Publications

  1. 2024
    S. Hammer, P. Schartner:
    Functional Safety Evaluation for Cybersecurity Measures in Low-End Automotive Control Units
    DSA 2024 - The 11th IEEE International Conference on Dependable Systems and Their Applications, (in press)
    E. Pfluegel, S. Rass:
    Ransom Roulette: Learning the Games Behind Cyber Extortion
    Proceedings of the 15th Conference on Game Theory and AI for Security (GameSec-24), (in press)
    C. Kollmitzer, S. Schauer, S. Rass, B. Rainer (eds.):
    Quanten-Zufallszahlengenerierung: Theorie und Praxis
    Cham: Springer International Publishing, 2024. doi: 10.1007/978-3-031-54998-4
    S. Rass, M.-J. Jakobitsch, S. Haan, M. Hiebler:
    Threshold sampling
    Theor. Comput. Sci., vol. 1019, p. 114847, Elsevier, Dec. 2024, doi:10.1016/j.tcs.2024.114847
    S. Rass, S. König, S. Ahmad, M. Goman:
    Metricizing the Euclidean Space Toward Desired Distance Relations in Point Clouds
    IEEE Transactions on Information Forensics & Security, IEEE, vol.19, DOI: 10.1109/TIFS.2024.3420246, pp. 7304-7319
    [Online] https://ieeexplore.ieee.org/document/10574843?source=authoralert
    C. Kollmitzer, S. Schauer, S. Rass, B. Rainer:
    Quanten-Zufallszahlengenerierung: Theorie und Praxis
    Springer, 2024, ISBN 978-3031549977
    [More Information] Click here to see comments and updates
    S. Rass, P. Schartner:
    Authentische Quanten-Nonces
    in: C. Kollmitzer, S. Schauer, S. Rass, B. Rainer(eds.), Quanten-Zufallszahlengenerierung: Theorie und Praxis, pp. 39-50, Springer, 2024, ISBN 978-3031549977
    [More Information] Click here to see comments and updates
    S. Rass:
    Tell me who you are friends with and I will tell you who you are: Unique Neighborhoods in Random Graphs
    in: Theoretical Computer Science, Elsevier, pp. 114386, Jan. 2024, DOI: https://doi.org/10.1016/j.tcs.2024.114386
    S. Rass, M.-J. Jakobitsch, S. Haan, M. Hiebler:
    Computer-Aided Verification of P/NP Proofs: A Survey and Discussion
    IEEE Access, vol. 12, pp. 13513–13524, 2024, doi: 10.1109/ACCESS.2024.3355540
    V. Mayoral-Vilches,, J. Jabbour, Y.-S. Hsiao, Z. Wan, A. Martínez-Fariña, M. Crespo-Álvarez, M. Stewart, J. Manuel Reina-Muñoz, P. Nagras, G. Vikhe, M. Bakhshalipour, M. Pinzger, S. Rass, S. Panigrahi, G. Corradi, N. Roy, P. B. Gibbons, S. M. Neuman, B. Plancher, V. Janapa Reddi:
    RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance
    2024 IEEE International Conference on Robotics and Automation, DOI: 10.13140/RG.2.2.27935.33446 (to appear)
    2023
    S. Rass, M. Pinzger:
    Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code (extended abstract)
    in: J. Fu, T. Kroupa, und Y. Hayel (eds.), Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Lecture Notes in Computer Science, vol. 14167. Cham: Springer Nature Switzerland, 2023. doi: 10.1007/978-3-031-50670-3, pp. xi-xiii
    G. Deng, Y. Liu, V. Mayoral-Vilches, P. Liu, Y. Li, Y. Xu, T. Zhang, Y. Liu, M. Pinzger, S. Rass:
    PentestGPT: An LLM-empowered Automatic Penetration Testing Tool
    CoRR abs/2308.06782 (2023)
    V. Mayoral-Vilches, J. Jabbour, Y.-S. Hsiao, Z. Wan, A. Martínez-Fariña, M. Crespo-Álvarez, M. Stewart, J. Manuel Reina-Muñoz, P. Nagras, G. Vikhe, M. Bakhshalipour, M. Pinzger, S. Rass, S. Panigrahi, G. Corradi, N. Roy, P. B. Gibbons, S. M. Neuman, B. Plancher, V. Janapa Reddi:
    RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance
    In: Workshop on Methods for Objective Comparison of Results in Intelligent Robotics Research, at IROS 2023 (https://ieee-iros.org/), IEEE. Preprint available from arxiv.org: CoRR abs/2309.09212 (2023).
    M. Kahlhofer, P. Kern, S. Henning, S. Rass:
    Benchmarking Function Hook Latency in Cloud-Native Environments
    14th Symposium on Software Performance, in SSP ’23, vol. 43. Karlsruhe, Germany: Gesellschaft für Informatik e.V., Nov. 2023, pp. 11–13
    [Online] https://dl.gi.de/handle/20.500.12116/43246
    G. Deng, Y. Liu, V. Mayoral-Vilches, P. Liu, Y. Li, Y. Xu, T. Zhang, Y. Liu, M. Pinzger, S. Rass:
    PentestGPT: An LLM-empowered Automatic Penetration Testing Tool
    CoRR abs/2308.06782 (2023)
    V. Mayoral-Vilches, G. Deng, Y. Liu, M. Pinzger, S. Rass:
    ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics
    CoRR abs/2308.02152 (2023)
    S. Ahmad, S. Rass, P. Schartner:
    False-Bottom Encryption: Deniable Encryption from Secret Sharing
    In: IEEE Access, vol 11, pp. 62549-62564, doi: 10.1109/ACCESS.2023.3288285
    [Online] https://ieeexplore.ieee.org/document/10158701
    S. Ahmad, S. Rass:
    How to plausibly deny steganographic secrets
    In: Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023, pp. 731-737, DOI: 10.5220/0012120100003555
    S. Rass, S. König, J. Wachter, V. Mayoral-Vilches, E. Panaousis:
    Game-Theoretic APT defense: An Experimental Study on Robotics
    In: Computers & Security (2023), Elsevier, vol. 132, pp. 103328, DOI: https://doi.org/10.1016/j.cose.2023.103328
    S. Rass, S. König:
    Synchronization in Security Games
    In: Fang, F., Xu, H., Hayel, Y. (eds) Decision and Game Theory for Security. GameSec 2022. Lecture Notes in Computer Science, vol 13727. Springer, Cham. https://doi.org/10.1007/978-3-031-26369-9_7, pp. 129–148
    2022
    P. Schaurtner:
    Der lange Weg vom Rollsiegel zur qualifizierten elektronischen Unterschrift
    In: Festschrift Peter Mader Wien: LexisNexis Verlag ARD Orac GmbH & Co KG, (2022)
    [Online] https://shop.manz.at/shop/products/9783700782803?sort=PublicationDate_DESC&filter=PublisherCountry%3DAustria&includeAllPublishers=true&includeArchived=false&includeUnapproved=false&mode=NewReleases
    S. Rass, S. König, S. Schauer:
    Games over Probability Distributions Revisited: New Equilibrium Models and Refinements
    MDPI Games 2022, 13(6), 80; DOI: https://doi.org/10.3390/g13060080
    [Online] https://www.mdpi.com/2073-4336/13/6/80
    S. Rass, S. König, S. Ahmad, M. Goman:
    Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds
    in: IEEE Transactions on Information Forensics & Security, IEEE, (in press), DOI: 10.1109/TIFS.2024.3420246, preprint at https://arxiv.org/abs/2211.03674
    S. König, S. Rass, S. Schauer:
    A Game for Simultaneous Risk and Resilience Optimization
    in 61st ESReDA Seminar (in press)
    [Online] https://www.esreda.org/event/61st-esreda-seminar-22-23-sep-2022-politecnico-di-torino-italy/?instance_id=54/
    M. Mehic, S. Rass, E. Dervisevic, M. Voznak:
    Tackling Denial of Service Attacks in Software-Defined Quantum Key Distribution Networks
    in IEEE Access, 2022, vol. 10, pg. 110512-110520, DOI: 10.1109/ACCESS.2022.3214511
    S. Panda, S. Rass, S. Moschoyiannis, K. Liang, G. Loukas, E. Panaousis:
    HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles
    in IEEE Access, vol. 10, 2022, pp. 104671-104685, DOI: 10.1109/ACCESS.2022.3210117
    [Online] https://ieeexplore.ieee.org/document/9903648
    S. Fasching, I. Huber, I. Mallweger-Grasser, P. Mandl, D. Sabitzer, P. Schartner, E. Schneider, T. Weissel:
    Tag der digitalen Grundbildung: Interdisziplinäre Vernetzung, Informationsaustausch und Wissenstransfer
    In: M. Pissarek, M. Wieser, J. Koren, V. Kucher, V. Novak-Geiger (Hrsg.): Projektbezogene Kooperation von Schule und Universität - Synergien, Gelingensbedingungen, Evaluation, Waxmann Verlag, 2022, ISBN 978-3-8309-4497-3, pp. 241-260.
    M. Mehic, S. Rass, P. Fazio, M. Voznak:
    Quantum Key Distribution Networks: A Quality of Service Perspective
    Springer, 2022, ISBN 978-3-031-06607-8, DOI: doi.org/10.1007/978-3-031-06608-5
    [Online] https://link.springer.com/book/10.1007/978-3-031-06608-5
    M. Vierhauser, R. Wohlrab, S. Rass:
    Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical Systems
    in: Proceedings of IEEE Conference on Communications and Network Security, Cyber Resilience Workshop, 2022, IEEE, pp. 1-6, DOI: 10.1109/CNS56114.2022.10092919
    S. Schauer, T. Hiebl, B. Doppler, W. Mayr, S. Rass, S. König, M. Latzenhofer:
    A Simulation-driven Tool for Supporting Risk and Resilience Assessment in Cities
    in: Advances in modelling to improve network resilience: Proceedings of the 60th ESReDA seminar, online: https://publications.jrc.ec.europa.eu/repository/handle/JRC130275, ISBN 978-92-76-55142-3, ISSN 1831-9424, DOI: 10.2760/503700, pp.93-104, May 2022
    2021
    M. Jesse, c. Steinberger, P. Schartner:
    In Search of a Conversational User Interface for Personal Health Assistance.
    In: 14th International Conference on Health Informatic 2021, pp. 724 - 732.
    B. Bosansky, C. Gonzales, S. Rass, A. Sinha:
    Decision and Game Theory for Security: 12th International Conference, GameSec 2021, Virtual Event, October 25–27, 2021, Proceedings
    Springer Nature, LNCS 13061, DOI: https://doi.org/10.1007/978-3-030-90370-1, 385 pages
    [Online] https://link.springer.com/book/10.1007%2F978-3-030-90370-1
    S. Rass, S. König, J. Wachter, M. Egger, M. Hobisch:
    Supervised Machine Learning with Plausible Deniability
    Computers & Security 112, 102506, DOI: https://doi.org/10.1016/j.cose.2021.102506
    [Online] https://www.sciencedirect.com/science/article/pii/S0167404821003308
    S. Rass, S. König, S. Schauer, V. Bürgin, J. Epperlein, F. Wirth:
    On Game Theory Using Stochastic Tail Orders
    arXiv:2108.00680v1 [math.PR]
    [Online] https://arxiv.org/abs/2108.00680
    V. Mayoral-Vilches, A. Glera-Picón, U. Ayucar-Carbajo, S. Rass, M. Pinzger, F. Maggi, E. Gil-Uriarte:
    Hacking planned obsolescense in robotics, towards security-oriented robot teardown
    Electronic Communications of the EASST, ISSN 1863-2122, Volume 80: Conference on Networked Systems 2021 (NetSys 2021), DOI: http://dx.doi.org/10.14279/tuj.eceasst.80.1189
    [Online] https://journal.ub.tu-berlin.de/eceasst/article/view/1189
    V. Mayoral-Vilches, A. Glera-Picón, U. Ayucar Carbajo, S. Rass, M. Pinzger, F. Maggi, E. Gil-Uriarte:
    Robot Teardown: stripping industrial robots for good
    Alias Robotics Whitepaper, to appear in the International Journal of Cyber Forensics and Advanced Threat Investigations
    [Online] https://aliasrobotics.com/files/robot_teardown_paper.pdf
    S. König, S. Schauer, S. Rass:
    Multi-Categorical Risk Assessment for Urban Critical Infrastructures
    in: Proceedings of the 16th International Conference on Critical Information Infrastructures Security (CRITIS 2021), DOI: 10.1007/978-3-030-93200-8_9, in press
    [Online] https://critis2021.org/conference-program/
    S. Schauer, S. König, S. Rass, M. Latzenhofer:
    Conceptual Approach Towards a Combined Risk and Resilience Framework for Interdependent Infrastructures (abstract)
    Proceedings of the 31st European Safety and Reliability Conference, Edited by Bruno Castanier, Marko Cepin, David Bigaud, and Christophe Berenguer ESREL 2021, published by Research Publishing, Singapore, ISBN: 978-981-18-2016-8; doi:10.3850/978-981-18-2016-8 584-cd, pp. 2161-2171
    [Online] https://easychair.org/smart-program/ESREL2021/
    G. Liuzzi, M. Locatelli, V. Piccialli, S. Rass:
    Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems
    Springer Journal of Computational Optimization and Applications, DOI: https://doi.org/10.1007/s10589-021-00282-7
    [Online] https://rdcu.be/ck71H
    A. Nisioti, G. Loukas, S. Rass, E. Panaousis:
    Game-Theoretic Decision Support for Cyber Forensic Investigations
    MDPI Sensors 2021, 21, 5300. DOI: https://doi.org/10.3390/s21165300
    [Online] https://www.mdpi.com/1424-8220/21/16/5300
    Q. Zhu, S. Rass, B. Dieber, V. Mayoral-Vilches:
    Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
    Foundations and Trends® in Robotics: Vol. 9: No. 1, pp 1-129. DOI: http://dx.doi.org/10.1561/2300000061
    [Online] https://www.nowpublishers.com/article/Details/ROB-061
    S. Schauer, S. Rass, S. König:
    Simulation-driven Risk Model for Interdependent Critical Infrastructures
    Poceedings of the 18th ISCRAM Conference – Blacksburg, VA, USA May 2021, Anouck Adrot, Rob Grace, Kathleen Moore and Christopher Zobel, eds., pp. 404-415
    P. Kubiak, S. Rass, M. Pinzger, S. Schneider:
    A Method for the joint Analysis of numerical and textual IT-System Data to predict critical System States
    in M. van Sinderen et al. (Eds.): ICSOFT 2020, CCIS 1447, pp. 242–261, 2021, DOI: https://doi.org/10.1007/978-3-030-83007-6_12
    B. Breiling, B. Dieber, M. Pinzger, S. Rass:
    A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows
    Journal of Cybersecurity and Privacy, MDPI, 2021; 1(1):93-118, DOI: https://doi.org/10.3390/jcp1010006, URL: https://www.mdpi.com/2624-800X/1/1/6
    [Online] https://www.mdpi.com/2624-800X/1/1/6/pdf
    S. Rass, S. König, S. Schauer:
    Semi-automated Parameterization of a Probabilistic Model Using Logistic Regression—A Tutorial
    in: Kamhoua, C.A., Kiekintveld, C.D., Fang, F., Zhu, Q. (Eds.), Game Theory and Machine Learning for Cyber Security. Wiley, pp. 438–484. https://doi.org/10.1002/9781119723950.ch22, 2021
    [Online] https://www.wiley.com/en-us/Game+Theory+and+Machine+Learning+for+Cyber+Security-p-9781119723943
    B. Breiling, B. Dieber, M. Pinzger, S. Rass:
    A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows
    Journal of Cybersecurity and Privacy, MDPI, 2021; 1(1):93-118, DOI: https://doi.org/10.3390/jcp1010006, URL: https://www.mdpi.com/2624-800X/1/1/6
    [Online] https://www.mdpi.com/2624-800X/1/1/6/pdf
    2020
    D.E. Ströckl, C. Steinberger, V.A. Shekhovtsov, G. Leitner, C. Kop, P. Schartner:
    Smart City Technology meets Smart Health Assistive Systems – on the example of the project AYUDO
    In: Proceedings of the 13th ACM International Conference on Pervasive TechnologiesRelated to Assistive Environments, New York (NY), ACM Press, 2020, pp. 1-7.
    S. Schauer, S. Rass:
    Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities
    in: Critical Infrastructure Protection XIV, 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers, pp. 307-323
    [Online] https://www.springer.com/gp/book/9783030628390
    C. Cichy, S. Rass:
    Fuzzy Expert Systems for Automated Data Quality Assessment and Improvement Processes
    In: D. Garijo and A. Lawrynowicz (eds.) Proceedings of the EKAW 2020 Posters and Demonstrations Session, 2751:7–11. CEUR Workshop Proceedings, 2020
    [Online] http://ceur-ws.org/Vol-2751/short2.pdf
    S. Rass, A. Wiegele, S. König:
    Security Games over Lexicographic Orders
    In: Zhu Q., Baras J.S., Poovendran R., Chen J. (eds) Decision and Game Theory for Security. GameSec 2020. Lecture Notes in Computer Science, vol 12513., pp 422-441, Springer, Cham. https://doi.org/10.1007/978-3-030-64793-3_23
    [More Information] Click here to see comments and updates
    C. Wankmüller, S. Rass, F. Wall:
    Ten expert views on the COVID-19 pandemic
    Mind Soc (2020). https://doi.org/10.1007/s11299-020-00248-y
    [Online] https://link.springer.com/article/10.1007/s11299-020-00248-y
    S. Rass:
    Judging the quality of (fake) news on the internet
    Mind Soc (2020). https://doi.org/10.1007/s11299-020-00249-x
    [Online] https://link.springer.com/article/10.1007/s11299-020-00249-x
    S. König, A. Gouglidis, S. Rass, N. Adams, P. Smith, D. Hutchison:
    Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach
    chapter 31 in 'Guide to Disaster-Resilient Communication Networks', Springer, 2020, ISBN 978-3-030-44684-0, DOI: https://doi.org/10.1007/978-3-030-44685-7_31, pp.769-789
    [Online] https://www.springerprofessional.de/en/analyzing-disaster-induced-cascading-effects-in-hybrid-critical-/18206336
    S. Bauer, S. Rass, P. Schartner:
    Generic Parity Based Concurrent Error Detection for Lightweight ARX Ciphers
    IEEE Access, vol. 8, pp. 142016-142025, 2020, DOI: 10.1109/ACCESS.2020.3010555
    [Online] https://ieeexplore.ieee.org/document/9144548
    M. Mehic, M. Niemiec, S. Rass, J. Ma, M. Peev, A. Martin, V. Martin, S. Schauer, A. Poppe, C. Pacher, M. Voznak:
    Quantum Key Distribution: A Networking Perspective
    ACM Computing Surveys, September 2020, Article No. 96, DOI: https://doi.org/10.1145/3402192 (open access)
    [Online] https://dl.acm.org/doi/10.1145/3402192
    F. Skopik, M. Landauer, M. Wurzenberger, G. Vormayr, J. Milosevic, J. Fabini, W. Prüggler, O. Kruschitz, B. Widmann, K. Truckenthannerd, S. Rass, M. Simmer, C. Zauner:
    synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems
    Journal of Information Security and Applications 54:102544, DOI: 10.1016/j.jisa.2020.102544, October 2020
    S. Rass, S. Schauer, S. König, Q. Zhu:
    Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach
    SpringerNature, Advanced Sciences and Technologies for Security Applications, June 2020, ISBN 978-3030469078
    [Online] https://www.springer.com/de/book/9783030469078?utm_medium=affiliate&utm_source=commission_junction&utm_campaign=3_nsn6445_product_PID%zp&utm_content=at_09252018
    P. Kubiak, S. Rass, M. Pinzger:
    IT-Application Behaviour Analysis – Predicting Critical System States on OpenStack Using Monitoring Performance Data and Log Files
    in: Proceedings of the 15th International Conference on Software Technologies (ICSOFT 2020), SCITEPRESS – Science and Technology Publications, pp. 589-596, ISBN: 978-989-758-443-5, DOI: 10.5220/0009779505890596
    S. Schauer, S. Rass, S. König, K. Steinnocher, T. Schaberreiter, G. Quirchmayr:
    Cross-Domain Risk Analysis to Strengthen City Resilience: the ODYSSEUS approach
    in: A.L. Hughes, F. McNeill and C. Zobel (eds.): ISCRAM 2020 Conference Proceedings - 17th International Conference on Information Systems for Crisis Response and Management, ISBN 978-1-949373-27-1, ISSN 2411-3387, pp. 652-662, 2020
    S. Schauer, S. Rass:
    A Cross-Domain Simulation Model for Supporting Risk Analyses of Large Cities
    Fourteenth IFIP WG 11.10 International Conference on Critical Infrastructure Protection, SRI International, Arlington, Virginia, USA, March 16-17, 2020
    G. Liuzzi, M. Locatelli, V. Piccialli, S. Rass:
    Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems
    Optimization Online: ePrints for the optimization community
    [Online] http://www.optimization-online.org/DB_HTML/2020/03/7656.html
    C. Kollmitzer, S. Schauer, S. Rass, B. Rainer:
    Quantum Random Number Generation - Theory and Practice
    Quantum Science and Technology book series (QST), Springer, Cham, DOI: https://doi.org/10.1007/978-3-319-72596-3, print ISBN 978-3-319-72594-9, Ranked 2nd place among the 29 Best Quantum Cryptography Books of All Time by bookauthority.org (https://bookauthority.org/books/best-quantum-cryptography-books; retrieved Oct 13, 2021)
    [Online] https://link.springer.com/book/10.1007/978-3-319-72596-3
    S. Schauer, T. Grafenauer, S. König, M. Warum, S. Rass:
    Estimating Cascading Effects in Cyber-Physical Critical Infrastructures
    in S. Nadjm-Tehrani (ed): Critical Information Infrastructures Security -- 14th International Conference on Critical Information Infrastructures Security (CRITIS) 2019, Springer LNCS 11777, ISBN 978-3-030-37670-3, pp. 43-56, DOI: 10.1007/978-3-030-37670-3
    [Online] https://www.springer.com/de/book/9783030376697#
    2019
    M. Mehic, P. Fazio, S. Rass, O. Maurhart, M. Peev, A. Poppe, J. Rozhon, M. Niemiec, M. Voznak:
    A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks
    in: IEEE/ACM Transactions on Networking, Print ISSN: 1063-6692 Online ISSN: 1558-2566 DOI: 10.1109/TNET.2019.2956079. Preprint available on arxiv 1810.03857 [cs.NI]
    S. König, T. Grafenauer, S. Schauer, M. Warum, S. Rass:
    A Guideline on the Analysis of Stochastic Interdependencies in Critical Infrastructures
    in: International Journal On Advances in Security, v 12 n 3&4 2019, pp. 164-176
    [Online] https://www.thinkmind.org/index.php?view=article&articleid=sec_v12_n34_2019_2
    C. Cichy, S. Rass:
    A Fuzzy-Approximation Approach to Explainable Information Quality Assessment
    in: Khalid S. Soliman (ed.): Proceedings of the 34th International Business Information Management Association Conference (IBIMA), ISBN: 978-0-9998551-3-3, 2019, pp. 3919-3931
    S. Rass, S. König, E. Panaousis:
    Cut-The-Rope: A Game of Stealthy Intrusion
    in: Alpcan, T.; Vorobeychik, Y.; Baras, J.S.; Dán, G. (Eds.): Decision and Game Theory for Security. Springer International Publishing, Cham, pp. 404–416, DOI: https://doi.org/10.1007/978-3-030-32430-8_24
    [More Information] Click here to see comments and updates
    N. Boumkheld, S. Panda, S. Rass, E. Panaousis:
    Honeypot Type Selection Games for Smart Grid Networks
    in: Alpcan, T.; Vorobeychik, Y.; Baras, J.S.; Dán, G. (Eds.): Decision and Game Theory for Security. Springer International Publishing, Cham, pp. 85–96, DOI: https://doi.org/10.1007/978-3-030-32430-8_6
    S. König, S. Rass, S. Schauer:
    Cyber-Attack Impact Estimation for a Port
    Carlos Jahn, Wolfgang Kersten and Christian M. Ringle (Eds.): Digital Transformation in Maritime and City Logistics, Proceedings of the Hamburg International Conference of Logistics (HICL) – 28, September 2019, epubli, pp. 163-183.
    [Online] https://www.epubli.de/shop/buch/Digitalization-in-Maritime-and-Sustainable-Logistics-Christian-M-Ringle-Wolfgang-Kersten-Carlos-Jahn-9783745043327/69148
    P. Schartner:
    16. Österreichischer IT-Sicherheitstag.
    16. Oktober 2019, Messe Klagenfurt, 110 pages.
    P. Schartner:
    Modul: IT-Sicherheit.
    Fernstudium Zuverlässigkeitsingenieurwesen, Hochschule Darmstadt (120 pages, including 26 videos).
    S. Bauer, P. Schartner:
    Reducing Risk Potential by Evaluating Specialized Countermeasures for Electronic Control Units
    in: Proceedings of 7th escar (Embedded Security in Cars) USA 2019
    S. Bauer, M. Brunner, P. Schartner:
    Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys
    in: Proceedings of 2019 Third IEEE International Conference on Robotic Computing (IRC), DOI: 10.1109/IRC.2019.00082, extended version see https://eprint.iacr.org/2019/268.pdf.
    S. König, S. Rass, B. Rainer, S. Schauer:
    Hybrid Dependencies Between Cyber and Physical Systems
    in: K. Arai et al. (Eds.): Intelligent Computing, Proceedings of the 2019 Computing Conference, Volume 2, Springer, pp. 550-565, ISBN 978-3-030-22867-5, DOI: 10.1007/978-3-030-22868-2_40
    S. Schauer, T. Grafenauer, S. König, S. Rass:
    A Simulation-driven Approach for Measuring Risk and Resilience in the Network of Critical Infrastructures
    in: Proceedings of the 56th ESReDA Seminar, European Atomic Energy Community, EU Science Hub, JRC Publication No JRC118427, pp. 198-211, DOI 10.2760/23760
    [Online] https://ec.europa.eu/jrc/en/publication/critical-services-continuity-resilience-and-security-proceedings-56th-esreda-seminar
    S. Rass, S. Schauer:
    Refining Stochastic Models of Critical Infrastructures by Observation
    in: Proceedings of the 56th ESReDA Seminar, European Atomic Energy Community, EU Science Hub, JRC Publication No JRC118427, pp. 212-223, DOI 10.2760/23760
    [Online] https://ec.europa.eu/jrc/en/publication/critical-services-continuity-resilience-and-security-proceedings-56th-esreda-seminar
    C. Cichy, S. Rass:
    An Overview of Data Quality Frameworks
    in: IEEE Access, vol. 7, iss. 1, pp. 24634-24648, DOI: 10.1109/ACCESS.2019.2899751
    [Online] https://ieeexplore.ieee.org/document/8642813
    S. König, T. Schaberreiter, S. Rass, S. Schauer:
    A Measure for Resilience of Critical Infrastructures
    in: Critical Information Infrastructures Security: 13th international conference, E. Luiijf, I. Žutautaite, and B. Hämmerli, Eds.; Springer Nature, 2019, pp. 57–71.; DOI: https://doi.org/10.1007/978-3-030-05849-4_5
    S. Rass, S. König, A. Alshawish:
    'HyRiM': Multicriteria Risk Management using Zero-Sum Games with vector-valued payoffs that are probability distributions
    Contributed Package for R (www.r-project.org); available from CRAN
    [Online] https://cran.r-project.org/package=HyRiM
    [More Information] Click here to see comments and updates
    Q. Zhu, S. Rass, P. Schartner:
    Community-Based Security for the Internet of Things
    chapter 2 in 'Smart Cities Cybersecurity and Privacy', Elsevier Press, USA, ISBN 978-0-12-815032-0, pp. 11-19, DOI: https://doi.org/10.1016/B978-0-12-815032-0.00002-0
    [Online] https://arxiv.org/abs/1810.00281
    2018
    S. Rass, F. Skopik, A. Schorn:
    Trust and Distrust: On Sense and Nonsense in Big Data
    In: Kosta E., Pierson J., Slamanig D., Fischer-Hübner S., Krenn S. (eds) Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data. Privacy and Identity 2018. IFIP Advances in Information and Communication Technology, vol 547. Springer, Cham. https://doi.org/10.1007/978-3-030-16744-8_6, pp. pp 81-94.
    J. Wachter, S. Rass, S. König, S. Schauer:
    Disappointment-Aversion in Security Games
    In: Bushnell L.; Poovendran R.; Başar T. (eds) Decision and Game Theory for Security. GameSec 2018. Lecture Notes in Computer Science, vol 11199. Springer, Cham, pp.314-325
    S. König, S. Rass:
    Investigating Stochastic Dependencies Between Critical Infrastructures
    International Journal On Advances in Systems and Measurements, v 11 n 3&4 2018, pp. 250-258
    [Online] https://www.thinkmind.org/index.php?view=article&articleid=sysmea_v11_n34_2018_2
    P. Schartner:
    15. Österreichischer IT-Sicherheitstag.
    FH Salzburg, Puch/Hallein, 14. November 2018, 104 pages.
    P. Kubiak, S. Rass:
    An overview of data-driven techniques for IT-service-management
    IEEE Access, Volume 6, Issue 1, pp. 63664-63688, DOI: 10.1109/ACCESS.2018.2875975
    [Online] https://ieeexplore.ieee.org/document/8491279
    S. Rass:
    Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks
    arXiv:1810.05602 [cs.CR]
    [Online] https://arxiv.org/abs/1810.05602
    [More Information] Click here to see comments and updates
    Q. Zhu, S. Rass:
    Game Theory Meets Network Security: A Tutorial at ACM CCS.
    Tutorial 'Game Theory' on Monday, October 15, at the 25th ACM Conference on Computer and Communications Security (ACM CCS).
    [Online] https://arxiv.org/abs/1808.08066v1
    P. Schartner, N. Pohlmann:
    Proceedings DACH Security 2018.
    4. und 5. September 2018, Westfälische Hochschule Gelsenkirchen, 412 pages.
    J. Wachter, S. Rass, S. König:
    Security from the Adversary's Inertia: Controlling Convergence Speed When Playing Mixed Strategy Equilibria
    in MDPI Games 9(3) 59, 2018, DOI:10.3390/g9030059
    S. Rass, P. Schartner, J. Wachter:
    Authentic Quantum Nonces
    in SECURWARE 2018: The Twelfth International Conference on Emerging Security Information, Systems and Technologies, IARIA, ISBN: 978-1-61208-661-3, pp. 139-142
    S. König, T. Grafenauer, S. Rass, S. Schauer:
    Practical Risk Analysis in Interdependent Critical Infrastructures - a How-To
    in SECURWARE 2018: The Twelfth International Conference on Emerging Security Information, Systems and Technologies, IARIA, ISBN: 978-1-61208-661-3, pp. 150-157
    S. Schauer, S. König, S. Rass, T. Grafenauer, J. Wachter, T. Schaberreiter, G. Quirchmayr, S. Poledna, M. Latzenhofer, R. Stollnberger, K. Steinnocher:
    Risikobewertung für vernetzte kritische Infrastrukturen
    in P. Schartner, N. Pohlmann (eds.): DACH Security 2018, ISBN 978-3-00-060424-9, pp. 313-322.
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2018_Paper_23A3.pdf
    S. Rass, T. Grafenauer, S. König, S. Schauer:
    A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures
    International Workshop on Security Engineering for Cloud Computing (IWSECC 2018), colocated with the 13th International Conference on Availability, Reliability and Security (ARES 2018), pp. 30:1–30:8, DOI 10.1145/3230833.3240507
    A. Fielder, S. König, E. Panaousis, S. Schauer, S. Rass:
    Risk Assessment Uncertainties in Cybersecurity Investments
    Games 2018, 9, 34; doi:10.3390/g9020034
    [Online] http://www.mdpi.com/2073-4336/9/2/34/pdf
    G. Frankl, S. Napetschnig, P. Schartner:
    Pathways to Successful Online Testing: eExams with the “Secure Exam Environment” (SEE)
    In: E. Ras, A. Guerrero Roldán: Technology Enhanced Assessment (Technology Enhanced Assessment). Berlin: Springer, 2018, pp. 190-209.
    [Online] http://dx.doi.org/10.1007/978-3-319-97807-9_15
    G. Frankl, P. Schartner, D. Jost:
    The “Secure Exam Environment”. E-Testing with Students' Own Devices
    In: Tatnall, A.; Webb, M. (eds) Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing (IFIP Advances in Information and Communication Technology, vol 515). Springer, 2018, pp. 179-188.
    [Online] http://dx.doi.org/10.1007/978-3-319-74310-3_20
    S. Schauer, S. König, M. Latzenhofer, S. Rass, T. Grafenauer:
    Analyzing Cascading Effects among Critical Infrastructures: The CERBERUS Approach
    Proceedings of the 15th ISCRAM Conference, Rochester, NY, USA, May 2018, ISBN: 978-0-692-12760-5, pp. 428-437, published by the International Association for Information Systems for Crisis Response and Management
    [Online] http://idl.iscram.org/files/stefanschauer/2018/1568_StefanSchauer_etal2018.pdf
    S. Rass, S. König:
    Password Security as a Game of Entropies
    Entropy 20(5), 312, DOI: https://doi.org/10.3390/e20050312
    G. Frankl, P. Schartner, D. Jost:
    Guaranteeing high Availability of the Secure Exam Environment (SEE).
    CSEDU 2018
    S. Rass, S. Schauer (eds.):
    Game Theory for Security and Risk Management: From Theory to Practice
    Springer Birkhäuser series Static & Dynamic Game Theory: Foundations & Applications, edited by Tamer Başar, ISBN: 978-3-319-75267-9, DOI: 10.1007/978-3-319-75268-6, 418 pages. Check the link below on more information to find errata.
    [Online] https://www.springer.com/us/book/9783319752679
    [More Information] Click here to see comments and updates
    Q. Zhu, S. Rass:
    On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats
    IEEE Access, Volume 6, Issue 1, pp. 13958-13971, DOI: 10.1109/ACCESS.2018.2814481
    S. Rass:
    Decision Making When Consequences Are Random
    in Static & dynamic game theory : foundations & applications, Game Theory for Security and Risk Management: From Theory to Practice, S. Rass and S. Schauer, Eds.; Cham, Switzerland: Birkhäuser, 2018, pp. 21–46. Check the link below on more information to find errata.
    [More Information] Click here to see comments and updates
    S. Rass:
    Security Strategies and Multi-Criteria Decision Making
    in Static & dynamic game theory : foundations & applications, Game Theory for Security and Risk Management: From Theory to Practice, S. Rass and S. Schauer, Eds.; Cham, Switzerland: Birkhäuser, 2018, pp. 47-74.
    2017
    S. Rass:
    On Game-Theoretic Risk Management (Part Three) - Modeling and Applications
    arXiv:1711.00708 [q-fin.EC]
    B. Dieber, B. Breiling, S. Taurer, S. Kazianka, S. Rass, P. Schartner:
    Security for the Robot Operating System
    Journal of Robotics and Autonomous Systems, Vol 98, pp. 192-203, Elsevier, December 2017, DOI: https://doi.org/10.1016/j.robot.2017.09.017.
    S. Rass, J. Winkler:
    Learning pairing-based cryptography by hands-on exercises
    Proceedings of the IEEE 6th International Conference on Teaching, Assessment, and Learning for Engineering (TALE), IEEE, pp. 186-191, 2017, , DOI: 10.1109/TALE.2017.8252329
    S. Rass, S. König, S. Schauer:
    Defending Against Advanced Persistent Threats Using Game-Theory.
    PLoS ONE 12 (1), e0168675. DOI: 10.1371/journal.pone.0168675
    M. Mehic, O. Maurhart, S. Rass, D. Komosny, F. Rezac, M. A. Abid:
    Analysis of the Public Channel of Quantum Key Distribution Link.
    in IEEE Journal of Quantum Electronics, vol. 53, no. 5, pp. 1-8, Oct. 2017, Art no. 9300408. DOI: 10.1109/JQE.2017.2740426
    [Online] https://ieeexplore.ieee.org/document/8014429/
    M. Mehic, O. Maurhart, S. Rass, M. A. Abid:
    Implementation of Quantum Key Distribution Network Simulation Module in the Network Simulator NS-3.
    Springer Quantum Inf Process (2017) 16: 253.
    [Online] https://doi.org/10.1007/s11128-017-1702-z
    S. Rass, A. Alshawish, M.A. Abid, S. Schauer, Q. Zhu, H. de Meer:
    Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory.
    In: IEEE Access, vol. 5, pp. 8394-8407, DOI: 10.1109/ACCESS.2017.2693425 (2017).
    J. Wachter, T. Grafenauer, S. Rass:
    Visual Risk Specification and Aggregation.
    SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, IARIA, 2017, pp. 93-98, ISBN: 978-1-61208-582-1
    [More Information] Click here to see comments and updates
    S. König, S. Rass:
    Stochastic Dependencies Between Critical Infrastructures.
    SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, IARIA, 2017, pp. 106-110, ISBN: 978-1-61208-582-1
    S. Rass, S. König, S. Schauer:
    On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies.
    In: Rass, S.; An, B.; Kiekintveld, C.; Fang, F.; Schauer, S. (eds) Decision and Game Theory for Security. GameSec 2017. Lecture Notes in Computer Science, vol 10575. Springer, Cham, pp. 494-505, DOI: 10.1007/978-3-319-68711-7_26
    S. Rass, J. Wachter, S. Schauer, S. König:
    Subjektive Risikobewertung - Über Datenerhebung und Opinion Pooling.
    DACH Security 2017, syssec (2017) pp. 225-237.
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2017_Paper_21A2.pdf
    A. Alshawish, M.A. Abid, S. Rass, H. de Meer:
    Playing a Multi-objective Spot-checking Game in Public Transportation Systems.
    in: 4th Workshop on Security in highly connected IT systems (SHICS), June 19-22, 2017, Neuchâtel, Switzerland (Satellite workshop of DisCoTec 2017), pp. 31—36, DOI: https://doi.org/10.1145/3099012.3099019.
    S. Rass:
    Towards a Physical Oracle for the Partition Problem using Analogue Computing.
    arXiv:1705.01826v1 [cs.CC] 4 May 2017
    S. Schauer, S. König, M. Latzenhofer, S. Rass:
    Identifying and Managing Risks in Interconnected Utility Networks.
    SECURWARE 2017: The Eleventh International Conference on Emerging Security Information, Systems and Technologies, IARIA, 2017, pp. 79-86, ISBN: 978-1-61208-582-1
    J. Göllner, A. Peer, S. Rass, G. Quirchmayr, V. Zathurecky:
    Global Supply Chain Network Risk Analysis and Monitoring for Global Cyber Defense.
    E. G. Carayannis, D. F. J. Campbell und M.P. Efthymiopoulos (eds.): Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Cham: Springer International Publishing, pp. 1-23. DOI: 10.1007/978-3-319-06091-0_33-1, ISBN (print): 978-3-319-06091-0
    B. Breiling, B. Dieber, P. Schartner:
    Secure communication for the Robot Operating System.
    2017 Annual IEEE International Systems Conference (SysCon), Montreal, IEEE, pp. 1–6. DOI: 10.1109/SYSCON.2017.7934755
    P. Schartner, A. Baumann:
    Proceedings DACH Security 2017.
    5. und 6. September 2017, Universität der Bundeswehr München, 470 pages.
    P. Schartner:
    14. Österreichischer IT-Sicherheitstag.
    5. Oktober 2017, Messe Klagenfurt, 92 pages.
    2016
    S. Rass, S. König, S. Schauer, O. Maurhart:
    Implementation and Evaluation of Intrinsic Authentication in Quantum Key Distribution Protocols
    International Journal on Advances in Security Volume 9, Number 1 & 2, 2016, pp. 59-65
    [Online] https://www.thinkmind.org/index.php?view=article&articleid=sec_v9_n12_2016_6
    A. Beck, S. Rass:
    Decision-support by aggregation and flexible visualization of risk situations
    Proceedings of ECCWS, Academic Conferences and publishing ltd, pp. 313-323, ISBN 978-1910810934
    S. König, S. Rass, S. Schauer, A. Beck:
    Risk Propagation Analysis and Visualization using Percolation Theory.
    International Journal of Computer Science and Applications (IJACSA), SAI, vol. 7, issue 1, January 2016, pp. 694-701
    S. Rass, P. Schartner:
    Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing.
    CLOUD COMPUTING 2016 : The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, ISBN: 978-1-61208-460-2, pp. 7-13
    [Online] https://www.thinkmind.org/index.php?view=article&articleid=cloud_computing_2016_1_20_20011
    S. Rass, R. Wigoutschnigg:
    Arguable Anonymity from Key-Privacy: The Deterministic Crowds Protocol.
    NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, 2016, pp. 571-576. DOI: 10.1109/NOMS.2016.7502860
    [Online] https://ieeexplore.ieee.org/document/7502860/
    P. Schartner, S. Rass:
    Kurseinheit ITS4: Sicherheitsinfrastrukturen.
    Fernstudium Informatik – Lehreinheit Informationssicherheit, 2. aktualisierte und ergänzte Auflage, Fachhochschule Trier (129 pages).
    S. Rass, P. Schartner:
    On the Security of a Universal Cryptocomputer – The Chosen Instruction Attack.
    IEEE Access vol 4, pp. 7874–7882, DOI: 10.1109/ACCESS.2016.2622724
    [Online] http://ieeexplore.ieee.org/document/7725560/
    A. Beck, S. Rass:
    Using Neural Networks to Aid CVSS Risk Aggregation – An empirically Validated Approach.
    In: Journal of Innovation in Digital Ecosystems 3 (2), 2016, pp. 148–154. DOI: 10.1016/j.jides.2016.10.002. (preliminary version appeared in the Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference (FLAIRS), Association for the Advancement of Artificial Intelligence (AAAI), 2016, pp.294-297).
    M. Wamser, S. Rass, P. Schartner:
    Oblivious Lookup-Tables.
    Tatra Mt. Math. Publ. 67 (2016), pp. 191–203, DOI: 10.1515/tmmp-2016-0039 (preliminary version online at arXiv:1505.00605 [cs.CR])
    [Online] https://www.sav.sk/journals/uploads/0215101213W392.pdf
    S. Schauer, S. König, S. Rass, M. Latzenhofer:
    Spieltheoretische Risikominimierung in IKT-Infrastrukturen.
    P. Schartner (ed.) DACH Security 2016, pp. 174-187
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2016_Paper_14A2.pdf
    B. Dieber, S. Kacianka, S. Rass, P. Schartner:
    Sicherheit für ROS-basierte Applikationen auf Anwendungsebene.
    P. Schartner (ed.) DACH Security 2016, pp. 363-370
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2016_Paper_23A2.pdf
    B. Dieber, S. Kacianka, S. Rass, P. Schartner:
    Application-level Security for ROS-based Applications.
    Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2016), Korea, pp. 4477-4482, DOI: 10.1109/IROS.2016.7759659.
    S. König, S. Schauer, S. Rass:
    A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks.
    B.B. Brumley and J. Röning (Eds.): NordSec 2016, LNCS 10014, pp. 67–81, 2016, DOI: 10.1007/978-3-319-47560-8_5
    J. Busby, A. Gouglidis, S. Rass, S. König:
    Modelling Security Risk in Critical Utilities: The System at Risk as a Three Player Game and Agent Society.
    in: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 001758-001763, DOI: 10.1109/SMC.2016.7844492
    S. Rass, Q. Zhu:
    GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies against Advanced Persistent Threats.
    GameSec 2016, Springer LNCS 9996, pp.314-326, 2016, DOI: 10.1007/978-3-319-47413-7_18, pp. 314-326
    S. Schauer, S. König, S. Rass, A. Gouglidis, A. Alshawish, H. de Meer:
    Risk Minimization in Physical Surveillance: Playing an Uncertain Cops-and-Robbers Game (Abstract).
    in GameSec 2016, p.471, 10.1007/978-3-319-47413-7_18.
    S. Rass, P. Schartner:
    System Enabling Licensed Processing of Encrypted Information.
    European patent application EP14189234.9, submission number 3064571, filed on the 16th of October 2014, published 20.04.2016
    S. Rass:
    On the Existence of Weak One-Way Functions.
    [Online] https://arxiv.org/abs/1609.01575

    H. Seuschek, S. Rass:
    Side-channel leakage models for RISC instruction set architectures from empirical data.
    In: Microprocessors and Microsystems 47, pp. 74–81. DOI: 10.1016/j.micpro.2016.01.004.
    S. Rass, S. König, S. Schauer:
    Decisions with Uncertain Consequences-A Total Ordering on Loss-Distributions.
    PLoS ONE 11 (12), e0168583. 2017, DOI: 10.1371/journal.pone.0168583. See the paper details page for corrections, follow-up work and updates.
    [More Information] Click here to see comments and updates
    P. Schartner:
    Proceedings DACH Security 2016.
    26. und 27. September 2015, Alpen-Adria-Universität Klagenfurt, 437 pages.
    P. Schartner:
    13. Österreichischer IT-Sicherheitstag.
    FH Salzburg, Puch/Hallein, 19. Oktober 2016, 109 pages.
    2015
    S. Rass, B. Rainer, M. Vavti, J. Göllner, A. Peer, S. Schauer:
    Secure Communication over Software-Defined Networks.
    in Springer Journal of Mobile Networks and Applications, vol. 20, 2015, pp. 105-110, DOI 10.1007/s11036-015-0582-7, preliminary version appeared in the Proceedings of the International Conference on Software-Defined and Virtualized Future Wireless Networks, European Alliance for Innovation (EAI), 2014
    [Online] http://link.springer.com/article/10.1007/s11036-015-0582-7
    A. Abl, S. Rass, P. Schartner, P. Horster:
    A method for detecting a speed violation of a vehicle.
    European patent specification EP 2 648 170 B1, US Patent No. 8,964,984 B2, Canada Patent No. CA2803840A1
    [Online] https://patents.google.com/patent/EP2648170A1/un

    P. Schartner, F. Kollmann, M. Schaffer:
    Kurseinheit ITS7: Praktikum IT-Sicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (3rd revised edition, 63 pages), Fachhochschule Trier, 2015.
    S. Rass:
    On Game-Theoretic Risk Management (Part One) - Towards a Theory of Games with Payoffs that are Probability-Distributions.
    arXiv:1506.07368 [q-fin.EC]
    S. Rass, P. Schartner:
    Licensed Processing of Encrypted Information.
    in Proc. of Conference on Communications and Network Security (CNS), poster session, 2015, IEEE Communication Society, pp.703-704, DOI: 10.1109/CNS.2015.7346894
    S. Schauer, C. Kollmitzer, O. Maurhart, P. Schartner, S. Rass:
    Mobile Devices in Unternehmen mit erhöhtem Sicherheitsbedarf.
    in DACH Security 2015, pp. 256-266.
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2015_Paper_21A3.pdf
    H. Seuschek, S. Rass:
    Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data.
    in Proc. of Euromicro Conference on Digital System Design (DSD 2015), IEEE, pp.423-430
    S. Rass, S. König, S. Schauer:
    Uncertainty in Games: Using Probability-Distributions as Payoffs.
    in MHR Khouzani et al. (eds.) GameSec 2015, Springer LNCS 9406, pp. 346-357, DOI: 10.1007/978-3-319-25594-1_20. See the paper details page for corrections, follow-up work and updates.
    [More Information] Click here to see comments and updates
    S. Rass, S. König, S. Schauer:
    BB84 Quantum Key Distribution with Intrinsic Authentication.
    in Proc. of Ninth International Conference on Quantum, Nano/Bio, and Micro Technologies (ICQNM 2015), IARIA, ISBN 978-1-61208-431-2, pp. 41-44
    S. König, S. Rass:
    Stochastic Models for Quantum Device Configuration and Self-Adaptation.
    International Journal On Advances in Systems and Measurements, volume 8, numbers 1 and 2, 2015, pp. 124-134, ISSN: 1942-261x
    S. Rass, P. Schartner, M. Wamser:
    Oblivious Lookup Tables.
    contributed talk at the 15th Central European Conference on Cryptology (CECC 2015), arXiv:1505.00605 [cs.CR]
    S. Rass:
    On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs.
    arXiv:1511.08591 [q-fin.EC]
    S. Rass, P. Schartner, M. Brodbeck:
    Private function evaluation by local two-party computation.
    EURASIP Journal on Information Security, vol. 7, SpringerOpen, 2015, DOI 10.1186/s13635-015-0025-9, 11p
    P. Schartner, K. Lemke-Rust, M. Ullmann:
    Proceedings DACH Security 2015.
    8. und 9. September 2015, Hochschule Bonn-Rhein-Sieg, 462 pages.
    P. Schartner:
    12. Österreichischer IT-Sicherheitstag.
    15. Oktober 2015, Messe Klagenfurt, 114 pages.
    2014
    S. Rass:
    Complexity of Network Design for Private Communication and the P-vs-NP question.
    International Journal of Advanced Computer Science and Applications, The Science and Information Organization (SAI), Vol. 5, No. 2, 2014, pp. 148-157.
    [Online] http://thesai.org/Downloads/Volume5No2/Paper_22-Complexity_of_Network_Design_for_Private.pdf
    S. Rass, P. Schartner:
    Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud.
    in: Sicherheit 2014 - 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), GI Lecture Notes in Informatics, pp. 187-200.
    S. Rass, P. Schartner, P. Horster, A. Abl:
    Privacy-Preserving Speed-Limit Enforcement.
    in International Journal of Traffic and Logistics Engineering, Vol. 2, No. 1, Engineering and Technology Publishing, ISSN 2301-3680, March 2014, pp. 26-33.
    S. Rass, S. Schauer, J. Göllner, A. Peer:
    Security Strategies towards Mutually Dependent Goals (extended abstract).
    in J. Wilby, S. Blachfellner, W. Hofkirchner (eds.): European Meetings on Cybernetics and Systems Research (EMCSR) - Book of Abstracts, Bertalanffy Center for the Study of Systems Science, 2014, pp. 630-634
    [Online] http://emcsr.net/book-of-abstracts/
    S. Schauer, J. Göllner, A. Peer, S. Rass:
    Entwicklung einer Test-Umgebung für Risiko-Assessmenttools.
    in P. Schartner, P. Lipp (eds.): DACH Security 2014, syssec, pp. 157-169.
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2014_Paper_21A3.pdf
    S. Rass, J. Winkler:
    Computer Aided Teaching of Elliptic Curve Cryptography.
    Proceedings of the 17th International Conference on Interactive Collaborative Learning, ICL2014, ISBN 978-1-4799-4438-5
    [More Information] Click here to see comments and updates
    S. Rass, B. Rainer:
    Numerical Computation of Multi-Goal Security Strategies.
    in R. Poovendran, W. Saad (eds.): Proceedings of the 5th International Conference on Decision and Game Theory for Security (GameSec) 2014, Springer LNCS 8840, pp. 118-133
    F. de Santis, S. Rass:
    Efficient Leakage-Resilient Pseudorandom Functions from Hard-to-Invert Leakages.
    In: Aranha D., Menezes A. (eds) Progress in Cryptology - LATINCRYPT 2014. LATINCRYPT 2014. Lecture Notes in Computer Science, vol 8895. Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-16295-9_7, pp. 127-145
    S. König, S. Rass:
    Self-Adaption of Quantum Key Distribution Devices to Changing Working Conditions.
    Proc. of the International Conference on Quanum-, Nanon and Microtechnology (ICQNM), 2014
    P. Horster, F. Kollmann, S. Rass, M. Schaffer, P. Schartner:
    Kurseinheit ITS1: Systemsicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (109 pages), Fachhochschule Trier, revised edition, 2014.
    D. Fox, P. Schartner, S. Rass:
    DuD Sonderheft 11/2014 "Hardware Security".
    (Editorial) Wiesbaden, Gabler Verlag/GWV-Fachverlage GmbH
    P. Schartner, P. Lipp:
    Proceedings DACH Security 2014.
    16. und 17. September 2014, TU Graz – Campus Inffeldgasse, 334 pages.
    R. Wigoutschnigg:
    Anonymität und Mehrwegeübertragung.
    in: Peter Schartner, Peter Lipp (Hrsg.): DACH Security 2014, syssec, Klagenfurt, 2014, S. 82 - 93
    P. Schartner:
    11. Österreichischer IT-Sicherheitstag.
    FH Salzburg, Puch/Hallein, 22. Oktober 2014.
    2013
    S. Rass:
    On Game-Theoretic Network Security Provisioning.
    Springer Journal of Networks and Systems Management, Volume 21, Issue 1 (2013), Page 47-64, DOI 10.1007/s10922-012-9229-1
    [Online] http://www.springerlink.com/content/858587701273573m/
    S. Rass, S. Kurowski:
    On Bayesian Trust and Risk Forecasting for Compound Systems.
    in: Proceedings of 7th International Conference on IT Security Incident Management & IT Forensics, 2013, IEEE Computer Society, pp. 69-82, ISBN 9781467363075
    S. Rass:
    Dynamic Proofs of Retrievability from Chameleon-Hashes.
    in: Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT), ScitePress – Science and Technology Publications, Portugal, 2013, pp. 296-304, ISBN: 978-989-8565-73-0, DOI: 10.5220/0004505102960304
    [Online] http://www.scitepress.org/PublicationsDetail.aspx?ID=H7AxSqfsWUU=&t=1

    [More Information] Click here to see comments and updates
    S. Rass, B. Rainer, M. Vavti, S. Schauer:
    A Network Modeling and Analysis Tool for Perfectly Secure Communication.
    Proceedings of the 27th International Conference on Advanced Information Networking and Applications, IEEE Computer Society, 2013, pp. 267-275, ISBN 978-146-7355-506
    S. Rass, S. Schauer, A. Peer, J. Göllner:
    Sicherheit auf Basis Multikriterieller Spieltheorie.
    in: P. Schartner, P. Trommler (eds.): DACH Security 2013, pp. 289-301, ISBN 978-3-00-042097-9
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2013_Paper.pdf
    R. Wigoutschnigg, P. Schartner, S. Rass:
    Extended Crowds with adjustable receiver anonymity.
    Proceedings of the IADIS International Conference on e-Society, International Association for Development of the Information Society, 2013.
    S. Rass, B. Rainer, S. Schauer:
    On the Practical Feasibility of Secure Multipath Communication.
    International Journal of Advanced Computer Science and Applications, The Science and Information Organization (SAI), Vol. 4, No. 10, pp. 99-108.
    S. Rass, D. Slamanig:
    Cryptography for Security and Privacy in Cloud Computing.
    Artech House, 2013, 260p, ISBN: 978-1-60807-575-1
    [Online] http://www.artechhouse.com/International/Books/Cryptography-for-Security-and-Privacy-in-Cloud-Com-2086.aspx
    S. Rass:
    Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption.
    International Journal of Advanced Computer Science and Applications (IJACSA), The Science and Information Organization (SAI), Volume 4, No 11, November 2013, pp. 47-56
    P. Horster, S. Rass, P. Schartner:
    Kurseinheit ITS6: Sicherheitsinfrastrukturen.
    Fernstudium Informatik - Lehreinheit Informationssicherheit, Fachhochschule Trier (96 pages), 2013.
    R. Wigoutschnigg, P. Schartner, S. Rass:
    Shared Crowds: A Token-Ring Approach to hide the Receiver.
    in: 8th International Workshop on Frontiers in Availability, Reliability and Security (FARES), IEEE Computer Society, 2013, pp. 383-389.
    P. Schartner, P. Trommler:
    Proceedings DACH Security 2013.
    17. und 18. September 2013, Georg-Simon-Ohm-Hochschule Nürnberg, 392 pages.
    D. Posch, H. Hellwagner, P. Schartner:
    On-Demand Video Streaming based on Dynamic Adaptive Encrypted Content Chunks.
    Proceedings of the 8th International Workshop on Secure Network Protocols (NPSec’ 13), IEEE Computer Society Press, Los Alamitos (CA), Oktober 2013.
    P. Schartner, P. Horster:
    10. Österreichischer IT-Sicherheitstag.
    3. Oktober 2013, Messe Klagenfurt.
    2012
    D. Slamanig, S. Rass:
    Selectively Traceable Anonymous and Unlinkable Token-Based Transactions.
    in: Joaquim Filipe and Mohammad S. Obaidat (Hrsg.): e-Business and Telecommunications: International Conference, ICETE 2010, Revised Selected Papers, CCIS vol. 222, pp.289-303, ISBN 978-3-642-25206-8, Springer Berlin Heidelberg, 2012
    S. Rass, M. Koza:
    On Secure Communication over Wireless Sensor Networks.
    in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), SciTePress, 2012, pp.364-367, DOI: 10.5220/0004018403640367
    [Online] http://www.scitepress.org/PublicationsDetail.aspx?ID=y4dHPgInTYc%3d&t=1

    S. Rass, R. Wigoutschnigg, P. Schartner:
    Anonymous Communication by Branch-and-Bound.
    in Proceedings of the International Conference on Availability, Reliability and Security (ARES), IEEE, 2012, pp.94-102
    P. Schartner, S. Rass, M. Schaffer:
    Quantum Key Management.
    chapter 10 in: Jaydip Sen (ed.), Applied Cryptography and Network Security, ISBN 978-953-51-0218-2, pp.227-244, IN-TECH 2012.
    S. Rass:
    Security Risk Measuring and Forecasting.
    chapter 8 in K. Lek and N. Rajapakse (eds.): Cryptography: Protocols, Design and Applications, ISBN 978-1-62100-831-6, Nova Science Publishers, 2012, pp. 213-236.
    S. Rass, A. Ortner:
    Sunset/FFapl - An Integrated Development Environment for Teaching Cryptography.
    in: Proceedings of the International Conference on Interactive Collaborative Learning (ICL), IEEE Los Alamitos, 2012, ISBN: 978-1-4673-2426-7, 978-1-4673-2427-4
    [More Information] Click here to see comments and updates
    S. Schauer, B. Rainer, S. Rass:
    IT-Security Risiko Management mit Elementen der Spieltheorie.
    in P.Schartner, J.Taeger (eds.): Proceedings of DACH Security 2012, syssec, pp.106-117
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2012_Paper.pdf
    T. Fenzl, A. Golla, S. Herda, S. Rass, C. Kollmitzer:
    Können Gesichter ein Passwort sein?.
    (Abstract) In: M. Kahr, L. Sassmann, M. Feldhammer (Hrsg.): 10. Tagung der Österreichischen Gesellschaft für Psychologie. Tagungsband. Graz: Karl-Franzens-Universität Graz, April 2012, S. 102.
    S. Rass, S. König:
    Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries.
    in: International Journal On Advances in Systems and Measurements, vol. 5, No. 1 & 2, 2012, IARIA, pp.22-33
    [Online] http://www.iariajournals.org/systems_and_measurements/
    S. Rass:
    DuD Datenschutz und Datensicherheit.
    Gast-Editorial für Heft 07/2012 mit dem Schwerpunkt "Aktuelle Entwicklungen der IT-Sicherheit", Springer | Gabler, 2012
    P. Schartner:
    Unique domain-specific Citizen Identification for E-Government Applications.
    In Proceedings of “The Sixth International Conference on Digital Society – ICDS 2012”, S. 23-28, Valencia, Spain, 30. Jänner - 4. Februar 2012.
    P. Schartner:
    Sicherheitsanalyse des (wirtschafts-)bereichsspezifischen Personenkennzeichens.
    in E. Schweighofer, F. Kummer, W. Hötzendorfer (Hrsg.) “Transformation juristischer Sprachen – Tagungsband des 15. Internationalen Rechtsinformatik Symposions IRIS 2012”, S. 379-384, Universität Salzburg, 23.-25. Februar 2012.
    G. Zebedin, G. Frankl, P. Schartner:
    The "Secure Exam Environment" (SEE) at the Alpen- Adria-Universität Klagenfurt / Austria (AAUK).
    In Proceedings of “2012 IEEE Global Engineering Education Conference (EDUCON)”, Marrakech, Marokko, 17-20 April 2012.
    D. Fox, S. Rass:
    DuD Sonderheft 07/2012 "Aktuelle Entwicklungen der IT-Sicherheit".
    (Editorial) Wiesbaden, Gabler Verlag/GWV-Fachverlage GmbH
    P. Schartner, J. Taeger:
    Proceedings DACH Security 2012.
    25. und 26. September 2011, HS Konstanz, 491 pages.
    P. Schartner, P. Horster:
    9. Österreichischer IT-Sicherheitstag.
    FH Salzburg, Puch/Hallein, 7. November 2012.
    2011
    S. Rass, R. Wigoutschnigg, P. Schartner:
    Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity.
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2011, Vol. 2, No. 4, pp. 27-41
    S. Rass, P. Schartner:
    A unified framework for the analysis of availability, reliability and security, with applications to quantum networks.
    IEEE Transactions on Systems, Man, and Cybernetics – Part C: Applications and Reviews, 2011, Volume 41, Issue 1, page 107-119, DOI: 10.1109/TSMCC.2010.20506862010
    D. Slamanig, S. Rass:
    On Security and Privacy in Cloud Computing.
    Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER), p.604-609, SciTePress Publications, 2011, DOI: 10.5220/0003382106040609
    [Online] http://www.scitepress.org/PublicationsDetail.aspx?ID=eMLkxtBmaNs=&t=1

    S. Rass:
    Towards a Rapid-Alert System for Security Incidents.
    Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics (IMF), p.122-136, IEEE Computer Society Press, 2011.
    S. Rass, F. Al Machot, K. Kyamakya:
    Fine-Grained Diagnostics of Ontologies with Assurance.
    chapter 5 in: Efficient Decision Support Systems: Practice and Challenges – From Current to Future / Book 3, p. 79-98, IN-TECH Verlag 2011 (ISBN 978-953-308-63-9).
    S. Rass, P. Schartner:
    Information-Leakage in Hybrid Randomized Protocols.
    in: Proceedings of the International Conference on Security and Cryptography (SECRYPT), p. 134-143, SciTePress - Science and Technology Publications, 2011
    [Online] https://ieeexplore.ieee.org/document/6732380

    S. Rass, R. Wigoutschnigg, P. Schartner:
    Crowds Based on Secret-Sharing.
    in: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, p. 359-364, August 2011
    S. Rass, S. König:
    Indirect Eavesdropping in Quantum Networks.
    in: Proceedings of the 5th International Conference on Quantum-, Nano and Micro-technologies (ICQNM), XPS (Xpert Publishing Services), p. 83-88, August 2011
    R. Wigoutschnigg, P. Schartner, S. Rass:
    Crowds mit beeinflussbarer Empfängeranonymität.
    in: P. Schartner, J. Taeger (Hrsg): DACH Security, p.304-313, 2011.
    S. Rass:
    Information-Theoretic Security as an Optimization Problem.
    in: Journal of Next Generation Information Technology (JNIT), ISSN 2093-5641, Advanced Institute of Convergence IT (ACIT), p. 72-83, 2011.
    D. Slamanig, S. Rass:
    Redigierbare Digitale Signaturen – Theorie und Praxis.
    Datenschutz und Datensicherheit (DuD), Vol. 35, No. 11, 2011, pp. 757-762, DOI: 10.1007/s11623-011-0181-0.
    S. König, S. Rass:
    On the transmission capacity of quantum networks.
    in: International Journal of Advanced Computer Science and Applications (IJACSA), Volume 2, Issue 11, pp.9-16, November 2011.
    S. Rass:
    Security Risk Measuring and Forecasting.
    in: Kamol Lek, Naruemol Rajapakse (eds.) Cryptography: Protocols, Design and Applications, Nova Science Publishers, Inc., 2011, ISBN: 978-1621007791, pp. 213-236
    P. Schartner, S. Bürger:
    Attacking mTAN Applications like e-Banking and Mobile Signatures.
    Technical Report TR-syssec-11-01, University of Klagenfurt (Austria), June 2011.

    P. Schartner:
    A low-cost alternative for OAEP.
    Technical Report TR-syssec-11-02, University of Klagenfurt (Austria), June 2011.

    P. Schartner, M. Foisner:
    System-Manipulation using Windows Messaging Hooks.
    Proceedings of the 2011 International Conference on Security and Management (SAM’11), S. 432-435, Las Vegas, USA, 18-21 Juli 2011.
    P. Schartner, J. Taeger:
    Proceedings DACH Security 2011.
    20. und 21. September 2011, IT-Quartier Oldenburg, 594 pages.
    P. Schartner:
    A low-cost alternative for OAEP.
    In Proceedings of "International Workshop on Security and Dependability for Resource Constrained Embedded Systems - SD4RECS 2011", Neapel, 22. Spetember 2011.
    P. Horster, P. Schartner:
    8. Österreichischer IT-Sicherheitstag.
    6. Oktober 2011, Messe Klagenfurt.
    G. Frankl, P. Schartner, G. Zebedin:
    The "Secure Exam Environment" for Online Testing at the Alpen-Adria-Universitat Klagenfurt / Austria.
    In Proceedings of "E-LEARN 2011 - World Conference on E-Learning in Corporate, Government, Healthcare & Higher Education", Honolulu, Hawaii, 18.-21. October 2011.
    D. Fox, P. Schartner:
    DuD Sonderheft "Kryptologie".
    Heft 11/2011
    2010
    S. Rass, C. Kollmitzer:
    Adaptive Cascade.
    In: Applied Quantum Cryptography (Chapter 4), Lecture Notes of Physics 797. Publisher: Springer (Berlin, Heidelberg). pp 49-69, 2010.
    S. Rass, P. Schartner:
    Multipath Authentication without Shared Secrets and With Applications in Quantum Networks.
    in: Proceedings of the International Conference on Security and Management (SAM), Vol. 1, CSREA Press, pp. 111-115, 2010.
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/SAM5203FINAL.pdf
    S. Rass:
    Über Informationstheoretische Sicherheit: Aktuelle Probleme und Lösungen.
    in: Ausgezeichnete Informatikdissertationen 2009, S. Hölldobler et al. (Hrsg.), Lecture Notes in Informatics, Gesellschaft für Informatik e.V. (GI), 2009, pp. 201-210.
    S. Rass:
    Information-theoretic Security in Practice – Multipath Transmission and Quantum Networks.
    Südwestdeutscher Verlag für Hochschulschriften, ISBN 978-3-8381-2016-4
    S. Rass, P. Schartner:
    Quantenkryptographie – Überblick und aktuelle Entwicklungen.
    in: Datenschutz und Datensicherheit (DuD) 11/2010, pp. 753-757.
    M. Schaffer, S. Rass:
    Fusion Discrete Logarithm Problems.
    15 pages, arXiv.org, [cs.CR], 2010
    [Online] http://arxiv.org/abs/1001.1802v1
    P. Schartner, C. Kollmitzer:
    Quantum-cryptographic Networks from a Prototype to the Citizen.
    In: Applied Quantum Cryptography (Chapter 9), Lecture Notes of Physics 797. Publisher: Springer (Berlin, Heidelberg). pp. 173-184, 2010.
    S. Rass, P. Schartner, R. Wigoutschnigg:
    Security as a Game - Decisions from Incomplete Models.
    In: Decision Support Systems (Chapter 22). Publisher: (Intech). pp 391-406, 2010.
    S. Rass, A. Wiegele, P. Schartner:
    Building a Quantum Network: How to Optimize Security and Expenses.
    In: Journal of Network and Systems Management, Volume 18, Number 3, pp. 283-299, Springer, 2010, DOI 10.1007/s10922-010-9162-0
    [Online] http://www.springerlink.com/content/2683237u4l006077
    S. Rass, P. Schartner:
    Non-Interactive Information Reconciliation for Quantum Key Distribution.
    In: IEEE. (Hrsg.): Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Perth, Western Australia. Publisher: IEEE Computer Society Press. pp 1054-1060.
    P. Schartner, E. Weippl:
    Proceedings DACH Security 2010.
    21. und 22. September 2010, TU Wien, 418 pages, September 2010.
    S. Rass, D. Schuller, C. Kollmitzer:
    Entropy of Graphical Passwords: Towards an Information-theoretic Analysis of Face-Recognition Based Authentication.
    In: Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Lecture Notes of Computer Science 6109, May 2010, p.166-177
    D. Slamanig, S. Rass:
    Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.
    In: Proceedings of the 11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS'2010, Springer Lecture Notes of Computer Science 6109, May 2010, p.201-213
    D. Slamanig, S. Rass:
    Anonymous but Authorized Transactions Supporting Selective Traceability.
    Proceedings of the 5th International Conference on Security and Cryptography SECRYPT, IEEE Communications Society (ComSoc), Juli 2010, p.132-141
    [Online] http://www.scitepress.org/Papers/2010/29945/29945.pdf

    H. Schleifer, P. Schartner:
    Schutz der Privatsphäre bei IP-Videoüberwachung.
    DACH Security 2010, S. 390-406, TU Wien, 21.-22. September 2010.
    P. Horster, P. Schartner:
    7. Österreichischer IT-Sicherheitstag.
    Graz, 3. November 2010.
    P. Schartner, S. Rass:
    Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option.
    Proceedings of ICS 2010 - 2010 Workshop of Information Security, p.131-136, IEEE, ISBN: 978-1-4244-7638-1, Taiwan, 2010.
    2009
    S. Rass, P. Schartner:
    Security in Quantum Networks as an Optimization Problem.
    In: IEEE. (Hrsg.): Proceedings of the International Conference on Availability, Reliability and Security. pp. 493-498.
    P. Schartner, S. Rass:
    How to overcome the ’Trusted Node Model’ in Quantum Cryptography.
    In: IEEE. (Hrsg.): Proceedings of the 12th IEEE International Conference on Computational Science and Engineering. Los Alamitos, California: pp. 259-262.
    S. Rass, C. Kollmitzer:
    Adaptive Error Correction with Dynamic Initial Block Size in Quantum Cryptographic Key Distribution Protocols.
    In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 90-95.
    M. Pivk, C. Kollmitzer, S. Rass:
    SSL/TLS with Quantum Cryptography.
    In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 96-101.
    K. Lessiak, C. Kollmitzer, S. Schauer, J. Pilz, S. Rass:
    Statistical Analysis of QKD Networks in Real-life Environments.
    In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 109-114.
    S. Rass, P. Schartner:
    Game-Theoretic Security Analysis of Quantum Networks.
    In: IEEE. (Hrsg.): 2009 Third International Conference on Quantum, Nano and Micro Technologies ICQNM 2009. Cancun, Mexico: IEEE, 1-7 February 2009, pp. 20-25.
    S. Rass, P. Schartner, M. Greiler:
    Quantum Coin-Flipping-Based Authentication.
    In: IEEE Communications Society (Hrsg.): 2009 IEEE International Conference on Communications ICC 2009, 1 February, pp 5.
    S. Fuchs, S. Rass, K. Kyamakya:
    Handling Uncertainty in Context-Aware Driver Assistance Systems.
    In: A. Inoue (Hrsg.):Proceedings of the 2009 IEEE International Conference on Networking, Sensing and Control, ICNSC´09, Okayama, Japan, 29 March,pp. 446-467.
    S. Rass, R. Wigoutschnigg, P. Schartner:
    Sichere Speicherung von Patientendaten mittels Chipkarten.
    In: P. Horster (Hrsg.): DACH Security 2009, 19 May, pp. 185-194.
    [Online] https://www.syssec.at/user/themes/syssec-theme/downloads/DACH/DACH_Security_2009_Paper.pdf
    P. Horster, P. Schartner:
    Proceedings DACH Security 2009.
    19. und 20. Mai 2009, Ruhr-Universität Bochum, 514 pages, May 2009.
    D. Slamanig, P. Schartner, C. Stingl:
    Practical Traceable Anonymous Identification.
    Proceedings of the International Conference on Security and Cryptography, SECRYPT 2009, pp. 225-232.
    S. Rass:
    On a convex optimization problem in system security.
    Technical Reports, 3. August 2009, pp 7.
    P. Horster, P. Schartner:
    6. Österreichischer IT-Sicherheitstag.
    Klagenfurt, 4. November 2009.
    2008
    R. Wigoutschnigg, P. Schartner:
    Java-basierte Simulation von Smartcards.
    In Proceedings P. Horster (Hrsg.): "D A CH Security 2008", Technische Universität Berlin, 24.-25. Juni 2008.
    M. Schaffer, P. Schartner:
    Über die lokale und verteilte Erzeugung systemweit eindeutiger Zufallszahlen.
    In Proceedings P. Horster (Hrsg.): "D A CH Security 2008", Technische Universität Berlin, 24.-25. Juni 2008
    M. Greiler, P. Schartner:
    Secure Resource Sharing in Ad Hoc Networks.
    In Proceedings of the 2008 International Conference on Security and Management (SAM'07), Las Vegas, USA, June 14-17, 2008.
    M. Schaffer:
    Key Aspects of Random Number Generation.
    VDM Verlag, 220 pages, May 2008.
    P. Schartner:
    Kurseinheit ITS5: Chipkarten und Anwendungen.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (2nd edition, 121 pages), Fachhochschule Trier, 2008.
    S. Rass, S. Fuchs, K. Kyamakya:
    A Game-theoretic Approach to Co-operative Context-aware Driving with Partially Random Behavior.
    In: D. Roggen, C. Lombriser , G. Tröster , G. Kortuem , P. Havinga (Hrsg.): Proceedings of the Third European Conference on Smart Sensing and Context (EuroSSC 2008), pp. 154-167.
    C. Kollmitzer, O. Maurhart, S. Rass, S. Schauer:
    Application Framework for High Security Requirements in R&D Environments Based on Quantum Cryptography.
    In: IEEE (Hrsg.): Proceedings of the Third Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008).
    P. Schartner, M. Schaffer:
    Protecting Privacy in Medical Databases.
    HEALTHINF 2008 - International Conference on Health Informatics, January 28-31 2008, Funchal, Madeira.
    M. Schaffer, S. Rass:
    Secure Collision-Free Distributed Key Generation For Discrete-Logarithm-Based Threshold Cryptosystems.
    In: G. Dorfer, G. Eigenthaler, H. Kautschitsch, W. More, W. B. Müller, Contributions to General Algebra 18 - Proceedings of the Klagenfurt Workshop 2007 on General Algebra Verlag Heyn GmbH & Co KG, Klagenfurt, 2008.
    S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya:
    A Model for Ontology-Based Scene Description for Context-Aware Driver Assistance Systems.
    In: ICST. (Hrsg.): 1st International Conference on Ambient Media and System. Quebec City (CA): ACM, 11. Februar 2008, pp. 1-8.
    S. Rass, M. Ali Sfaxi, S. Ghernaouti-Hélie, K. Kyamakya:
    Secure Message Relay over Networks with QKD-Links.
    In: IEEE. (Hrsg.): Proceedings of the Second International Conference on Quantum-, Nano and Micro-technologies ICQNM 2008. Los Alamitos (CA): IEEE, 15. Februar 2008, pp. 10-15.
    B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya:
    Fusion of an Uncalibrated Camera with Velocity Information for Distance Measurement from a Moving Camera on Highways.
    In: T. Kaiser, K. Jobmann, K. Kyamakya. (Hrsg.): Proceeding of the 5th workshop on positioning, navigation and communication 2008 (WPNC´08). Piscataway (NJ): IEEE, 27. März 2008, pp. 165-172.
    S. Fuchs, S. Rass, K. Kyamakya:
    Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems.
    In: R. Rouvoy, M. Caporuscio, M. Wagner.(Hrsg.): Proceedings 1st International Workshop on Context-aware Adaptation Mechanisms for Pervasive and Ubiquitous Services (CAMPUS'08). Oslo: University of Oslo, 3. Juni 2008 (Technical Report No. 374), pp. 5-16.
    F. Kollmann:
    Electronic Subscriptions and Related Applications.
    Dissertation (English), University of Klagenfurt, Austria, July 2008 (234 pages).
    S. Fuchs, S. Rass, K. Kyamakya:
    A Constraint-Based and Context-Aware Overtaking Assistant with Fuzzy-Probabilistic Risk Classification.
    In: J. Roth. (Hrsg.): Proceedings IADIS International Conference Wireless Applications and Computing 2008. Lisbon: International Association for Development of the Information Society (IADIS), 24. Juli 2008, pp. 93-100.
    S. Fuchs, S. Rass, K. Kyamakya:
    A context-aware overtaking assistance system with fuzzy-probabilistic risk classification.
    In: Lakeside Science and Technology Park. (Hrsg.): Proceedings of the Lakeside Conference in Safety in Mobility 2008. Klagenfurt: Lakeside Science & Technology Park GmbH , 10.Juli 2008, on CD.
    S. Fuchs, S. Rass, K. Kyamakya:
    Constraint-based Context-Rule Representation and Risk Classification for Driver Assistance Systems.
    In: Meier, R.; Ekici, E. (Hrsg.): Proceedings First Annual International Symposium on Vehicular Computing Systems. Brussels: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), 22. Juli 2008, on CD.
    S. Rass, S. Fuchs, K. Kyamakya:
    Towards a Game-Theoretic Model of Co-Operative Context-Aware Driving under Random Influences.
    In: IEEE. (Hrsg.): Proceedings of the International Conference on Vehicular Electronics and Safety (ICVES) 2008. Columbus (OH): IEEE, 18. Juli 2008, pp. 22-26.
    S. Rass, S. Fuchs, M. Schaffer, K. Kyamakya:
    How to Protect Privacy in Floating Car Data Systems.
    In: ACM. (Hrsg.): Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET) 2008-10-07. San Francisco (CA): ACM, 18. Juli 2008, 17-22.
    P. Schartner, M. Schaffer:
    Efficient Privacy-Enhancing Techniques for Medical Databases.
    In A. Fred, J. Filipe, H. Gamboa and J. Cardoso (Edts.): Best papers of Biomedical Engineering Systems and Technologies 2008, Communications in Computer and Information Science (CCIS) Series, Vol. 25, Springer, 2008.
    P. Horster, P. Schartner:
    5. Österreichischer IT-Sicherheitstag.
    Klagenfurt, 5. November 2008.
    2007
    P. Horster, P. Schartner:
    Szenarien, die die Welt verändern.
    Workshop "Gesellschaft & Information", Klagenfurt, 12.-13. Jänner 2007.
    P. Schartner:
    RFID - Security & Privacy.
    "IRIS 2007 - Internationales Rechtsinformatik Symposion", University of Salzburg, February 23, 2007.
    M. Schaffer, P. Schartner, S. Rass:
    Efficient Generation of Unique Numbers for Secure Applications.
    Technical Report TR-syssec-07-01, University of Klagenfurt (Austria), January 2007.
    F. Kollmann, M. Schaffer, P. Schartner:
    Kurseinheit ITS7: Praktikum IT-Sicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (2nd edition, 50 pages), Fachhochschule Trier, 2004.
    F. Kollmann:
    Realizing fine-garined Read and Write Rights on Tree Structured Documents.
    Second International Conference on Availability, Reliability and Security (ARES), Vienna (Austria), published by IEEE Computer Society, April 2007.
    D. Hattenberger, P. Horster, P. Schartner:
    Datensammeln – technische Möglichkeiten, rechtliche Grenzen.
    D·A·CH Security 2007, Universität Klagenfurt, 12.-13. Juni 2007.
    F. Kollmann:
    Abonnements für elektronische Zeitungen mit statischer Baumstruktur.
    DACH Security 2007 Conference, Editor: P. Horster, Klagenfurt (Austria), June 2007.
    M. Schaffer, P. Schartner, S. Rass:
    Universally Unique Identifiers: How to ensure Uniqueness while protecting the Issuer's Privacy.
    In: H. R. Arabnia. (Hrsg.): Proceedings of the 2007 International Conference on Security and Management. Las Vegas (NV): CSREA Press, Juni 2007, pp.198-204.

    M. Schaffer, P. Schartner:
    Implementing Collision-Free Number Generators on JavaCards.
    Technical Report TR-syssec-07-02, University of Klagenfurt (Austria), July 2007.
    S. Fuchs, S. Rass, B. Lamprecht, K. Kyamakya:
    Context-Awareness and Collaborative Driving for Intelligent Vehicles and Smart Roads.
    In: S. H. Chaudry. (Hrsg.): 1st International Workshop on ITS for an Ubiquitous ROADS. Piscataway (NJ): IEEE, 6. Juli 2007, pp. 1-6, CD.
    M. Schaffer, P. Schartner, S. Rass:
    Untraceable Network Devices.
    Klagenfurt: syssec, Juli 2007 (Technical Reports, TR-syssec-06-04), 9 pp.
    M. Schaffer:
    Collision-Free Number Generation: Efficient Constructions, Privacy Issues, and Cryptographic Aspects.
    Dissertation Thesis (English), University of Klagenfurt, Austria, August 2007 (226 pages)
    M. Schaffer, S. Rass:
    The Fusion Discrete Logarithm Problem Family.
    Technical Report TR-syssec-07-03, University of Klagenfurt (Austria), August 2007.
    F. Kollmann:
    Anonymous Subscription Models for Digital Content Distribution.
    Technical Report TR-syssec-07-04, University of Klagenfurt (Austria), Sep. 2007
    B. Lamprecht, S. Rass, S. Fuchs, K. Kyamakya:
    Extrinsic Camera Calibration for an On-board Two- Camera System without overlapping Field of View.
    In: D. J. Dailey. (Hrsg.): Proceedings of the 2007 IEEE Intelligent Transportation Systems. Los Alamitos (CA): IEEE, 3. Oktober 2007, pp. 265-270.
    P. Horster, P. Schartner:
    4. Österreichischer IT-Sicherheitstag.
    Klagenfurt, 7. November 2007.
    F. Kollmann:
    A Flexible Subscription Model for Broadcasted Digital Contents.
    International Conference on Computational Intelligence and Security (CIS2007) , Harbin (China), published by IEEE Computer Society, Dec 2007
    2006
    S. Rass:
    Efficient Key Exchange with tight Bounds on Eavesdropping Success Probability.
    Report TR-syssec-06-01, University of Klagenfurt, Austria, January 2006.
    P. Horster, P. Schartner:
    Kurseinheit ITS3: Angewandte Kryptologie.
    Fernstudium Informatik - Lehreinheit Informationssicherheit, Fachhochschule Trier (121 pages), 2006.
    G. Friedrich, S. Rass, K. Shchekotykhin:
    A general method for diagnosing axioms.
    In: C.A. Gonzalez, T. Escobet, B. Pulido. (Hrsg.): DX'06 - 17th International Workshop on Principles of Diagnosis. Penaranda de Duero, Burgos, Spain: -, 2006, pp. 101-108.
    S. Rass:
    A Method of Authentication for Quantum Networks.
    In: ICCS. (Hrsg.): Proceedings of the International Conference on Computer Science (ICCS 2006). Vienna, Austria: ICCS, 2006, 6 p.
    S. Rass, M. Ali Sfaxi, S. Ghernaouti-Hélie:
    Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.
    In: INSTICC Press. (Hrsg.): SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography. Setúbal: INSTICC Press, 2006, 4.
    [Online] http://www.scitepress.org/PublicationsDetail.aspx?ID=qp8g2n10SNQ%3d&t=1

    S. Rass, K. Kyamakya:
    Artificial Intelligence Techniques in Traffic Control.
    Journal der Österreichischen Gesellschaft für Artificial Intelligence. In: Journal der Österreichischen Gesellschaft für Artificial Intelligence, Wien: Österreichische Gesellschaft für Artificial Intelligence (ÖGAI), Vol. 25 (2006), No. 3, 7 p.
    F. Kollmann:
    Key-Management für partielle Verschlüsselung von XML-Dokumenten.
    DACH Security 2006 Conference, Editor: P. Horster, pp. 54-61, Düsseldorf (Germany).
    S. Rass, M. Schaffer, P. Schartner:
    Shared Generation of System-wide Unique Keys for Discrete-Log Based Cryptosystems.
    Klagenfurt: syssec, 10. März 2006 (Technical Reports, TR-syssec-06-02), 22.
    M. Schaffer, P. Schartner:
    Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability.
    Seventh Smart Card Research and Advanced Application IFIP Conference (CARDIS'06), p.206-221. LNCS 3928, Springer, 2006.

    S. Rass, M. Schaffer:
    Cryptographic Applications of Quadratic Imaginary Fields.
    Technical Report TR-syssec-06-03, University of Klagenfurt (Austria), June 2006.
    S. Rass, M. Schaffer, P. Schartner:
    Anonymes digitales Spielen im Casino.
    D·A·CH Mobility 2006, p. 313-328, IT-Verlag, 2006.
    P. Schartner, M. Schaffer:
    Vertrauenswürdige Fotografie & Bildbearbeitung.
    D·A·CH Mobility 2006, p.99-109, IT-Verlag, 2006.
    F. Kollmann:
    Overview on XML-Security.
    Technical Report TR-syssec-06-05, University of Klagenfurt (Austria), Oct. 2006
    F. Kollmann:
    Forcing Rights on Tree Structured Documents.
    Technical Report TR-syssec-06-06, University of Klagenfurt (Austria), Oct 2006
    P. Horster, P. Schartner:
    3. Österreichischer IT-Sicherheitstag.
    Wien, 8. November 2006.
    F. Kollmann:
    A MAC-based Key Derivation Concept for Encrypting XML Contents.
    Technical Report TR-syssec-06-07, University of Klagenfurt (Austria), Nov. 2006
    F. Kollmann:
    Issues on RSA-based Key Derivation.
    Technical Report TR-syssec-06-08, University of Klagenfurt (Austria), Nov. 2006.
    2005
    P. Horster, F. Kollmann, M. Schaffer, P. Schartner:
    Kurseinheit ITS1: Systemsicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (108 pages), Fachhochschule Trier, 2005.
    P. Schartner, M. Schaffer, F. Kollmann:
    Vertrauliche Videoüberwachung mit geeigneter Zugriffsstruktur.
    D·A·CH Security 2005, p.264-278, IT-Verlag, 2005.
    S. Rass:
    On Information-theoretically Secure Authentication in Quantum Networks.
    Technical Report TR-syssec-05-07, University of Klagenfurt, Austria, October 2005.
    E. Hanschitz, J. Leitner, B. Marktl, J. Michael, I. Preiml, P. Horster, P. Schartner:
    go2algo - Das Algorithmen-Visualisierungstool.
    in Proceedings "Informatics in Secondary Schools: Evolution and Perspectives - Innovative Concepts for Teaching Informatics", Klagenfurt, March 30 - April 1, 2005.
    P. Schartner:
    Security und Privacy in RFID-Systemen.
    in Computerwelt No. 22, May 27, 2005
    M. Schaffer:
    Tree-shared Generation of a Secret Value.
    Technical Report TR-syssec-05-01, University of Klagenfurt (Austria), June 2005.
    M. Schaffer, P. Schartner:
    Hierarchical Key Escrow with Passive Adversaries.
    Technical Report TR-syssec-05-02, University of Klagenfurt (Austria), June 2005.
    M. Schaffer:
    Hierarchical Key Escrow with Active Adversaries.
    Technical Report TR-syssec-05-03, University of Klagenfurt (Austria), July 2005.
    M. Schaffer:
    Manging Key-shares in Distributed Public Key Cryptosystems.
    Technical Report TR-syssec-05-04, University of Klagenfurt (Austria), August 2005.
    M. Schaffer, P. Schartner:
    Video Surveillance: A Distributed Approach to protect Privacy.
    Communications and Multimedia Security (CMS'05), p.140-149, LNCS 3677, Springer, 2005.

    P. Schartner, M. Schaffer:
    Unique User-generated Digital Pseudonyms.
    Third International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS'05), p.194-205, LNCS 3685, Springer, 2005.

    M. Schaffer, P. Schartner:
    Key Escrow with Tree-based Access Structure.
    Third International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS'05), p.454-459, LNCS 3685, Springer, 2005.
    M. Schaffer:
    Threshold Cryptosystems (Abstract).
    16. Internationaler Kongress der Österreichischen Mathematischen Gesellschaft, Klagenfurt, Austria, September 2005.
    S. Rass:
    How to Send Messages over Quantum Networks in an Unconditionally Secure Manner.
    University of Klagenfurt, September 2005 (Technical Report, TR-syssec-05-05), 13.
    P. Horster, P. Schartner:
    2. Österreichischer IT-Sicherheitstag.
    Graz, 9. November 2005.
    F. Kollmann:
    Secure Management of Structured Documents.
    IPSI 2005, 10th-13th Nov 2005, ISBN: 86-7466-117-3, Venice (Italy)., Nov 2005
    P. Schartner, M. Schaffer:
    Non-interactive local Generation of globally unique Quasi-Random Numbers.
    Technical Report TR-syssec-05-06, University of Klagenfurt (Austria), June 2005.
    2004
    F. Kollmann, M. Schaffer:
    Sicherheitsaspekte elektronischer Geschäftsprozesse.
    Elektronische Geschäftsprozesse 2004, p.158-175, IT-Verlag, 2004.
    F. Kollmann, M. Schaffer, P. Schartner:
    Kurseinheit ITS7: Praktikum IT-Sicherheit.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (47 pages), Fachhochschule Trier, 2004.
    P. Schartner:
    Kurseinheit IS5: Chipkarten und Anwendungen.
    Fernstudium Informatik - Lehreinheit Informationssicherheit (106 pages), Fachhochschule Trier, 2004.
    M. Schaffer:
    Kryptographische Mehr-Parteien-Protokolle.
    Master Thesis (German), University of Klagenfurt, Austria, January 2004 (150 pages).
    P. Horster, P. Schartner:
    Österreichischer IT-Sicherheitstag.
    Klagenfurt, 22. September 2004.
    2003
    P. Schartner:
    PDAs und Chipkarten - Synergieeffekte.
    (German), SIT SmartCard - Workshop, Darmstadt, February 4-5,2003.
    F. Kollmann:
    Digitales Signieren am PDA.
    Master Thesis (German), University of Klagenfurt, Austria, June 2003.
    F. Kollmann, P. Schartner:
    PDA-based Signature Device.
    (German), BIOSIG 2003, Darmstadt, July 24. 2003.
    2002
    P. Schartner:
    Technischer Hintergrund des Internetbanking.
    in Otto Lucius (Edt.): "Internetbanking" (German), BWSR Band 92, pp. 220, 2002.
    S. Janisch, P. Schartner:
    Internetbanking - Sicherheitsaspekte und Haftungsfragen.
    (German), in "Datenschutz und Datensicherheit - DuD", pp. 162, 03/2002
    P. Horster, P. Schartner:
    e-Business-Workshop - Managing IT-Security.
    Klagenfurt, May 2002.
    P. Schartner:
    Chipkarten - Technologie, Bedrohung und Anwendung.
    (German), eBusiness-Workshop - Managing IT-Security, Klagenfurt, May 23-24, 2002.
    P. Schartner:
    Mobile (Un)Sicherheit.
    (German), IT-Security 2002, Munich, June 3-4, 2002.
    2001
    P. Horster, M. Schaffer, D. Sommer, P. Schartner:
    Secure Internet Phone.
    Communications and Multimedia Security (CMS'01), p.313-324, Kluwer Acedemic Publishers, 2001.

    P. Horster, M. Schaffer, P. Schartner, D. Sommer:
    Sicheres Telefonsystem für das Internet - Entwurf und Implementierung.
    Kommunikationssicherheit – Schwerpunkt Internet, p.388-412, IT-Verlag, 2001.
    P. Schartner:
    Token-based Security Infrastructrues - Selected Techniques and Applications.
    Dissertation, University of Klagenfurt System Security Group, May 2001.
    P. Schartner:
    Security Tokens - Basics, Applications, Management and Infrastructures.
    IT-Verlag, 243 pages, September 2001.
    S. Janisch, P. Schartner:
    Internetbanking und Drittmissbrauch - Eine technische und rechtliche Analyse.
    (German), "Electronic Business Processes 2001", Klagenfurt, September 2001
    2000
    P. Schartner, P. Horster:
    Authentifikation in schwach vernetzten Systemen.
    (German), in Conference proceedings "Systemsicherheit", Bremen, 28.-29. March 2000.
    P. Schartner, P. Horster:
    Block Cipher Modes for non-standard Applications.
    in Conference Proceedings "IFIP/SEC 2000: Information Security - Information Security for Global information Infrastructures", Beijing, August 21-25, 2000.
    1999
    P. Horster, P. Schartner:
    Bemerkungen zur dublettenfreien Schlüsselgenerierung.
    (German), in Conference Proceedings "Sicherheitsinfrastrukturen", Hamburg, March 9-10, 1999.
    1998
    P. Horster, P. Schartner, P. Wohlmacher:
    Special Aspects of Key Generation.
    in Conference proceedings "Information Technologies in Science, Engineering, Education, Health Service", Kharkov, 20.-23. May 1998.
    P. Horster, P. Schartner, P. Wohlmacher:
    Key-Management.
    SEC'98, XV. IFIP World Computer Congress '98, 14th International Information Security Conference, Wien - Budapest, 31. August - 4. September 1998.
    1997
    P. Schartner:
    Secure Desktop Conferencing System - The Client.
    (German), Master Thesis, TU-Graz IAIK, January 1997.