Publications

2017
S. Rass, S. König, S. Schauer: Defending Against Advanced Persistent Threats Using Game-Theory. PLoS ONE 12 (1), e0168675. DOI: 10.1371/journal.pone.0168675
M. Mehic, O. Maurhart, S. Rass, D. Komosny, F. Rezac, M. A. Abid: Analysis of the Public Channel of Quantum Key Distribution Link. IEEE Journal of Quantum Electronics (in press)
M. Mehic, O. Maurhart, S. Rass, M. A. Abid: Implementation of Quantum Key Distribution Network Simulation Module in the Network Simulator NS-3. Springer Quantum Inf Process (2017) 16: 253. https://doi.org/10.1007/s11128-017-1702-z
S. Rass, A. Alshawish, M.A. Abid, S. Schauer, Q. Zhu, H. de Meer: Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory. In: IEEE Access, S. 1. DOI: 10.1109/ACCESS.2017.2693425 (2017).
J. Wachter, T. Grafenauer, S. Rass: Visual Risk Specification and Aggregation. Proc. of SECURWARE 2017 (in press)
S. König, S. Rass: Stochastic Dependencies Between Critical Infrastructures. Proc. of SECURWARE (in press)
S. Rass, S. König, S. Schauer: On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. Proceedings of the 8th International Conference on Decision and Game Theory for Security (GameSec 2017), Springer LNCS 10575 (in press)
S. Rass, J. Wachter, S. Schauer, S. König: Subjektive Risikobewertung - Über Datenerhebung und Opinion Pooling. DACH Security 2017, syssec (2017) pp. 225-237.
A. Alshawish, M.A. Abid, S. Rass, H. de Meer: Playing a Multi-objective Spot-checking Game in Public Transportation Systems. in: 4th Workshop on Security in highly connected IT systems (SHICS), June 19-22, 2017, Neuchâtel, Switzerland (Satellite workshop of DisCoTec 2017).
S. Rass: Towards a Physical Oracle for the Partition Problem using Analogue Computing. arXiv:1705.01826v1 [cs.CC] 4 May 2017
2016
S. König, S. Rass, S. Schauer, A. Beck: Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Computer Science and Applications (IJACSA), SAI, vol. 7, issue 1, January 2016
S. Rass, P. Schartner: Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing. in: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, 2016 (in press)
S. Rass, R. Wigoutschnigg: Arguable Anonymity from Key-Privacy: The Deterministic Crowds Protocol. in Proc. of IEEE/IFIP Network Operations and Management Symposium (in press)
P. Schartner, S. Rass: Kurseinheit ITS4: Sicherheitsinfrastrukturen. Fernstudium Informatik – Lehreinheit Informationssicherheit, 2. aktualisierte und ergänzte Auflage, Fachhochschule Trier (129 pages).
S. Rass, P. Schartner: On the Security of a Universal Cryptocomputer – The Chosen Instruction Attack. IEEE Access PP(99):1-1, October 2016, DOI: 10.1109/ACCESS.2016.2622724, online: http://ieeexplore.ieee.org/document/7725560/
A. Beck, S. Rass: Using Neural Networks to Aid CVSS Risk Aggregation – An empirically Validated Approach. In: Journal of Innovation in Digital Ecosystems 3 (2), 2016, pp. 148–154. DOI: 10.1016/j.jides.2016.10.002. (preliminary version appeared in the Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference (FLAIRS), Association for the Advancement of Artificial Intelligence (AAAI), 2016, pp.294-297).
M. Wamser, S. Rass, P. Schartner: Oblivious Lookup-Tables. in Tatra Mountains Journal, vol. 61, 2016 (in press) (preliminary version online at arXiv:1505.00605 [cs.CR])
S. Schauer, S. König, S. Rass, M. Latzenhofer: Spieltheoretische Risikominimierung in IKT-Infrastrukturen. P. Schartner (ed.) DACH Security 2016, pp. 174-187
B. Dieber, S. Kacianka, S. Rass, P. Schartner: Sicherheit für ROS-basierte Applikationen auf Anwendungsebene. P. Schartner (ed.) DACH Security 2016, pp. 363-370
B. Dieber, S. Kacianka, S. Rass, P. Schartner: Application-level Security for ROS-based Applications. Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2016), Korea
S. König, S. Schauer, S. Rass: A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. B.B. Brumley and J. Röning (Eds.): NordSec 2016, LNCS 10014, pp. 67–81, 2016, DOI: 10.1007/978-3-319-47560-8_5
J. Busby, A. Gouglidis, S. Rass, S. König: Modelling Security Risk in Critical Utilities: The System at Risk as a Three Player Game and Agent Society. Proceedings of SMC 2016. IEEE 6 p.
S. Rass, Q. Zhu: GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies against Advanced Persistent Threats. GameSec 2016, Springer LNCS 9996, pp.314-326, 2016, DOI: 10.1007/978-3-319-47413-7_18
S. Schauer, S. König, S. Rass, A. Gouglidis, A. Alshawish, H. de Meer: Risk Minimization in Physical Surveillance: Playing an Uncertain Cops-and-Robbers Game (Abstract). in GameSec 2016, p.471, 10.1007/978-3-319-47413-7_18.
S. Rass, P. Schartner: System Enabling Licensed Processing of Encrypted Information. European patent application EP14189234.9, submission number 3064571, filed on the 16th of October 2014, published 20.04.2016
S. Rass: On the Existence of Weak One-Way Functions. https://arxiv.org/abs/1609.01575
H. Seuschek, S. Rass: Side-channel leakage models for RISC instruction set architectures from empirical data. In: Microprocessors and Microsystems 47, pp. 74–81. DOI: 10.1016/j.micpro.2016.01.004.
S. Rass, S. König, S. Schauer: Decisions with Uncertain Consequences-A Total Ordering on Loss-Distributions. PLoS ONE 11 (12), e0168583. 2017, DOI: 10.1371/journal.pone.0168583
2015
S. Rass, B. Rainer, M. Vavti, J. Göllner, A. Peer, S. Schauer: Secure Communication over Software-Defined Networks. in Springer Journal of Mobile Networks and Applications, vol. 20, 2015, pp. 105-110, DOI 10.1007/s11036-015-0582-7 [online first] http://link.springer.com/article/10.1007/s11036-015-0582-7 preliminary version appeared in the Proceedings of the International Conference on Software-Defined and Virtualized Future Wireless Networks, European Alliance for Innovation (EAI), 2014
A. Abl, S. Rass, P. Schartner, P. Horster: A method for detecting a speed violation of a vehicle. European patent specification EP 2 648 170 B1, Application number: 12455003.9. (US patent pending)
S. Rass: On Game-Theoretic Risk Management (Part One) - Towards a Theory of Games with Payoffs that are Probability-Distributions. arXiv:1506.07368 [q-fin.EC]
S. Rass, P. Schartner: Licensed Processing of Encrypted Information. in Proc. of Conference on Communications and Network Security (CNS), poster session, 2015, IEEE Communication Society, pp.703-704
S. Schauer, C. Kollmitzer, O. Maurhart, P. Schartner, S. Rass: Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf. in DACH Security 2015, pp. 256-266.
H. Seuschek, S. Rass: Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data. in Proc. of Euromicro Conference on Digital System Design (DSD 2015), IEEE, pp.423-430
S. Rass, S. König, S. Schauer: Uncertainty in Games: Using Probability-Distributions as Payoffs. in MHR Khouzani et al. (Eds.) GameSec 2015, Springer LNCS 9406, pp. 346-357, DOI: 10.1007/978-3-319-25594-1_20
S. Rass, S. König, S. Schauer: BB84 Quantum Key Distribution with Intrinsic Authentication. in Proc. of Ninth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2015), IARIA, ISBN 978-1-61208-431-2, pp. 41-44
S. König, S. Rass: Stochastic Models for Quantum Device Configuration and Self-Adaptation. International Journal On Advances in Systems and Measurements, volume 8, numbers 1 and 2, 2015, pp. 124-134, ISSN: 1942-261x
S. Rass, P. Schartner, M. Wamser: Oblivious Lookup Tables. contributed talk at the 15th Central European Conference on Cryptology (CECC 2015), arXiv:1505.00605 [cs.CR]
S. Rass: On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs. arXiv:1511.08591 [q-fin.EC]
S. Rass, P. Schartner, M. Brodbeck: Private function evaluation by local two-party computation. EURASIP Journal on Information Security, vol. 7, SpringerOpen, 2015, DOI 10.1186/s13635-015-0025-9, 11p
2014
S. Rass: Complexity of Network Design for Private Communication and the P-vs-NP question. International Journal of Advanced Computer Science and Applications, The Science and Information Organization (SAI), Vol. 5, No. 2, 2014, pp. 148-157. [online] http://thesai.org/Downloads/Volume5No2/Paper_22-Complexity_of_Network_Design_for_Private.pdf
S. Rass, P. Schartner: Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud. in: Sicherheit 2014 - 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), GI Lecture Notes in Informatics, pp. 187-200.
S. Rass, P. Schartner, P. Horster, A. Abl: Privacy-Preserving Speed-Limit Enforcement. in International Journal of Traffic and Logistics Engineering, Vol. 2, No. 1, Engineering and Technology Publishing, ISSN 2301-3680, March 2014, pp. 26-33.
S. Rass, S. Schauer, J. Göllner, A. Peer: Security Strategies towards Mutually Dependent Goals (extended abstract). in J. Wilby, S. Blachfellner, W. Hofkirchner (eds.): European Meetings on Cybernetics and Systems Research (EMCSR) - Book of Abstracts, Bertalanffy Center for the Study of Systems Science, 2014, pp. 630-634, online: http://emcsr.net/book-of-abstracts/
S. Schauer, J. Göllner, A. Peer, S. Rass: Entwicklung einer Test-Umgebung für Risiko-Assessmenttools. in P. Schartner, P. Lipp (eds.): DACH Security 2014, syssec, pp. 157-169.
S. Rass, J. Winkler: Computer Aided Teaching of Elliptic Curve Cryptography. Computer Aided Teaching of Elliptic Curve Cryptography, Proceedings of the 17th International Conference on Interactive Collaborative Learning, ICL2014, ISBN 978-1-4799-4438-5, pp. 180-175.
S. Rass, B. Rainer: Numerical Computation of Multi-Goal Security Strategies. in R. Poovendran, W. Saad (eds.): Proceedings of the 5th International Conference on Decision and Game Theory for Security (GameSec) 2014, Springer LNCS 8840, pp. 118-133
F. de Santis, S. Rass: Efficient Leakage-Resilient Pseudorandom Functions from Hard-to-Invert Leakages. in Proc. of LatinCrypt 2014, Springer
S. König, S. Rass: Self-Adaption of Quantum Key Distribution Devices to Changing Working Conditions. Proc. of the International Conference on Quanum-, Nanon and Microtechnology (ICQNM), 2014
P. Horster, F. Kollmann, S. Rass, M. Schaffer, P. Schartner: Kurseinheit ITS1: Systemsicherheit. Fernstudium Informatik - Lehreinheit Informationssicherheit (109 pages), Fachhochschule Trier, revised edition, 2014.
D.Fox, P. Schartner, S. Rass: DuD Sonderheft 11/2014 "Hardware Security". (Editorial) Wiesbaden, Gabler Verlag/GWV-Fachverlage GmbH
2013
S. Rass: On Game-Theoretic Network Security Provisioning. Springer Journal of Networks and Systems Management, Volume 21, Issue 1 (2013), Page 47-64, DOI 10.1007/s10922-012-9229-1, online: http://www.springerlink.com/content/858587701273573m/
S. Rass, S. Kurowski: On Bayesian Trust and Risk Forecasting for Compound Systems. in: Proceedings of 7th International Conference on IT Security Incident Management & IT Forensics, 2013, IEEE Computer Society, pp. 69-82, ISBN 9781467363075
S. Rass: Dynamic Proofs of Retrievability from Chameleon-Hashes. in: Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT), ScitePress – Science and Technology Publications, Portugal, 2013, pp. 296-304, ISBN: 978-989-8565-73-0. Available online at http://www.scitepress.org/DigitalLibrary/
S. Rass, B. Rainer, M. Vavti, S. Schauer: A Network Modeling and Analysis Tool for Perfectly Secure Communication. Proceedings of the 27th International Conference on Advanced Information Networking and Applications, IEEE Computer Society, 2013, pp. 267-275, ISBN 978-146-7355-506
S. Rass, S. Schauer, A. Peer, J. Göllner: Sicherheit auf Basis Multikriterieller Spieltheorie. in: P. Schartner, P. Trommler (eds.): DACH Security 2013, pp. 289-301, ISBN 978-3-00-042097-9
R. Wigoutschnigg, P. Schartner, S. Rass: Extended Crowds with adjustable receiver anonymity. Proceedings of the IADIS International Conference on e-Society, International Association for Development of the Information Society, 2013.
S. Rass, B. Rainer, S. Schauer: On the Practical Feasibility of Secure Multipath Communication. International Journal of Advanced Computer Science and Applications, The Science and Information Organization (SAI), Vol. 4, No. 10, pp. 99-108.
S. Rass, D. Slamanig: Cryptography for Security and Privacy in Cloud Computing. Artech House, 2013, 260p, ISBN: 978-1-60807-575-1, online: http://www.artechhouse.com/International/Books/Cryptography-for-Security-and-Privacy-in-Cloud-Com-2086.aspx
S. Rass: Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption. International Journal of Advanced Computer Science and Applications (IJACSA), The Science and Information Organization (SAI), Volume 4, No 11, November 2013, pp. 47-56
P. Horster, S. Rass, P. Schartner: Kurseinheit ITS6: Sicherheitsinfrastrukturen. Fernstudium Informatik - Lehreinheit Informationssicherheit, Fachhochschule Trier (96 pages), 2013.
R. Wigoutschnigg, P. Schartner, S. Rass: Shared Crowds: A Token-Ring Approach to hide the Receiver. in: 8th International Workshop on Frontiers in Availability, Reliability and Security (FARES), IEEE Computer Society, 2013, pp. 383-389.
2012
D. Slamanig, S. Rass: Selectively Traceable Anonymous and Unlinkable Token-Based Transactions. in: Joaquim Filipe and Mohammad S. Obaidat (Hrsg.): e-Business and Telecommunications: International Conference, ICETE 2010, Revised Selected Papers, CCIS vol. 222, pp.289-303, ISBN 978-3-642-25206-8, Springer Berlin Heidelberg, 2012
S. Rass, M. Koza: On Secure Communication over Wireless Sensor Networks. in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), SciTePress, 2012, pp.364-367
S. Rass, R. Wigoutschnigg, P. Schartner: Anonymous Communication by Branch-and-Bound. in Proceedings of the International Conference on Availability, Reliability and Security (ARES), IEEE, 2012, pp.94-102
P. Schartner, S. Rass, M. Schaffer: Quantum Key Management. chapter 10 in: Jaydip Sen (ed.), Applied Cryptography and Network Security, ISBN 978-953-51-0218-2, pp.227-244, IN-TECH 2012.
S. Rass: Security Risk Measuring and Forecasting. chapter 8 in K. Lek and N. Rajapakse (eds.): Cryptography: Protocols, Design and Applications, ISBN 978-1-62100-831-6, Nova Science Publishers, 2012, pp. 213-236.
S. Rass, A. Ortner: Sunset/FFapl - An Integrated Development Environment for Teaching Cryptography. in: Proceedings of the International Conference on Interactive Collaborative Learning (ICL), IEEE Los Alamitos, 2012, ISBN: 978-1-4673-2426-7, 978-1-4673-2427-4
S. Schauer, B. Rainer, S. Rass: IT-Security Risiko Management mit Elementen der Spieltheorie. in P.Schartner, J.Taeger (eds.): Proceedings of DACH Security 2012, syssec, pp.106-117
T. Fenzl, A. Golla, S. Herda, S. Rass, C. Kollmitzer: Können Gesichter ein Passwort sein?. (Abstract) In: M. Kahr, L. Sassmann, M. Feldhammer (Hrsg.): 10. Tagung der Österreichischen Gesellschaft für Psychologie. Tagungsband. Graz: Karl-Franzens-Universität Graz, April 2012, S. 102.
S. Rass, S. König: Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries. in: International Journal On Advances in Systems and Measurements, vol. 5, No. 1 & 2, 2012, IARIA, pp.22-33, online: http://www.iariajournals.org/systems_and_measurements/
D.Fox, S. Rass: DuD Sonderheft 07/2012 "Aktuelle Entwicklungen der IT-Sicherheit". (Editorial) Wiesbaden, Gabler Verlag/GWV-Fachverlage GmbH
2011
S. Rass, R. Wigoutschnigg, P. Schartner: Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2011, Vol. 2, No. 4, pp. 27-41
S. Rass, P. Schartner: A unified framework for the analysis of availability, reliability and security, with applications to quantum networks. IEEE Transactions on Systems, Man, and Cybernetics – Part C: Applications and Reviews, 2011, Volume 41, Issue 1, page 107-119, DOI 10.1109/TSMCC.2010.20506862010
D. Slamanig, S. Rass: On Security and Privacy in Cloud Computing. Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER), p.604-609, SciTePress Publications, 2011.
S. Rass: Towards a Rapid-Alert System for Security Incidents. Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics (IMF), p.122-136, IEEE Computer Society Press, 2011.
S. Rass, F. Al Machot, K. Kyamakya: Fine-Grained Diagnostics of Ontologies with Assurance. chapter 5 in: Efficient Decision Support Systems: Practice and Challenges – From Current to Future / Book 3, p. 79-98, IN-TECH Verlag 2011 (ISBN 978-953-308-63-9).
S. Rass, P. Schartner: The NP-complete face of information-theoretic security. in: Computer Technology and Application, Vol. 2, Nr. 11, p.893-905 (ISSN 1934-7332), David Publishing Company
S. Rass, P. Schartner: Information-Leakage in Hybrid Randomized Protocols. in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), p. 134-143, SciTePress - Science and Technology Publications, 2011
S. Rass, R. Wigoutschnigg, P. Schartner: Crowds Based on Secret-Sharing. in: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, p. 359-364, August 2011
S. Rass, S. König: Indirect Eavesdropping in Quantum Networks. in: Proceedings of the 5th International Conference on Quantum-, Nano and Micro-technologies (ICQNM), XPS (Xpert Publishing Services), p. 83-88, August 2011
R. Wigoutschnigg, P. Schartner, S. Rass: Crowds mit beeinflussbarer Empfängeranonymität. in: P. Schartner, J. Taeger (Hrsg): DACH Security, p.304-313, 2011.
S. Rass: Information-Theoretic Security as an Optimization Problem. in: Journal of Next Generation Information Technology (JNIT), ISSN 2093-5641, Advanced Institute of Convergence IT (ACIT), p. 72-83, 2011.
D. Slamanig, S. Rass: Redigierbare Digitale Signaturen – Theorie und Praxis. Datenschutz und Datensicherheit (DuD), Vol. 35, No. 11, 2011, pp. 757-762, DOI: 10.1007/s11623-011-0181-0.
S. König, S. Rass: On the transmission capacity of quantum networks. in: International Journal of Advanced Computer Science and Applications (IJACSA), Volume 2, Issue 11, pp.9-16, November 2011.
S. Rass: Security Risk Measuring and Forecasting. to appear in: Cryptography: Protocols, Design and Applications, Nova Science Publishers, Inc., 2011
2010
S. Rass, C. Kollmitzer: Adaptive Cascade. In: Applied Quantum Cryptography (Chapter 4), Lecture Notes of Physics 797. Publisher: Springer (Berlin, Heidelberg). pp 49-69, 2010.
S. Rass, P. Schartner: Multipath Authentication without Shared Secrets and With Applications in Quantum Networks. in: Proceedings of the International Conference on Security and Management (SAM), Vol. 1, CSREA Press, pp. 111-115, 2010.
S. Rass: Über Informationstheoretische Sicherheit: Aktuelle Probleme und Lösungen. in: Ausgezeichnete Informatikdissertationen 2009, S. Hölldobler et al. (Hrsg.), Lecture Notes in Informatics, Gesellschaft für Informatik e.V. (GI), 2009, pp. 201-210.
S. Rass: Information-theoretic Security in Practice – Multipath Transmission and Quantum Networks. Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-2016-4
S. Rass, P. Schartner: Quantenkryptographie – Überblick und aktuelle Entwicklungen. in: Datenschutz und Datensicherheit (DuD) 11/2010, pp. 753-757.
M. Schaffer, S. Rass: Fusion Discrete Logarithm Problems. 15 pages, arXiv.org, http://arxiv.org/abs/1001.1802v1 [cs.CR], 2010.
S. Rass, P. Schartner, R. Wigoutschnigg: Security as a Game - Decisions from Incomplete Models. In: Decision Support Systems (Chapter 22). Publisher: (Intech). pp 391-406, 2010.
S. Rass, A. Wiegele, P. Schartner: Building a Quantum Network: How to Optimize Security and Expenses. In: Journal of Network and Systems Management, Volume 18, Number 3, pp. 283-299, Springer, 2010, DOI 10.1007/s10922-010-9162-0, Online: http://www.springerlink.com/content/2683237u4l006077
S. Rass, P. Schartner: Non-Interactive Information Reconciliation for Quantum Key Distribution. In: IEEE. (Hrsg.): Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Perth, Western Australia. Publisher: IEEE Computer Society Press. pp 1054-1060.
S. Rass, D. Schuller, C. Kollmitzer: Entropy of Graphical Passwords: Towards an Information-theoretic Analysis of Face-Recognition Based Authentication. In: Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Lecture Notes of Computer Science 6109, May 2010, p.166-177
D. Slamanig, S. Rass: Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. In: Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Lecture Notes of Computer Science 6109, May 2010, p.201-213
D. Slamanig, S. Rass: Anonymous but Authorized Transactions Supporting Selective Traceability. Proceedings of the 5th International Conference on Security and Cryptography SECRYPT, IEEE Communications Society (ComSoc), Juli 2010, p.132-141
P. Schartner, S. Rass: Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option. Proceedings of ICS 2010 - 2010 Workshop of Information Security, p.131-136, IEEE, ISBN: 978-1-4244-7638-1, Taiwan, 2010.
2009
S. Rass, P. Schartner: Security in Quantum Networks as an Optimization Problem. In: IEEE. (Hrsg.): Proceedings of the International Conference on Availability, Reliability and Security. pp. 493-498.
P. Schartner, S. Rass: How to overcome the ’Trusted Node Model’ in Quantum Cryptography. In: IEEE. (Hrsg.): Proceedings of the 12th IEEE International Conference on Computational Science and Engineering. Los Alamitos, California: pp. 259-262.
S. Rass, C. Kollmitzer: Adaptive Error Correction with Dynamic Initial Block Size in Quantum Cryptographic Key Distribution Protocols. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 90-95.
M. Pivk, C. Kollmitzer, S. Rass: SSL/TLS with Quantum Cryptography. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 96-101.
K. Lessiak, C. Kollmitzer, S. Schauer, J. Pilz, S. Rass: Statistical Analysis of QKD Networks in Real-life Environments. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 109-114.
S. Rass, P. Schartner: Game-Theoretic Security Analysis of Quantum Networks. In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 20-25.
S. Rass, P. Schartner, M. Greiler: Quantum Coin-Flipping-Based Authentication. IN: IEEE Communications Society (Hrsg.): 2009 IEEE International Conference on Communications ICC 2009, 1 February, pp 5.
S. Fuchs, S. Rass, K. Kyamakya: Handling Uncertainty in Context-Aware Driver Assistance Systems. IN: A. Inoue (Hrsg.):Proceedings of the 2009 IEEE International Conference on Networking, Sensing and Control, ICNSC´09, Okayama, Japan, 29 March,pp. 446-467.
S. Rass, R. Wigoutschnigg, P. Schartner: Sichere Speicherung von Patientendaten mittels Chipkarten. IN: P. Horster (Hrsg.): DACH Security 2009, 19 May, pp. 185-194.
S. Rass: On a convex optimization problem in system security. Technical Reports, 3. August 2009, pp 7.
2008
S. Rass, S. Fuchs, K. Kyamakya: A Game-theoretic Approach to Co-operative Context-aware Driving with Partially Random Behavior. IN: D. Roggen, C. Lombriser , G. Tröster , G. Kortuem , P. Havinga (Hrsg.): Proceedings of the Third European Conference on Smart Sensing and Context (EuroSSC 2008), pp. 154-167.
C. Kollmitzer, O. Maurhart, S. Rass, S. Schauer: Application Framework for High Security Requirements in R&D Environments Based on Quantum Cryptography. IN: IEEE (Hrsg.): Proceedings of the Third Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008).
M. Schaffer, S. Rass: Secure Collision-Free Distributed Key Generation For Discrete-Logarithm-Based Threshold Cryptosystems. In: G. Dorfer, G. Eigenthaler, H. Kautschitsch, W. More, W. B. Müller, Contributions to General Algebra 18 - Proceedings of the Klagenfurt Workshop 2007 on General Algebra Verlag Heyn GmbH & Co KG, Klagenfurt, 2008.
S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya: A Model for Ontology-Based Scene Description for Context-Aware Driver Assistance Systems.. In: ICST. (Hrsg.): 1st International Conference on Ambient Media and System. Quebec City (CA): ACM, 11. Februar 2008, pp. 1-8.
S. Rass, M. Ali Sfaxi, S. Ghernaouti-Hélie, K. Kyamakya: Secure Message Relay over Networks with QKD-Links.. In: IEEE. (Hrsg.): Proceedings of the Second International Conference on Quantum-, Nano and Micro-technologies ICQNM 2008. Los Alamitos (CA): IEEE, 15. Februar 2008, pp. 10-15.
B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya: Fusion of an Uncalibrated Camera with Velocity Information for Distance Measurement from a Moving Camera on Highways.. In: T. Kaiser, K. Jobmann, K. Kyamakya. (Hrsg.): Proceeding of the 5th workshop on positioning, navigation and communication 2008 (WPNC´08). Piscataway (NJ): IEEE, 27. März 2008, pp. 165-172.
S. Fuchs, S. Rass, K. Kyamakya: Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems.. In: R. Rouvoy, M. Caporuscio, M. Wagner.(Hrsg.): Proceedings 1st International Workshop on Context-aware Adaptation Mechanisms for Pervasive and Ubiquitous Services (CAMPUS'08). Oslo: University of Oslo, 3. Juni 2008 (Technical Report No. 374), pp. 5-16.
S. Fuchs, S. Rass, K. Kyamakya: A Constraint-Based and Context-Aware Overtaking Assistant with Fuzzy-Probabilistic Risk Classification.. In: J. Roth. (Hrsg.): Proceedings IADIS International Conference Wireless Applications and Computing 2008. Lisbon: International Association for Development of the Information Society (IADIS), 24. Juli 2008, pp. 93-100.
S. Fuchs, S. Rass, K. Kyamakya: A context-aware overtaking assistance system with fuzzy-probabilistic risk classification.. In: Lakeside Science and Technology Park. (Hrsg.): Proceedings of the Lakeside Conference in Safety in Mobility 2008. Klagenfurt: Lakeside Science & Technology Park GmbH , 10.Juli 2008, on CD.
S. Fuchs, S. Rass, K. Kyamakya: Constraint-based Context-Rule Representation and Risk Classification for Driver Assistance Systems.. In: Meier R., Ekici E. (Hrsg.): Proceedings First Annual International Symposium on Vehicular Computing Systems. Brussels: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), 22. Juli 2008, on CD.
S. Rass, S. Fuchs, K. Kyamakya: Towards a Game-Theoretic Model of Co-Operative Context-Aware Driving under Random Influences.. In: IEEE. (Hrsg.): Proceedings of the International Conference on Vehicular Electronics and Safety (ICVES) 2008. Columbus (OH): IEEE, 18. Juli 2008, pp. 22-26.
S. Rass, S. Fuchs, M. Schaffer, K. Kyamakya: How to Protect Privacy in Floating Car Data Systems.. In: ACM. (Hrsg.): Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET) 2008-10-07. San Francisco (CA): ACM, 18. Juli 2008, 17-22.
2007
M. Schaffer, P. Schartner, S. Rass: Efficient Generation of Unique Numbers for Secure Applications. Technical Report TR-syssec-07-01, University of Klagenfurt (Austria), January 2007.
M. Schaffer, P. Schartner, S. Rass: Universally Unique Identifiers: How to ensure Uniqueness while protecting the Issuer's Privacy.. In: H. R. Arabnia. (Hrsg.): Proceedings of the 2007 International Conference on Security and Management. Las Vegas (NV): CSREA Press, Juni 2007, pp.198-204.
S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya: Context-Awareness and Collaborative Driving for Intelligent Vehicles and Smart Roads.. In: S. H. Chaudry. (Hrsg.): 1st International Workshop on ITS for an Ubiquitous ROADS. Piscataway (NJ): IEEE, 6. Juli 2007, pp. 1-6, CD.
M. Schaffer, P. Schartner, S. Rass: Untraceable Network Devices.. Klagenfurt: syssec, Juli 2007 (Technical Reports, TR-syssec-06-04), 9 pp.
M. Schaffer, S. Rass: The Fusion Discrete Logarithm Problem Family. Technical Report TR-syssec-07-03, University of Klagenfurt (Austria), August 2007.
B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya: Extrinsic Camera Calibration for an On-board Two- Camera System without overlapping Field of View.. In: D. J. Dailey. (Hrsg.): Proceedings of the 2007 IEEE Intelligent Transportation Systems. Los Alamitos (CA): IEEE, 3. Oktober 2007, pp. 265-270.
2006
S. Rass: Efficient Key Exchange with tight Bounds on Eavesdropping Success Probability. Report TR-syssec-06-01, University of Klagenfurt, Austria, January 2006.
G. Friedrich, S. Rass, K. Shchekotykhin: A general method for diagnosing axioms.. In: C.A. Gonzalez, T. Escobet, B. Pulido. (Hrsg.): DX'06 - 17th International Workshop on Principles of Diagnosis. Penaranda de Duero, Burgos, Spain: -, 2006, pp. 101-108.
S. Rass: A Method of Authentication for Quantum Networks.. In: ICCS. (Hrsg.): Proceedings of the International Conference on Computer Science (ICCS 2006). Vienna, Austria: ICCS, 2006, 6 p.
S. Rass, M. Ali Sfaxi, S. Ghernaouti-Hélie: Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.. In: INSTICC Press. (Hrsg.): SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography. Setúbal: INSTICC Press, 2006, 4.
S. Rass, K. Kyamakya: Artificial Intelligence Techniques in Traffic Control.. Journal der Österreichischen Gesellschaft für Artificial Intelligence. In: Journal der Österreichischen Gesellschaft für Artificial Intelligence, Wien: Österreichische Gesellschaft für Artificial Intelligence (ÖGAI), Vol. 25 (2006), No. 3, 7 p.
S. Rass, M. Schaffer, P. Schartner: Shared Generation of System-wide Unique Keys for Discrete-Log Based Cryptosystems.. Klagenfurt: syssec, 10. März 2006 (Technical Reports, TR-syssec-06-02), 22.
S. Rass, M. Schaffer: Cryptographic Applications of Quadratic Imaginary Fields. Technical Report TR-syssec-06-03, University of Klagenfurt (Austria), June 2006.
S. Rass, M. Schaffer, P. Schartner: Anonymes digitales Spielen im Casino. D·A·CH Mobility 2006, p. 313-328, IT-Verlag, 2006.
2005
S. Rass: On Information-theoretically Secure Authentication in Quantum Networks. Technical Report TR-syssec-05-07, University of Klagenfurt, Austria, October 2005.
S. Rass: How to Send Messages over Quantum Networks in an Unconditionally Secure Manner.. University of Klagenfurt, September 2005 (Technical Report, TR-syssec-05-05), 13.
© syssec 2017