Sichere Informationssysteme

Filter
Konferenzbeitrag

Suchergebnisse

  • 2023

    Efficient Implementation of LIMDDs for Quantum Circuit Simulation

    Vinkhuijzen, L., Grurl, T., Hillmich, S., Brand, S., Wille, R. & Laarman, A., 2023, Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings. Caltais, G. & Schilling, C. (Hrsg.). Springer, S. 3-21 19 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 13872 LNCS).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    3 Zitate (Scopus)
  • Optimized Density Matrix Representations: Improving the Basis for Noise-Aware Quantum Circuit Design Tools

    Grurl, T., Fuß, J. & Wille, R., 2023, Proceedings - 2023 IEEE 53rd International Symposium on Multiple-Valued Logic, ISMVL 2023. IEEE Computer Society, S. 141-146 6 S. (Proceedings of The International Symposium on Multiple-Valued Logic; Band 2023-May).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

  • Real-Time Geo-Localization of Unexploded Ordnance

    Lampesberger, H. & Hermann, E., 2023, 19th International Symposium Mine Action 2023. HCR-CTRO d.o.o., S. 36-39

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    Open Access
  • 2022

    The Basis of Design Tools for Quantum Computing: Arrays, Decision Diagrams, Tensor Networks, and ZX-Calculus

    Wille, R., Burgholzer, L., Hillmich, S., Grurl, T., Ploier, A. & Peham, T., 2022, DAC '22: Proceedings of the 59th ACM/IEEE Design Automation Conference.

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

  • 2021

    A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering

    Leierzopf, E., Kopal, N., Esslinger, B., Lampesberger, H. & Hermann, E., Aug. 2021, Proceedings of the 4th International Conference on Historical Cryptology: HistoCrypt 2021. S. 111-120 10 S.

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    Open Access
  • Detection of Classical Cipher Types with Feature-Learning Approaches

    Leierzopf, E., Mikhalev, V., Kopal, N., Esslinger, B., Lampesberger, H. & Hermann, E., 2021, Data Mining - 19th Australasian Conference on Data Mining, AusDM, 2021, Proceedings: AusDM 2021. Xu, Y., Wang, R., Lord, A., Boo, Y. L., Nayak, R., Zhao, Y. & Williams, G. (Hrsg.). 1504 Aufl. Springer, Band Communications in Computer and Information Science. S. 152-164 13 S. (Communications in Computer and Information Science; Band 1504 CCIS).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    9 Zitate (Scopus)
  • 2020

    Arrays vs. Decision Diagrams: A Case Study on Quantum Circuit Simulators

    Grurl, T., Fus, J., Hillmich, S., Burgholzer, L. & Wille, R., Nov. 2020, Proceedings - 2020 IEEE 50th International Symposium on Multiple-Valued Logic, ISMVL 2020. IEEE Computer Society, S. 176-181 6 S. 9308161. (Proceedings of The International Symposium on Multiple-Valued Logic; Band 2020-November).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    15 Zitate (Scopus)
  • Considering Decoherence Errors in the Simulation of Quantum Circuits Using Decision Diagrams

    Grurl, T., Fuss, J. & Wille, R., 2 Nov. 2020, Proceedings of the 39th International Conference on Computer-Aided Design. New York: Association for Computing Machinery, Band 2020 Proceeding. (IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    13 Zitate (Scopus)
  • 2019

    Awareness of Privacy and Intellectual Property Rights under the Economic Partnership Agreement between EU and Japan

    Burgstaller, P., Okt. 2019, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923131. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    Open Access
    2 Zitate (Scopus)
  • Beweiskraft von Bilddaten in Anbetracht der Manipulierbarkeit durch Verfahren der künstlichen Intelligenz

    Burgstaller, P., Hermann, E. & Lampesberger, H., 2019, Coming Soon - Tagungsband - 2019. Trauner Verlag Linz, S. 221-225

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag

  • 2016

    An Incremental Learner for Language-Based Anomaly Detection in XML

    Lampesberger, H., 1 Aug. 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., S. 156-170 15 S. 7527765. (Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    1 Zitat (Scopus)
  • 2015

    Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA

    Fuß, J., Gradinger, S., Greslehner-Nimmervoll, B. & Kolmhofer, R., 16 Okt. 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. IEEE, S. 274-280 7 S. 7299926. (Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    2 Zitate (Scopus)
  • 2014

    Effizienteres Bruteforcing auf einem heterogenen Cluster mit GPUs und FPGAs

    Fuß, J., Hahn, W. A., Greslehner-Nimmervoll, B. & Kolmhofer, R., 2014, Sicherheit 2014 - Sicherheit, Schutz und Zuverlassigkeit: Beitrage der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI), Proceedings. Katzenbeisser, S., Lotz, V. & Weippl, E. (Hrsg.). Gesellschaft fur Informatik (GI), S. 127-136 10 S. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); Band P-228).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

  • Protection Profile for PUF-based Devices

    Kolberger, A., Schaumüller-Bichl, I., Brunner, V. & Deutschmann, M., 2014, ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Proceedings. Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Kalam, A. A. E. & Sans, T. (Hrsg.). Springer, S. 91-98 8 S. (IFIP Advances in Information and Communication Technology; Band 428).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag

    Open Access
    3 Zitate (Scopus)
  • Riskanalysis of Physically Unclonable Functions

    Kolberger, A., Schaumüller-Bichl, I. & Deutschmann, M., 2014, Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Proceedings. Springer, S. 136-139 4 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8735 LNCS).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag

    Open Access
  • 2013

    A grammatical inference approach to language-based anomaly detection in XML

    Lampesberger, H., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society Press, S. 685-693 9 S. 6657306. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    3 Zitate (Scopus)
  • Cuteforce analyzer: A distributed bruteforce attack on PDF encryption with GPUs and FPGAs

    Danczul, B., Fuß, J., Gradinger, S., Greslehner-Nimmervoll, B., Hahn, W. A. & Wex, F., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society’s Conference Publishing Services, S. 720-725 6 S. 6657310. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    8 Zitate (Scopus)
  • ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship

    Fuß, J., Winter, P. & Pulls, T., 2013, WPES 2013 - Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society, Co-located with CCS 2013. S. 213-224 12 S. (Proceedings of the ACM Conference on Computer and Communications Security).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    50 Zitate (Scopus)
  • The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems

    Hermann, E. & Grimm, R., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society Press, S. 208-217 10 S. 6657242. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

  • 2012

    An on-line learning statistical model to detect malicious web requests

    Lampesberger, H., Winter, P., Zeilinger, M. & Hermann, E., 2012, Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, Revised Selected Papers. 96 Aufl. Band 96. S. 19-38 20 S. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Band 96 LNICST).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    7 Zitate (Scopus)
  • Cuteforce analyzer: Implementing a heterogeneous bruteforce cluster with specialized coprocessors

    Fuß, J., Hahn, W. A., Kolmhofer, R., Schönberger, G. & Wex, F., 2012, Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Proceedings. 1234567890 Aufl. Band 7394. S. 201-203 3 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 7394 LNCS).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    Open Access
  • Prototypische Implementierung des Limes-Sicherheitsmodells

    Hermann, E. & Meinhart, C., 2012, Tagungsband des 6. Forschungsforums der österreichischen Fachhochschulen.

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag

  • 2011

    GPU-assisted AES encryption using GCM

    Schönberger, G. & Fuß, J., 2011, Communications and Multimedia Security - 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Proceedings. S. 178-185 8 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 7025 LNCS).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    Open Access
    7 Zitate (Scopus)
  • Inductive intrusion detection in flow-based network data using One-Class Support Vector Machines

    Winter, P., Hermann, E. & Zeilinger, M., 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings. IEEE, 5720582. (2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    82 Zitate (Scopus)
  • On detecting abrupt changes in network entropy time series

    Winter, P., Lampesberger, H., Zeilinger, M. & Hermann, E., 2011, Communications and Multimedia Security - 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Proceedings. 7025 Aufl. Band 7025. S. 194-205 12 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 7025 LNCS).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    Open Access
    17 Zitate (Scopus)
  • Rihamark: Perceptual image hash benchmarking

    Steinebach, M., Zauner, C. & Hermann, E., 2011, Proceedings of SPIE-IS and T Electronic Imaging - Media Watermarking, Security, and Forensics III. SPIE Press, 78800X. (Proceedings of SPIE - The International Society for Optical Engineering; Band 7880).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    38 Zitate (Scopus)
  • The Limes Security Model for Information Flow Control

    Hermann, E., 2011, Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011. IEEE Computer Society Press, S. 573-580 8 S. 6045979. (Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

    3 Zitate (Scopus)
  • 2010

    Empirical Evaluation of the Internet Analysis System for Application in the Field of Anomaly Detection

    Lampesberger, H., 2010, Proceedings - European Conference on Computer Network Defense, EC2ND 2010. IEEE Computer Society Press, S. 63-70 8 S. 5663318. (Proceedings - European Conference on Computer Network Defense, EC2ND 2010).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag

  • 2007

    Trusted Infrastructures for Identities

    Fichtinger, B., Hermann, E., Kuntze, N. & Schmidt, A. U., 2007, 5th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods incorporating the 3rd International ODRL Workshop. Nova Science Publishers, Inc., S. 169-181

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

  • 2006

    Implementing Zero-Knowledge Authentication in OpenSSH

    Gaupmann, A., Schausberger, C., Zehl, U. & Fuß, J., 2006, Sicherheit 2006. Band P-77. S. 302-305 4 S. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)).

    Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitrag