Publikationen (nach Jahr)

  1. 2018
    Q. Zhu, S. Rass, P. Schartner:
    Community-Based Security for the Internet of Things
    book chapter in 'Smart Cities Cybersecurity and Privacy', Elsevier Press, USA (in press)
    G. Frankl, P. Schartner, D. Jost:
    Guaranteeing high Availability of the Secure Exam Environment (SEE).
    CSEDU 2018, (in Print)
    2017
    G. Frankl, P. Schartner, D. Jost:
    The Secure Exam Environment: E-Testing with Students' Own Devices.
    In: Tatnall A., Webb M. (eds) Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing. WCCE 2017. IFIP Advances in Information and Communication Technology, vol 515. Springer, 2017.
    B. Dieber, B. Breiling, S. Taurer, S. Kazianka, S. Rass, P. Schartner:
    Security for the Robot Operating System
    Journal of Robotics and Autonomous Systems, Vol 98, pp. 192-203, Elsevier, December 2017.
    B. Breiling, B. Dieber, P. Schartner:
    Secure communication for the Robot Operating System.
    2017 Annual IEEE International Systems Conference (SysCon), Montreal, IEEE, pp. 1–6. DOI: 10.1109/SYSCON.2017.7934755
    P. Schartner, A. Baumann:
    Proceedings DACH Security 2017.
    5. und 6. September 2017, Universität der Bundeswehr München, 462 pages.
    P. Schartner:
    14. Österreichischer IT-Sicherheitstag.
    5. Oktober 2017, Messegelände Klagenfurt, 92 pages.
    2016
    S. Rass, P. Schartner:
    Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing.
    in: The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, 2016 (in press)
    P. Schartner, S. Rass:
    Kurseinheit ITS4: Sicherheitsinfrastrukturen.
    Fernstudium Informatik – Lehreinheit Informationssicherheit, 2. aktualisierte und ergänzte Auflage, Fachhochschule Trier (129 pages).
    S. Rass, P. Schartner:
    On the Security of a Universal Cryptocomputer – The Chosen Instruction Attack.
    IEEE Access PP(99):1-1, October 2016, DOI: 10.1109/ACCESS.2016.2622724,
    [Online] http://ieeexplore.ieee.org/document/7725560/
    M. Wamser, S. Rass, P. Schartner:
    Oblivious Lookup-Tables.
    in Tatra Mountains Journal, vol. 61, 2016 (in press) (preliminary version online at arXiv:1505.00605 [cs.CR])
    B. Dieber, S. Kacianka, S. Rass, P. Schartner:
    Sicherheit für ROS-basierte Applikationen auf Anwendungsebene.
    P. Schartner (ed.) DACH Security 2016, pp. 363-370
    B. Dieber, S. Kacianka, S. Rass, P. Schartner:
    Application-level Security for ROS-based Applications.
    Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2016), Korea
    S. Rass, P. Schartner:
    System Enabling Licensed Processing of Encrypted Information.
    European patent application EP14189234.9, submission number 3064571, filed on the 16th of October 2014, published 20.04.2016
    P. Schartner:
    Proceedings DACH Security 2016.
    26. und 27. September 2015, Alpen-Adria-Universität Klagenfurt, 437 pages.
    P. Schartner:
    13. Österreichischer IT-Sicherheitstag.
    FH Salzburg, Puch/Hallein, 19. Oktober 2016, 109 pages.
    2015
    A. Abl, S. Rass, P. Schartner, P. Horster:
    A method for detecting a speed violation of a vehicle.
    European patent specification EP 2 648 170 B1, Application number: 12455003.9. (US patent pending)
    P. Schartner, F. Kollmann, M. Schaffer:
    Kurseinheit ITS7: Praktikum IT-Sicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (3rd revised edition, 63 pages), Fachhochschule Trier, 2015.
    S. Rass, P. Schartner:
    Licensed Processing of Encrypted Information.
    in Proc. of Conference on Communications and Network Security (CNS), poster session, 2015, IEEE Communication Society, pp.703-704
    S. Schauer, C. Kollmitzer, O. Maurhart, P. Schartner, S. Rass:
    Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf.
    in DACH Security 2015, pp. 256-266.
    S. Rass, P. Schartner, M. Wamser:
    Oblivious Lookup Tables.
    contributed talk at the 15th Central European Conference on Cryptology (CECC 2015), arXiv:1505.00605 [cs.CR]
    S. Rass, P. Schartner, M. Brodbeck:
    Private function evaluation by local two-party computation.
    EURASIP Journal on Information Security, vol. 7, SpringerOpen, 2015, DOI 10.1186/s13635-015-0025-9, 11p
    P. Schartner, K. Lemke-Rust, M. Ullmann:
    Proceedings DACH Security 2015.
    8. und 9. September 2015, Hochschule Bonn-Rhein-Sieg, 462 pages.
    P. Schartner:
    12. Österreichischer IT-Sicherheitstag.
    15. Oktober 2015, Messegelände Klagenfurt, 114 pages.
    2014
    S. Rass, P. Schartner:
    Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud.
    in: Sicherheit 2014 - 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), GI Lecture Notes in Informatics, pp. 187-200.
    S. Rass, P. Schartner, P. Horster, A. Abl:
    Privacy-Preserving Speed-Limit Enforcement.
    in International Journal of Traffic and Logistics Engineering, Vol. 2, No. 1, Engineering and Technology Publishing, ISSN 2301-3680, March 2014, pp. 26-33.
    P. Horster, F. Kollmann, S. Rass, M. Schaffer, P. Schartner:
    Kurseinheit ITS1: Systemsicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (109 pages), Fachhochschule Trier, revised edition, 2014.
    D. Fox, P. Schartner, S. Rass:
    DuD Sonderheft 11/2014 "Hardware Security".
    (Editorial) Wiesbaden, Gabler Verlag/GWV-Fachverlage GmbH
    P. Schartner, P. Lipp:
    Proceedings DACH Security 2014.
    16. und 17. September 2014, TU Graz – Campus Inffeldgasse, 334 pages.
    P. Schartner:
    11. Österreichischer IT-Sicherheitstag.
    FH Salzburg, Puch/Hallein, 22. Oktober 2014.
    2013
    R. Wigoutschnigg, P. Schartner, S. Rass:
    Extended Crowds with adjustable receiver anonymity.
    Proceedings of the IADIS International Conference on e-Society, International Association for Development of the Information Society, 2013.
    P. Horster, S. Rass, P. Schartner:
    Kurseinheit ITS6: Sicherheitsinfrastrukturen.
    Fernstudium Informatik - Lehreinheit Informationssicherheit, Fachhochschule Trier (96 pages), 2013.
    R. Wigoutschnigg, P. Schartner, S. Rass:
    Shared Crowds: A Token-Ring Approach to hide the Receiver.
    in: 8th International Workshop on Frontiers in Availability, Reliability and Security (FARES), IEEE Computer Society, 2013, pp. 383-389.
    P. Schartner, P. Trommler:
    Proceedings DACH Security 2013.
    17. und 18. September 2013, Georg-Simon-Ohm-Hochschule Nürnberg, 392 pages.
    D. Posch, H. Hellwagner, P. Schartner:
    On-Demand Video Streaming based on Dynamic Adaptive Encrypted Content Chunks.
    Proceedings of the 8th International Workshop on Secure Network Protocols (NPSec’ 13), IEEE Computer Society Press, Los Alamitos (CA), Oktober 2013.
    P. Schartner, P. Horster:
    10. Österreichischer IT-Sicherheitstag.
    Messe Klagenfurt, 3. Oktober 2013.
    2012
    S. Rass, R. Wigoutschnigg, P. Schartner:
    Anonymous Communication by Branch-and-Bound.
    in Proceedings of the International Conference on Availability, Reliability and Security (ARES), IEEE, 2012, pp.94-102
    P. Schartner, S. Rass, M. Schaffer:
    Quantum Key Management.
    chapter 10 in: Jaydip Sen (ed.), Applied Cryptography and Network Security, ISBN 978-953-51-0218-2, pp.227-244, IN-TECH 2012.
    P. Schartner:
    Unique domain-specific Citizen Identification for E-Government Applications.
    In Proceedings of “The Sixth International Conference on Digital Society – ICDS 2012”, S. 23-28, Valencia, Spain, 30. Jänner - 4. Februar 2012.
    P. Schartner:
    Sicherheitsanalyse des (wirtschafts-)bereichsspezifischen Personenkennzeichens.
    in E. Schweighofer, F. Kummer, W. Hötzendorfer (Hrsg.) “Transformation juristischer Sprachen – Tagungsband des 15. Internationalen Rechtsinformatik Symposions IRIS 2012”, S. 379-384, Universität Salzburg, 23.-25. Februar 2012.
    G. Zebedin, G. Frankl, P. Schartner:
    The "Secure Exam Environment" (SEE) at the Alpen- Adria-Universität Klagenfurt / Austria (AAUK).
    In Proceedings of “2012 IEEE Global Engineering Education Conference (EDUCON)”, Marrakech, Marokko, 17-20 April 2012.
    P. Schartner, J. Taeger:
    Proceedings DACH Security 2012.
    25. und 26. September 2011, HS Konstanz, 491 pages.
    P. Schartner, P. Horster:
    9. Österreichischer IT-Sicherheitstag.
    FH Salzburg, Puch/Hallein, 7. November 2012.
    2011
    S. Rass, R. Wigoutschnigg, P. Schartner:
    Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity.
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2011, Vol. 2, No. 4, pp. 27-41
    S. Rass, P. Schartner:
    A unified framework for the analysis of availability, reliability and security, with applications to quantum networks.
    IEEE Transactions on Systems, Man, and Cybernetics – Part C: Applications and Reviews, 2011, Volume 41, Issue 1, page 107-119, DOI 10.1109/TSMCC.2010.20506862010
    S. Rass, P. Schartner:
    Information-Leakage in Hybrid Randomized Protocols.
    in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), p. 134-143, SciTePress - Science and Technology Publications, 2011
    S. Rass, R. Wigoutschnigg, P. Schartner:
    Crowds Based on Secret-Sharing.
    in: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, p. 359-364, August 2011
    R. Wigoutschnigg, P. Schartner, S. Rass:
    Crowds mit beeinflussbarer Empfängeranonymität.
    in: P. Schartner, J. Taeger (Hrsg): DACH Security, p.304-313, 2011.
    P. Schartner, S. Bürger:
    Attacking mTAN Applications like e-Banking and Mobile Signatures.
    Technical Report TR-syssec-11-01, University of Klagenfurt (Austria), June 2011.

    P. Schartner:
    A low-cost alternative for OAEP.
    Technical Report TR-syssec-11-02, University of Klagenfurt (Austria), June 2011.

    P. Schartner, M. Foisner:
    System-Manipulation using Windows Messaging Hooks.
    Proceedings of the 2011 International Conference on Security and Management (SAM’11), S. 432-435, Las Vegas, USA, 18-21 Juli 2011.
    P. Schartner, J. Taeger:
    Proceedings DACH Security 2011.
    20. und 21. September 2011, IT-Quartier Oldenburg, 594 pages.
    P. Schartner:
    A low-cost alternative for OAEP.
    In Proceedings of "International Workshop on Security and Dependability for Resource Constrained Embedded Systems - SD4RECS 2011", Neapel, 22. Spetember 2011.
    P. Horster, P. Schartner:
    8. Österreichischer IT-Sicherheitstag.
    Messe Klagenfurt, 6. Oktober 2011.
    G. Frankl, P. Schartner, G. Zebedin:
    The "Secure Exam Environment" for Online Testing at the Alpen-Adria-Universitat Klagenfurt / Austria.
    In Proceedings of "E-LEARN 2011 - World Conference on E-Learning in Corporate, Government, Healthcare & Higher Education", Honolulu, Hawaii, 18.-21. October 2011.
    D. Fox, P. Schartner:
    DuD Sonderheft "Kryptologie".
    Heft 11/2011
    2010
    S. Rass, P. Schartner:
    Multipath Authentication without Shared Secrets and With Applications in Quantum Networks.
    in: Proceedings of the International Conference on Security and Management (SAM), Vol. 1, CSREA Press, pp. 111-115, 2010.
    S. Rass, P. Schartner:
    Quantenkryptographie – Überblick und aktuelle Entwicklungen.
    in: Datenschutz und Datensicherheit (DuD) 11/2010, pp. 753-757.
    P. Schartner, C. Kollmitzer:
    Quantum-cryptographic Networks from a Prototype to the Citizen.
    In: Applied Quantum Cryptography (Chapter 9), Lecture Notes of Physics 797. Publisher: Springer (Berlin, Heidelberg). pp. 173-184, 2010.
    S. Rass, P. Schartner, R. Wigoutschnigg:
    Security as a Game - Decisions from Incomplete Models.
    In: Decision Support Systems (Chapter 22). Publisher: (Intech). pp 391-406, 2010.
    S. Rass, A. Wiegele, P. Schartner:
    Building a Quantum Network: How to Optimize Security and Expenses.
    In: Journal of Network and Systems Management, Volume 18, Number 3, pp. 283-299, Springer, 2010, DOI 10.1007/s10922-010-9162-0
    [Online] http://www.springerlink.com/content/2683237u4l006077
    S. Rass, P. Schartner:
    Non-Interactive Information Reconciliation for Quantum Key Distribution.
    In: IEEE. (Hrsg.): Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Perth, Western Australia. Publisher: IEEE Computer Society Press. pp 1054-1060.
    P. Schartner, E. Weippl:
    Proceedings DACH Security 2010.
    21. und 22. September 2010, TU Wien, 418 pages, September 2010.
    H. Schleifer, P. Schartner:
    Schutz der Privatsphäre bei IP-Videoüberwachung.
    DACH Security 2010, S. 390-406, TU Wien, 21.-22. September 2010.
    P. Horster, P. Schartner:
    7. Österreichischer IT-Sicherheitstag.
    Graz, 3. November 2010.
    P. Schartner, S. Rass:
    Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option.
    Proceedings of ICS 2010 - 2010 Workshop of Information Security, p.131-136, IEEE, ISBN: 978-1-4244-7638-1, Taiwan, 2010.
    2009
    S. Rass, P. Schartner:
    Security in Quantum Networks as an Optimization Problem.
    In: IEEE. (Hrsg.): Proceedings of the International Conference on Availability, Reliability and Security. pp. 493-498.
    P. Schartner, S. Rass:
    How to overcome the ’Trusted Node Model’ in Quantum Cryptography.
    In: IEEE. (Hrsg.): Proceedings of the 12th IEEE International Conference on Computational Science and Engineering. Los Alamitos, California: pp. 259-262.
    S. Rass, P. Schartner:
    Game-Theoretic Security Analysis of Quantum Networks.
    In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 20-25.
    S. Rass, P. Schartner, M. Greiler:
    Quantum Coin-Flipping-Based Authentication.
    In: IEEE Communications Society (Hrsg.): 2009 IEEE International Conference on Communications ICC 2009, 1 February, pp 5.
    S. Rass, R. Wigoutschnigg, P. Schartner:
    Sichere Speicherung von Patientendaten mittels Chipkarten.
    In: P. Horster (Hrsg.): DACH Security 2009, 19 May, pp. 185-194.
    P. Horster, P. Schartner:
    Proceedings DACH Security 2009.
    19. und 20. Mai 2009, Ruhr-Universität Bochum, 514 pages, May 2009.
    D. Slamanig, P. Schartner, C. Stingl:
    Practical Traceable Anonymous Identification.
    Proceedings of the International Conference on Security and Cryptography, SECRYPT 2009, pp. 225-232.
    P. Horster, P. Schartner:
    6. Österreichischer IT-Sicherheitstag.
    Klagenfurt, 4. November 2009.
    2008
    R. Wigoutschnigg, P. Schartner:
    Java-basierte Simulation von Smartcards.
    In Proceedings P. Horster (Hrsg.): "D A CH Security 2008", Technische Universität Berlin, 24.-25. Juni 2008.
    M. Schaffer, P. Schartner:
    Über die lokale und verteilte Erzeugung systemweit eindeutiger Zufallszahlen.
    In Proceedings P. Horster (Hrsg.): "D A CH Security 2008", Technische Universität Berlin, 24.-25. Juni 2008
    M. Greiler, P. Schartner:
    Secure Resource Sharing in Ad Hoc Networks.
    In Proceedings of the 2008 International Conference on Security and Management (SAM'07), Las Vegas, USA, June 14-17, 2008.
    P. Schartner:
    Kurseinheit ITS5: Chipkarten und Anwendungen.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (2nd edition, 121 pages), Fachhochschule Trier, 2008.
    P. Schartner, M. Schaffer:
    Protecting Privacy in Medical Databases.
    HEALTHINF 2008 - International Conference on Health Informatics, January 28-31 2008, Funchal, Madeira.
    P. Schartner, M. Schaffer:
    Efficient Privacy-Enhancing Techniques for Medical Databases.
    In A. Fred, J. Filipe, H. Gamboa and J. Cardoso (Edts.): Best papers of Biomedical Engineering Systems and Technologies 2008, Communications in Computer and Information Science (CCIS) Series, Vol. 25, Springer, 2008.
    P. Horster, P. Schartner:
    5. Österreichischer IT-Sicherheitstag.
    Klagenfurt, 5. November 2008.
    2007
    P. Horster, P. Schartner:
    Szenarien, die die Welt verändern.
    Workshop "Gesellschaft & Information", Klagenfurt, 12.-13. Jänner 2007.
    P. Schartner:
    RFID - Security & Privacy.
    "IRIS 2007 - Internationales Rechtsinformatik Symposion", University of Salzburg, February 23, 2007.
    M. Schaffer, P. Schartner, S. Rass:
    Efficient Generation of Unique Numbers for Secure Applications.
    Technical Report TR-syssec-07-01, University of Klagenfurt (Austria), January 2007.
    F. Kollmann, M. Schaffer, P. Schartner:
    Kurseinheit ITS7: Praktikum IT-Sicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (2nd edition, 50 pages), Fachhochschule Trier, 2004.
    D. Hattenberger, P. Horster, P. Schartner:
    Datensammeln – technische Möglichkeiten, rechtliche Grenzen.
    D·A·CH Security 2007, Universität Klagenfurt, 12.-13. Juni 2007.
    M. Schaffer, P. Schartner, S. Rass:
    Universally Unique Identifiers: How to ensure Uniqueness while protecting the Issuer's Privacy.
    In: H. R. Arabnia. (Hrsg.): Proceedings of the 2007 International Conference on Security and Management. Las Vegas (NV): CSREA Press, Juni 2007, pp.198-204.

    M. Schaffer, P. Schartner:
    Implementing Collision-Free Number Generators on JavaCards.
    Technical Report TR-syssec-07-02, University of Klagenfurt (Austria), July 2007.
    M. Schaffer, P. Schartner, S. Rass:
    Untraceable Network Devices.
    Klagenfurt: syssec, Juli 2007 (Technical Reports, TR-syssec-06-04), 9 pp.
    P. Horster, P. Schartner:
    4. Österreichischer IT-Sicherheitstag.
    Klagenfurt, 7. November 2007.
    2006
    P. Horster, P. Schartner:
    Kurseinheit ITS3: Angewandte Kryptologie.
    Fernstudium Informatik - Lehreinheit Informationssicherheit, Fachhochschule Trier (121 pages), 2006.
    S. Rass, M. Schaffer, P. Schartner:
    Shared Generation of System-wide Unique Keys for Discrete-Log Based Cryptosystems.
    Klagenfurt: syssec, 10. März 2006 (Technical Reports, TR-syssec-06-02), 22.
    M. Schaffer, P. Schartner:
    Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability.
    Seventh Smart Card Research and Advanced Application IFIP Conference (CARDIS'06), p.206-221. LNCS 3928, Springer, 2006.

    S. Rass, M. Schaffer, P. Schartner:
    Anonymes digitales Spielen im Casino.
    D·A·CH Mobility 2006, p. 313-328, IT-Verlag, 2006.
    P. Schartner, M. Schaffer:
    Vertrauenswürdige Fotografie & Bildbearbeitung.
    D·A·CH Mobility 2006, p.99-109, IT-Verlag, 2006.
    P. Horster, P. Schartner:
    3. Österreichischer IT-Sicherheitstag.
    Wien, 8. November 2006.
    2005
    P. Horster, F. Kollmann, M. Schaffer, P. Schartner:
    Kurseinheit ITS1: Systemsicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (108 pages), Fachhochschule Trier, 2005.
    P. Schartner, M. Schaffer, F. Kollmann:
    Vertrauliche Videoüberwachung mit geeigneter Zugriffsstruktur.
    D·A·CH Security 2005, p.264-278, IT-Verlag, 2005.
    E. Hanschitz, J. Leitner, B. Marktl, J. Michael, I. Preiml, P. Horster, P. Schartner:
    go2algo - Das Algorithmen-Visualisierungstool.
    in Proceedings "Informatics in Secondary Schools: Evolution and Perspectives - Innovative Concepts for Teaching Informatics", Klagenfurt, March 30 - April 1, 2005.
    P. Schartner:
    Security und Privacy in RFID-Systemen.
    in Computerwelt No. 22, May 27, 2005
    M. Schaffer, P. Schartner:
    Hierarchical Key Escrow with Passive Adversaries.
    Technical Report TR-syssec-05-02, University of Klagenfurt (Austria), June 2005.
    M. Schaffer, P. Schartner:
    Video Surveillance: A Distributed Approach to protect Privacy.
    Communications and Multimedia Security (CMS'05), p.140-149, LNCS 3677, Springer, 2005.

    P. Schartner, M. Schaffer:
    Unique User-generated Digital Pseudonyms.
    Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS'05), p.194-205, LNCS 3685, Springer, 2005.

    M. Schaffer, P. Schartner:
    Key Escrow with Tree-based Access Structure.
    Third International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS'05), p.454-459, LNCS 3685, Springer, 2005.
    P. Horster, P. Schartner:
    2. Österreichischer IT-Sicherheitstag.
    Graz, 9. November 2005.
    P. Schartner, M. Schaffer:
    Non-interactive local Generation of globally unique Quasi-Random Numbers.
    Technical Report TR-syssec-05-06, University of Klagenfurt (Austria), June 2005.
    2004
    F. Kollmann, M. Schaffer, P. Schartner:
    Kurseinheit ITS7: Praktikum IT-Sicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (47 pages), Fachhochschule Trier, 2004.
    P. Schartner:
    Kurseinheit IS5: Chipkarten und Anwendungen.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (106 pages), Fachhochschule Trier, 2004.
    P. Horster, P. Schartner:
    Österreichischer IT-Sicherheitstag.
    Klagenfurt, 22. September 2004.
    2003
    P. Schartner:
    PDAs und Chipkarten - Synergieeffekte.
    (German), SIT SmartCard - Workshop, Darmstadt, February 4-5,2003.
    F. Kollmann, P. Schartner:
    PDA-based Signature Device.
    (German), BIOSIG 2003, Darmstadt, July 24. 2003.
    2002
    P. Schartner:
    Technischer Hintergrund des Internetbanking.
    in Otto Lucius (Edt.): "Internetbanking" (German), BWSR Band 92, pp. 220, 2002.
    S. Janisch, P. Schartner:
    Internetbanking - Sicherheitsaspekte und Haftungsfragen.
    (German), in "Datenschutz und Datensicherheit - DuD", pp. 162, 03/2002
    P. Horster, P. Schartner:
    e-Business-Workshop - Managing IT-Security.
    Klagenfurt, May 2002.
    P. Schartner:
    Chipkarten - Technologie, Bedrohung und Anwendung.
    (German), eBusiness-Workshop - Managing IT-Security, Klagenfurt, May 23-24, 2002.
    P. Schartner:
    Mobile (Un)Sicherheit.
    (German), IT-Security 2002, Munich, June 3-4, 2002.
    2001
    P. Horster, M. Schaffer, D. Sommer, P. Schartner:
    Secure Internet Phone.
    Communications and Multimedia Security (CMS'01), p.313-324, Kluwer Acedemic Publishers, 2001.

    P. Horster, M. Schaffer, P. Schartner, D. Sommer:
    Sicheres Telefonsystem für das Internet - Entwurf und Implementierung.
    Kommunikationssicherheit – Schwerpunkt Internet, p.388-412, IT-Verlag, 2001.
    P. Schartner:
    Token-based Security Infrastructrues - Selected Techniques and Applications.
    Dissertation, University of Klagenfurt System Security Group, May 2001.
    P. Schartner:
    Security Tokens - Basics, Applications, Management and Infrastructures.
    IT-Verlag, 243 pages, September 2001.
    S. Janisch, P. Schartner:
    Internetbanking und Drittmissbrauch - Eine technische und rechtliche Analyse.
    (German), "Electronic Business Processes 2001", Klagenfurt, September 2001
    2000
    P. Schartner, P. Horster:
    Authentifikation in schwach vernetzten Systemen.
    (German), in Conference proceedings "Systemsicherheit", Bremen, 28.-29. March 2000.
    P. Schartner, P. Horster:
    Block Cipher Modes for non-standard Applications.
    in Conference Proceedings "IFIP/SEC 2000: Information Security - Information Security for Global information Infrastructures", Beijing, August 21-25, 2000.
    1999
    P. Horster, P. Schartner:
    Bemerkungen zur dublettenfreien Schlüsselgenerierung.
    (German), in Conference Proceedings "Sicherheitsinfrastrukturen", Hamburg, March 9-10, 1999.
    1998
    P. Horster, P. Schartner, P. Wohlmacher:
    Special Aspects of Key Generation.
    in Conference proceedings "Information Technologies in Science, Engineering, Education, Health Service", Kharkov, 20.-23. May 1998.
    P. Horster, P. Schartner, P. Wohlmacher:
    Key-Management.
    SEC'98, XV. IFIP World Computer Congress '98, 14th International Information Security Conference, Wien - Budapest, 31. August - 4. September 1998.
    1997
    P. Schartner:
    Secure Desktop Conferencing System - The Client.
    (German), Master Thesis, TU-Graz IAIK, January 1997.