegel Prix Versailles Gütezeichen hochschuleundfamilie Logo KWF-Förderemblem
© University of Klagenfurt
  • Legal notice
  • Disclaimer
  • Privacy policy
  • Accessibility
  • Webredaktion
Scroll to top