Publications

2017
S. Rass, S. König, S. Schauer: Defending Against Advanced Persistent Threats Using Game-Theory. PLoS ONE 12 (1), e0168675. DOI: 10.1371/journal.pone.0168675
2016
S. König, S. Rass, S. Schauer, A. Beck: Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Computer Science and Applications (IJACSA), SAI, vol. 7, issue 1, January 2016
S. Rass, P. Schartner: Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing. in: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, 2016 (in press)
S. Rass, R. Wigoutschnigg: Arguable Anonymity from Key-Privacy: The Deterministic Crowds Protocol. in Proc. of IEEE/IFIP Network Operations and Management Symposium (in press)
P. Schartner, S. Rass: Kurseinheit ITS4: Sicherheitsinfrastrukturen. Fernstudium Informatik – Lehreinheit Informationssicherheit, 2. aktualisierte und ergänzte Auflage, Fachhochschule Trier (129 pages).
S. Rass, P. Schartner: On the Security of a Universal Cryptocomputer – The Chosen Instruction Attack. IEEE Access PP(99):1-1, October 2016, DOI: 10.1109/ACCESS.2016.2622724, online: http://ieeexplore.ieee.org/document/7725560/
A. Beck, S. Rass: Using Neural Networks to Aid CVSS Risk Aggregation – An empirically Validated Approach. In: Journal of Innovation in Digital Ecosystems 3 (2), 2016, pp. 148–154. DOI: 10.1016/j.jides.2016.10.002. (preliminary version appeared in the Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference (FLAIRS), Association for the Advancement of Artificial Intelligence (AAAI), 2016, pp.294-297).
M. Wamser, S. Rass, P. Schartner: Oblivious Lookup-Tables. in Tatra Mountains Journal, vol. 61, 2016 (in press) (preliminary version online at arXiv:1505.00605 [cs.CR])
S. Schauer, S. König, S. Rass, M. Latzenhofer: Spieltheoretische Risikominimierung in IKT-Infrastrukturen. P. Schartner (ed.) DACH Security 2016, pp. 174-187
B. Dieber, S. Kacianka, S. Rass, P. Schartner: Sicherheit für ROS-basierte Applikationen auf Anwendungsebene. P. Schartner (ed.) DACH Security 2016, pp. 363-370
B. Dieber, S. Kacianka, S. Rass, P. Schartner: Application-level Security for ROS-based Applications. Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2016), Korea
S. König, S. Schauer, S. Rass: A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. B.B. Brumley and J. Röning (Eds.): NordSec 2016, LNCS 10014, pp. 67–81, 2016, DOI: 10.1007/978-3-319-47560-8_5
J. Busby, A. Gouglidis, S. Rass, S. König: Modelling Security Risk in Critical Utilities: The System at Risk as a Three Player Game and Agent Society. Proceedings of SMC 2016. IEEE 6 p.
S. Rass, Q. Zhu: GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies against Advanced Persistent Threats. GameSec 2016, Springer LNCS 9996, pp.314-326, 2016, DOI: 10.1007/978-3-319-47413-7_18
S. Schauer, S. König, S. Rass, A. Gouglidis, A. Alshawish, H. de Meer: Risk Minimization in Physical Surveillance: Playing an Uncertain Cops-and-Robbers Game (Abstract). in GameSec 2016, p.471, 10.1007/978-3-319-47413-7_18.
S. Rass, P. Schartner: System Enabling Licensed Processing of Encrypted Information. European patent application EP14189234.9, submission number 3064571, filed on the 16th of October 2014, published 20.04.2016
S. Rass: On the Existence of Weak One-Way Functions. https://arxiv.org/abs/1609.01575
H. Seuschek, S. Rass: Side-channel leakage models for RISC instruction set architectures from empirical data. In: Microprocessors and Microsystems 47, pp. 74–81. DOI: 10.1016/j.micpro.2016.01.004.
S. Rass, S. König, S. Schauer: Decisions with Uncertain Consequences-A Total Ordering on Loss-Distributions. PLoS ONE 11 (12), e0168583. 2017, DOI: 10.1371/journal.pone.0168583
2015
S. Rass, B. Rainer, M. Vavti, J. Göllner, A. Peer, S. Schauer: Secure Communication over Software-Defined Networks. in Springer Journal of Mobile Networks and Applications, vol. 20, 2015, pp. 105-110, DOI 10.1007/s11036-015-0582-7 [online first] http://link.springer.com/article/10.1007/s11036-015-0582-7 preliminary version appeared in the Proceedings of the International Conference on Software-Defined and Virtualized Future Wireless Networks, European Alliance for Innovation (EAI), 2014
A. Abl, S. Rass, P. Schartner, P. Horster: A method for detecting a speed violation of a vehicle. European patent specification EP 2 648 170 B1, Application number: 12455003.9. (US patent pending)
S. Rass: On Game-Theoretic Risk Management (Part One) - Towards a Theory of Games with Payoffs that are Probability-Distributions. arXiv:1506.07368 [q-fin.EC]
S. Rass, P. Schartner: Licensed Processing of Encrypted Information. in Proc. of Conference on Communications and Network Security (CNS), poster session, 2015, IEEE Communication Society, pp.703-704
S. Schauer, C. Kollmitzer, O. Maurhart, P. Schartner, S. Rass: Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf. in DACH Security 2015, pp. 256-266.
H. Seuschek, S. Rass: Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data. in Proc. of Euromicro Conference on Digital System Design (DSD 2015), IEEE, pp.423-430
S. Rass, S. König, S. Schauer: Uncertainty in Games: Using Probability-Distributions as Payoffs. in MHR Khouzani et al. (Eds.) GameSec 2015, Springer LNCS 9406, pp. 346-357, DOI: 10.1007/978-3-319-25594-1_20
S. Rass, S. König, S. Schauer: BB84 Quantum Key Distribution with Intrinsic Authentication. in Proc. of Ninth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2015), IARIA, ISBN 978-1-61208-431-2, pp. 41-44
S. König, S. Rass: Stochastic Models for Quantum Device Configuration and Self-Adaptation. International Journal On Advances in Systems and Measurements, volume 8, numbers 1 and 2, 2015, pp. 124-134, ISSN: 1942-261x
S. Rass, P. Schartner, M. Wamser: Oblivious Lookup Tables. contributed talk at the 15th Central European Conference on Cryptology (CECC 2015), arXiv:1505.00605 [cs.CR]
S. Rass: On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs. arXiv:1511.08591 [q-fin.EC]
S. Rass, P. Schartner, M. Brodbeck: Private function evaluation by local two-party computation. EURASIP Journal on Information Security, vol. 7, SpringerOpen, 2015, DOI 10.1186/s13635-015-0025-9, 11p
2014
S. Rass: Complexity of Network Design for Private Communication and the P-vs-NP question. International Journal of Advanced Computer Science and Applications, The Science and Information Organization (SAI), Vol. 5, No. 2, 2014, pp. 148-157. [online] http://thesai.org/Downloads/Volume5No2/Paper_22-Complexity_of_Network_Design_for_Private.pdf
S. Rass, P. Schartner: Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud. in: Sicherheit 2014 - 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), GI Lecture Notes in Informatics, pp. 187-200.
S. Rass, P. Schartner, P. Horster, A. Abl: Privacy-Preserving Speed-Limit Enforcement. in International Journal of Traffic and Logistics Engineering, Vol. 2, No. 1, Engineering and Technology Publishing, ISSN 2301-3680, March 2014, pp. 26-33.
S. Rass, S. Schauer, J. Göllner, A. Peer: Security Strategies towards Mutually Dependent Goals (extended abstract). in J. Wilby, S. Blachfellner, W. Hofkirchner (eds.): European Meetings on Cybernetics and Systems Research (EMCSR) - Book of Abstracts, Bertalanffy Center for the Study of Systems Science, 2014, pp. 630-634, online: http://emcsr.net/book-of-abstracts/
S. Schauer, J. Göllner, A. Peer, S. Rass: Entwicklung einer Test-Umgebung für Risiko-Assessmenttools. in P. Schartner, P. Lipp (eds.): DACH Security 2014, syssec, pp. 157-169.
S. Rass, J. Winkler: Computer Aided Teaching of Elliptic Curve Cryptography. Computer Aided Teaching of Elliptic Curve Cryptography, Proceedings of the 17th International Conference on Interactive Collaborative Learning, ICL2014, ISBN 978-1-4799-4438-5, pp. 180-175.
S. Rass, B. Rainer: Numerical Computation of Multi-Goal Security Strategies. in R. Poovendran, W. Saad (eds.): Proceedings of the 5th International Conference on Decision and Game Theory for Security (GameSec) 2014, Springer LNCS 8840, pp. 118-133
F. de Santis, S. Rass: Efficient Leakage-Resilient Pseudorandom Functions from Hard-to-Invert Leakages. in Proc. of LatinCrypt 2014, Springer
S. König, S. Rass: Self-Adaption of Quantum Key Distribution Devices to Changing Working Conditions. Proc. of the International Conference on Quanum-, Nanon and Microtechnology (ICQNM), 2014
P. Horster, F. Kollmann, S. Rass, M. Schaffer, P. Schartner: Kurseinheit ITS1: Systemsicherheit. Fernstudium Informatik - Lehreinheit Informationssicherheit (109 pages), Fachhochschule Trier, revised edition, 2014.
D.Fox, P. Schartner, S. Rass: DuD Sonderheft 11/2014 "Hardware Security". (Editorial) Wiesbaden, Gabler Verlag/GWV-Fachverlage GmbH
2013
S. Rass: On Game-Theoretic Network Security Provisioning. Springer Journal of Networks and Systems Management, Volume 21, Issue 1 (2013), Page 47-64, DOI 10.1007/s10922-012-9229-1, online: http://www.springerlink.com/content/858587701273573m/
S. Rass, S. Kurowski: On Bayesian Trust and Risk Forecasting for Compound Systems. in: Proceedings of 7th International Conference on IT Security Incident Management & IT Forensics, 2013, IEEE Computer Society, pp. 69-82, ISBN 9781467363075
S. Rass: Dynamic Proofs of Retrievability from Chameleon-Hashes. in: Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT), ScitePress – Science and Technology Publications, Portugal, 2013, pp. 296-304, ISBN: 978-989-8565-73-0. Available online at http://www.scitepress.org/DigitalLibrary/
S. Rass, B. Rainer, M. Vavti, S. Schauer: A Network Modeling and Analysis Tool for Perfectly Secure Communication. Proceedings of the 27th International Conference on Advanced Information Networking and Applications, IEEE Computer Society, 2013, pp. 267-275, ISBN 978-146-7355-506
S. Rass, S. Schauer, A. Peer, J. Göllner: Sicherheit auf Basis Multikriterieller Spieltheorie. in: P. Schartner, P. Trommler (eds.): DACH Security 2013, pp. 289-301, ISBN 978-3-00-042097-9
R. Wigoutschnigg, P. Schartner, S. Rass: Extended Crowds with adjustable receiver anonymity. Proceedings of the IADIS International Conference on e-Society, International Association for Development of the Information Society, 2013.
S. Rass, B. Rainer, S. Schauer: On the Practical Feasibility of Secure Multipath Communication. International Journal of Advanced Computer Science and Applications, The Science and Information Organization (SAI), Vol. 4, No. 10, pp. 99-108.
S. Rass, D. Slamanig: Cryptography for Security and Privacy in Cloud Computing. Artech House, 2013, 260p, ISBN: 978-1-60807-575-1, online: http://www.artechhouse.com/International/Books/Cryptography-for-Security-and-Privacy-in-Cloud-Com-2086.aspx
S. Rass: Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption. International Journal of Advanced Computer Science and Applications (IJACSA), The Science and Information Organization (SAI), Volume 4, No 11, November 2013, pp. 47-56
P. Horster, S. Rass, P. Schartner: Kurseinheit ITS6: Sicherheitsinfrastrukturen. Fernstudium Informatik - Lehreinheit Informationssicherheit, Fachhochschule Trier (96 pages), 2013.
R. Wigoutschnigg, P. Schartner, S. Rass: Shared Crowds: A Token-Ring Approach to hide the Receiver. in: 8th International Workshop on Frontiers in Availability, Reliability and Security (FARES), IEEE Computer Society, 2013, pp. 383-389.
2012
D. Slamanig, S. Rass: Selectively Traceable Anonymous and Unlinkable Token-Based Transactions. in: Joaquim Filipe and Mohammad S. Obaidat (Hrsg.): e-Business and Telecommunications: International Conference, ICETE 2010, Revised Selected Papers, CCIS vol. 222, pp.289-303, ISBN 978-3-642-25206-8, Springer Berlin Heidelberg, 2012
S. Rass, M. Koza: On Secure Communication over Wireless Sensor Networks. in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), SciTePress, 2012, pp.364-367
S. Rass, R. Wigoutschnigg, P. Schartner: Anonymous Communication by Branch-and-Bound. in Proceedings of the International Conference on Availability, Reliability and Security (ARES), IEEE, 2012, pp.94-102
P. Schartner, S. Rass, M. Schaffer: Quantum Key Management. chapter 10 in: Jaydip Sen (ed.), Applied Cryptography and Network Security, ISBN 978-953-51-0218-2, pp.227-244, IN-TECH 2012.
S. Rass: Security Risk Measuring and Forecasting. chapter 8 in K. Lek and N. Rajapakse (eds.): Cryptography: Protocols, Design and Applications, ISBN 978-1-62100-831-6, Nova Science Publishers, 2012, pp. 213-236.
S. Rass, A. Ortner: Sunset/FFapl - An Integrated Development Environment for Teaching Cryptography. in: Proceedings of the International Conference on Interactive Collaborative Learning (ICL), IEEE Los Alamitos, 2012, ISBN: 978-1-4673-2426-7, 978-1-4673-2427-4
S. Schauer, B. Rainer, S. Rass: IT-Security Risiko Management mit Elementen der Spieltheorie. in P.Schartner, J.Taeger (eds.): Proceedings of DACH Security 2012, syssec, pp.106-117
T. Fenzl, A. Golla, S. Herda, S. Rass, C. Kollmitzer: Können Gesichter ein Passwort sein?. (Abstract) In: M. Kahr, L. Sassmann, M. Feldhammer (Hrsg.): 10. Tagung der Österreichischen Gesellschaft für Psychologie. Tagungsband. Graz: Karl-Franzens-Universität Graz, April 2012, S. 102.
S. Rass, S. König: Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries. in: International Journal On Advances in Systems and Measurements, vol. 5, No. 1 & 2, 2012, IARIA, pp.22-33, online: http://www.iariajournals.org/systems_and_measurements/
D.Fox, S. Rass: DuD Sonderheft 07/2012 "Aktuelle Entwicklungen der IT-Sicherheit". (Editorial) Wiesbaden, Gabler Verlag/GWV-Fachverlage GmbH
2011
S. Rass, R. Wigoutschnigg, P. Schartner: Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2011, Vol. 2, No. 4, pp. 27-41
S. Rass, P. Schartner: A unified framework for the analysis of availability, reliability and security, with applications to quantum networks. IEEE Transactions on Systems, Man, and Cybernetics – Part C: Applications and Reviews, 2011, Volume 41, Issue 1, page 107-119, DOI 10.1109/TSMCC.2010.20506862010
D. Slamanig, S. Rass: On Security and Privacy in Cloud Computing. Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER), p.604-609, SciTePress Publications, 2011.
S. Rass: Towards a Rapid-Alert System for Security Incidents. Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics (IMF), p.122-136, IEEE Computer Society Press, 2011.
S. Rass, F. Al Machot, K. Kyamakya: Fine-Grained Diagnostics of Ontologies with Assurance. chapter 5 in: Efficient Decision Support Systems: Practice and Challenges – From Current to Future / Book 3, p. 79-98, IN-TECH Verlag 2011 (ISBN 978-953-308-63-9).
S. Rass, P. Schartner: The NP-complete face of information-theoretic security. in: Computer Technology and Application, Vol. 2, Nr. 11, p.893-905 (ISSN 1934-7332), David Publishing Company
S. Rass, P. Schartner: Information-Leakage in Hybrid Randomized Protocols. in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), p. 134-143, SciTePress - Science and Technology Publications, 2011
S. Rass, R. Wigoutschnigg, P. Schartner: Crowds Based on Secret-Sharing. in: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, p. 359-364, August 2011
S. Rass, S. König: Indirect Eavesdropping in Quantum Networks. in: Proceedings of the 5th International Conference on Quantum-, Nano and Micro-technologies (ICQNM), XPS (Xpert Publishing Services), p. 83-88, August 2011
R. Wigoutschnigg, P. Schartner, S. Rass: Crowds mit beeinflussbarer Empfängeranonymität. in: P. Schartner, J. Taeger (Hrsg): DACH Security, p.304-313, 2011.
S. Rass: Information-Theoretic Security as an Optimization Problem. in: Journal of Next Generation Information Technology (JNIT), ISSN 2093-5641, Advanced Institute of Convergence IT (ACIT), p. 72-83, 2011.
D. Slamanig, S. Rass: Redigierbare Digitale Signaturen – Theorie und Praxis. Datenschutz und Datensicherheit (DuD), Vol. 35, No. 11, 2011, pp. 757-762, DOI: 10.1007/s11623-011-0181-0.
S. König, S. Rass: On the transmission capacity of quantum networks. in: International Journal of Advanced Computer Science and Applications (IJACSA), Volume 2, Issue 11, pp.9-16, November 2011.
S. Rass: Security Risk Measuring and Forecasting. to appear in: Cryptography: Protocols, Design and Applications, Nova Science Publishers, Inc., 2011
2010
S. Rass, C. Kollmitzer: Adaptive Cascade. In: Applied Quantum Cryptography (Chapter 4), Lecture Notes of Physics 797. Publisher: Springer (Berlin, Heidelberg). pp 49-69, 2010.
S. Rass, P. Schartner: Multipath Authentication without Shared Secrets and With Applications in Quantum Networks. in: Proceedings of the International Conference on Security and Management (SAM), Vol. 1, CSREA Press, pp. 111-115, 2010.
S. Rass: Über Informationstheoretische Sicherheit: Aktuelle Probleme und Lösungen. in: Ausgezeichnete Informatikdissertationen 2009, S. Hölldobler et al. (Hrsg.), Lecture Notes in Informatics, Gesellschaft für Informatik e.V. (GI), 2009, pp. 201-210.
S. Rass: Information-theoretic Security in Practice – Multipath Transmission and Quantum Networks. Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-2016-4
S. Rass, P. Schartner: Quantenkryptographie – Überblick und aktuelle Entwicklungen. in: Datenschutz und Datensicherheit (DuD) 11/2010, pp. 753-757.
M. Schaffer, S. Rass: Fusion Discrete Logarithm Problems. 15 pages, arXiv.org, http://arxiv.org/abs/1001.1802v1 [cs.CR], 2010.
S. Rass, P. Schartner, R. Wigoutschnigg: Security as a Game - Decisions from Incomplete Models. In: Decision Support Systems (Chapter 22). Publisher: (Intech). pp 391-406, 2010.
S. Rass, A. Wiegele, P. Schartner: Building a Quantum Network: How to Optimize Security and Expenses. In: Journal of Network and Systems Management, Volume 18, Number 3, pp. 283-299, Springer, 2010, DOI 10.1007/s10922-010-9162-0, Online: http://www.springerlink.com/content/2683237u4l006077
S. Rass, P. Schartner: Non-Interactive Information Reconciliation for Quantum Key Distribution. In: IEEE. (Hrsg.): Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Perth, Western Australia. Publisher: IEEE Computer Society Press. pp 1054-1060.
S. Rass, D. Schuller, C. Kollmitzer: Entropy of Graphical Passwords: Towards an Information-theoretic Analysis of Face-Recognition Based Authentication. In: Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Lecture Notes of Computer Science 6109, May 2010, p.166-177
D. Slamanig, S. Rass: Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. In: Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Lecture Notes of Computer Science 6109, May 2010, p.201-213
D. Slamanig, S. Rass: Anonymous but Authorized Transactions Supporting Selective Traceability. Proceedings of the 5th International Conference on Security and Cryptography SECRYPT, IEEE Communications Society (ComSoc), Juli 2010, p.132-141
P. Schartner, S. Rass: Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option. Proceedings of ICS 2010 - 2010 Workshop of Information Security, p.131-136, IEEE, ISBN: 978-1-4244-7638-1, Taiwan, 2010.
2009
S. Rass, P. Schartner: Security in Quantum Networks as an Optimization Problem. In: IEEE. (Hrsg.): Proceedings of the International Conference on Availability, Reliability and Security. pp. 493-498.
P. Schartner, S. Rass: How to overcome the ’Trusted Node Model’ in Quantum Cryptography. In: IEEE. (Hrsg.): Proceedings of the 12th IEEE International Conference on Computational Science and Engineering. Los Alamitos, California: pp. 259-262.
S. Rass, C. Kollmitzer: Adaptive Error Correction with Dynamic Initial Block Size in Quantum Cryptographic Key Distribution Protocols. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 90-95.
M. Pivk, C. Kollmitzer, S. Rass: SSL/TLS with Quantum Cryptography. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 96-101.
K. Lessiak, C. Kollmitzer, S. Schauer, J. Pilz, S. Rass: Statistical Analysis of QKD Networks in Real-life Environments. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 109-114.
S. Rass, P. Schartner: Game-Theoretic Security Analysis of Quantum Networks. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 20-25.
S. Rass, P. Schartner, M. Greiler: Quantum Coin-Flipping-Based Authentication. IN: IEEE Communications Society (Hrsg.): 2009 IEEE International Conference on Communications ICC 2009, 1 February, pp 5.
S. Fuchs, S. Rass, K. Kyamakya: Handling Uncertainty in Context-Aware Driver Assistance Systems. IN: A. Inoue (Hrsg.):Proceedings of the 2009 IEEE International Conference on Networking, Sensing and Control, ICNSC´09, Okayama, Japan, 29 March,pp. 446-467.
S. Rass, R. Wigoutschnigg, P. Schartner: Sichere Speicherung von Patientendaten mittels Chipkarten. IN: P. Horster (Hrsg.): DACH Security 2009, 19 May, pp. 185-194.
S. Rass: On a convex optimization problem in system security. Technical Reports, 3. August 2009, pp 7.
2008
S. Rass, S. Fuchs, K. Kyamakya: A Game-theoretic Approach to Co-operative Context-aware Driving with Partially Random Behavior. IN: D. Roggen, C. Lombriser , G. Tröster , G. Kortuem , P. Havinga (Hrsg.): Proceedings of the Third European Conference on Smart Sensing and Context (EuroSSC 2008), pp. 154-167.
C. Kollmitzer, O. Maurhart, S. Rass, S. Schauer: Application Framework for High Security Requirements in R&D Environments Based on Quantum Cryptography. IN: IEEE (Hrsg.): Proceedings of the Third Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008).
M. Schaffer, S. Rass: Secure Collision-Free Distributed Key Generation For Discrete-Logarithm-Based Threshold Cryptosystems. In: G. Dorfer, G. Eigenthaler, H. Kautschitsch, W. More, W. B. Müller, Contributions to General Algebra 18 - Proceedings of the Klagenfurt Workshop 2007 on General Algebra Verlag Heyn GmbH & Co KG, Klagenfurt, 2008.
S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya: A Model for Ontology-Based Scene Description for Context-Aware Driver Assistance Systems.. In: ICST. (Hrsg.): 1st International Conference on Ambient Media and System. Quebec City (CA): ACM, 11. Februar 2008, pp. 1-8.
S. Rass, M. Ali Sfaxi, S. Ghernaouti-Hélie, K. Kyamakya: Secure Message Relay over Networks with QKD-Links.. In: IEEE. (Hrsg.): Proceedings of the Second International Conference on Quantum-, Nano and Micro-technologies ICQNM 2008. Los Alamitos (CA): IEEE, 15. Februar 2008, pp. 10-15.
B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya: Fusion of an Uncalibrated Camera with Velocity Information for Distance Measurement from a Moving Camera on Highways.. In: T. Kaiser, K. Jobmann, K. Kyamakya. (Hrsg.): Proceeding of the 5th workshop on positioning, navigation and communication 2008 (WPNC´08). Piscataway (NJ): IEEE, 27. März 2008, pp. 165-172.
S. Fuchs, S. Rass, K. Kyamakya: Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems.. In: R. Rouvoy, M. Caporuscio, M. Wagner.(Hrsg.): Proceedings 1st International Workshop on Context-aware Adaptation Mechanisms for Pervasive and Ubiquitous Services (CAMPUS'08). Oslo: University of Oslo, 3. Juni 2008 (Technical Report No. 374), pp. 5-16.
S. Fuchs, S. Rass, K. Kyamakya: A Constraint-Based and Context-Aware Overtaking Assistant with Fuzzy-Probabilistic Risk Classification.. In: J. Roth. (Hrsg.): Proceedings IADIS International Conference Wireless Applications and Computing 2008. Lisbon: International Association for Development of the Information Society (IADIS), 24. Juli 2008, pp. 93-100.
S. Fuchs, S. Rass, K. Kyamakya: A context-aware overtaking assistance system with fuzzy-probabilistic risk classification.. In: Lakeside Science and Technology Park. (Hrsg.): Proceedings of the Lakeside Conference in Safety in Mobility 2008. Klagenfurt: Lakeside Science & Technology Park GmbH , 10.Juli 2008, on CD.
S. Fuchs, S. Rass, K. Kyamakya: Constraint-based Context-Rule Representation and Risk Classification for Driver Assistance Systems.. In: Meier R., Ekici E. (Hrsg.): Proceedings First Annual International Symposium on Vehicular Computing Systems. Brussels: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), 22. Juli 2008, on CD.
S. Rass, S. Fuchs, K. Kyamakya: Towards a Game-Theoretic Model of Co-Operative Context-Aware Driving under Random Influences.. In: IEEE. (Hrsg.): Proceedings of the International Conference on Vehicular Electronics and Safety (ICVES) 2008. Columbus (OH): IEEE, 18. Juli 2008, pp. 22-26.
S. Rass, S. Fuchs, M. Schaffer, K. Kyamakya: How to Protect Privacy in Floating Car Data Systems.. In: ACM. (Hrsg.): Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET) 2008-10-07. San Francisco (CA): ACM, 18. Juli 2008, 17-22.
2007
M. Schaffer, P. Schartner, S. Rass: Efficient Generation of Unique Numbers for Secure Applications. Technical Report TR-syssec-07-01, University of Klagenfurt (Austria), January 2007.
M. Schaffer, P. Schartner, S. Rass: Universally Unique Identifiers: How to ensure Uniqueness while protecting the Issuer's Privacy.. In: H. R. Arabnia. (Hrsg.): Proceedings of the 2007 International Conference on Security and Management. Las Vegas (NV): CSREA Press, Juni 2007, pp.198-204.
S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya: Context-Awareness and Collaborative Driving for Intelligent Vehicles and Smart Roads.. In: S. H. Chaudry. (Hrsg.): 1st International Workshop on ITS for an Ubiquitous ROADS. Piscataway (NJ): IEEE, 6. Juli 2007, pp. 1-6, CD.
M. Schaffer, P. Schartner, S. Rass: Untraceable Network Devices.. Klagenfurt: syssec, Juli 2007 (Technical Reports, TR-syssec-06-04), 9 pp.
M. Schaffer, S. Rass: The Fusion Discrete Logarithm Problem Family. Technical Report TR-syssec-07-03, University of Klagenfurt (Austria), August 2007.
B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya: Extrinsic Camera Calibration for an On-board Two- Camera System without overlapping Field of View.. In: D. J. Dailey. (Hrsg.): Proceedings of the 2007 IEEE Intelligent Transportation Systems. Los Alamitos (CA): IEEE, 3. Oktober 2007, pp. 265-270.
2006
S. Rass: Efficient Key Exchange with tight Bounds on Eavesdropping Success Probability. Report TR-syssec-06-01, University of Klagenfurt, Austria, January 2006.
G. Friedrich, S. Rass, K. Shchekotykhin: A general method for diagnosing axioms.. In: C.A. Gonzalez, T. Escobet, B. Pulido. (Hrsg.): DX'06 - 17th International Workshop on Principles of Diagnosis. Penaranda de Duero, Burgos, Spain: -, 2006, pp. 101-108.
S. Rass: A Method of Authentication for Quantum Networks.. In: ICCS. (Hrsg.): Proceedings of the International Conference on Computer Science (ICCS 2006). Vienna, Austria: ICCS, 2006, 6 p.
S. Rass, M. Ali Sfaxi, S. Ghernaouti-Hélie: Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.. In: INSTICC Press. (Hrsg.): SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography. Setúbal: INSTICC Press, 2006, 4.
S. Rass, K. Kyamakya: Artificial Intelligence Techniques in Traffic Control.. Journal der Österreichischen Gesellschaft für Artificial Intelligence. In: Journal der Österreichischen Gesellschaft für Artificial Intelligence, Wien: Österreichische Gesellschaft für Artificial Intelligence (ÖGAI), Vol. 25 (2006), No. 3, 7 p.
S. Rass, M. Schaffer, P. Schartner: Shared Generation of System-wide Unique Keys for Discrete-Log Based Cryptosystems.. Klagenfurt: syssec, 10. März 2006 (Technical Reports, TR-syssec-06-02), 22.
S. Rass, M. Schaffer: Cryptographic Applications of Quadratic Imaginary Fields. Technical Report TR-syssec-06-03, University of Klagenfurt (Austria), June 2006.
S. Rass, M. Schaffer, P. Schartner: Anonymes digitales Spielen im Casino. D·A·CH Mobility 2006, p. 313-328, IT-Verlag, 2006.
2005
S. Rass: On Information-theoretically Secure Authentication in Quantum Networks. Technical Report TR-syssec-05-07, University of Klagenfurt, Austria, October 2005.
S. Rass: How to Send Messages over Quantum Networks in an Unconditionally Secure Manner.. University of Klagenfurt, September 2005 (Technical Report, TR-syssec-05-05), 13.
© syssec 2017