Secure Information Systems

Filter
Conference contribution

Search results

  • 2023

    Efficient Implementation of LIMDDs for Quantum Circuit Simulation

    Vinkhuijzen, L., Grurl, T., Hillmich, S., Brand, S., Wille, R. & Laarman, A., 2023, Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings. Caltais, G. & Schilling, C. (eds.). Springer, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13872 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

  • Optimized Density Matrix Representations: Improving the Basis for Noise-Aware Quantum Circuit Design Tools

    Grurl, T., Fuß, J. & Wille, R., 2023, Proceedings - 2023 IEEE 53rd International Symposium on Multiple-Valued Logic, ISMVL 2023. IEEE Computer Society, p. 141-146 6 p. (Proceedings of The International Symposium on Multiple-Valued Logic; vol. 2023-May).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

  • Real-Time Geo-Localization of Unexploded Ordnance

    Lampesberger, H. & Hermann, E., 2023, 19th International Symposium Mine Action 2023. HCR-CTRO d.o.o., p. 36-39

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    Open Access
  • 2022

    The Basis of Design Tools for Quantum Computing: Arrays, Decision Diagrams, Tensor Networks, and ZX-Calculus

    Wille, R., Burgholzer, L., Hillmich, S., Grurl, T., Ploier, A. & Peham, T., 2022, DAC '22: Proceedings of the 59th ACM/IEEE Design Automation Conference.

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

  • 2021

    A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering

    Leierzopf, E., Kopal, N., Esslinger, B., Lampesberger, H. & Hermann, E., Aug 2021, Proceedings of the 4th International Conference on Historical Cryptology: HistoCrypt 2021. p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    Open Access
  • Detection of Classical Cipher Types with Feature-Learning Approaches

    Leierzopf, E., Mikhalev, V., Kopal, N., Esslinger, B., Lampesberger, H. & Hermann, E., 2021, Data Mining - 19th Australasian Conference on Data Mining, AusDM, 2021, Proceedings: AusDM 2021. Xu, Y., Wang, R., Lord, A., Boo, Y. L., Nayak, R., Zhao, Y. & Williams, G. (eds.). 1504 ed. Springer, Vol. Communications in Computer and Information Science. p. 152-164 13 p. (Communications in Computer and Information Science; vol. 1504 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    5 Citations (Scopus)
  • 2020

    Arrays vs. Decision Diagrams: A Case Study on Quantum Circuit Simulators

    Grurl, T., Fus, J., Hillmich, S., Burgholzer, L. & Wille, R., Nov 2020, Proceedings - 2020 IEEE 50th International Symposium on Multiple-Valued Logic, ISMVL 2020. IEEE Computer Society, p. 176-181 6 p. 9308161. (Proceedings of The International Symposium on Multiple-Valued Logic; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    12 Citations (Scopus)
  • Considering Decoherence Errors in the Simulation of Quantum Circuits Using Decision Diagrams

    Grurl, T., Fuss, J. & Wille, R., 2 Nov 2020, Proceedings of the 39th International Conference on Computer-Aided Design. New York: Association for Computing Machinery, Vol. 2020 Proceeding. (IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    10 Citations (Scopus)
  • 2019

    Awareness of Privacy and Intellectual Property Rights under the Economic Partnership Agreement between EU and Japan

    Burgstaller, P., Oct 2019, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923131. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    Open Access
    2 Citations (Scopus)
  • Beweiskraft von Bilddaten in Anbetracht der Manipulierbarkeit durch Verfahren der künstlichen Intelligenz

    Translated title of the contribution: Beweiskraft von Bilddaten in Anbetracht der Manipulierbarkeit durch Verfahren der künstlichen IntelligenzBurgstaller, P., Hermann, E. & Lampesberger, H., 2019, Coming Soon - Tagungsband - 2019. Trauner Verlag Linz, p. 221-225

    Research output: Chapter in Book/Report/Conference proceedingsConference contribution

  • 2016

    An Incremental Learner for Language-Based Anomaly Detection in XML

    Lampesberger, H., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., p. 156-170 15 p. 7527765. (Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    1 Citation (Scopus)
  • 2015

    Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA

    Fuß, J., Gradinger, S., Greslehner-Nimmervoll, B. & Kolmhofer, R., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. IEEE, p. 274-280 7 p. 7299926. (Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    2 Citations (Scopus)
  • 2014

    Effizienteres Bruteforcing auf einem heterogenen Cluster mit GPUs und FPGAs

    Translated title of the contribution: Efficient brute forcing on a heterogeneous cluster with GPUs and FPGAsFuß, J., Hahn, W. A., Greslehner-Nimmervoll, B. & Kolmhofer, R., 2014, Sicherheit 2014 - Sicherheit, Schutz und Zuverlassigkeit: Beitrage der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI), Proceedings. Katzenbeisser, S., Lotz, V. & Weippl, E. (eds.). Gesellschaft fur Informatik (GI), p. 127-136 10 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-228).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

  • Protection Profile for PUF-based Devices

    Kolberger, A., Schaumüller-Bichl, I., Brunner, V. & Deutschmann, M., 2014, ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Proceedings. Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Kalam, A. A. E. & Sans, T. (eds.). Springer, p. 91-98 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

    Research output: Chapter in Book/Report/Conference proceedingsConference contribution

    Open Access
    3 Citations (Scopus)
  • Riskanalysis of Physically Unclonable Functions

    Kolberger, A., Schaumüller-Bichl, I. & Deutschmann, M., 2014, Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Proceedings. Springer, p. 136-139 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8735 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingsConference contribution

    Open Access
  • 2013

    A grammatical inference approach to language-based anomaly detection in XML

    Lampesberger, H., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society Press, p. 685-693 9 p. 6657306. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    3 Citations (Scopus)
  • Cuteforce analyzer: A distributed bruteforce attack on PDF encryption with GPUs and FPGAs

    Danczul, B., Fuß, J., Gradinger, S., Greslehner-Nimmervoll, B., Hahn, W. A. & Wex, F., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society’s Conference Publishing Services, p. 720-725 6 p. 6657310. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    9 Citations (Scopus)
  • ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship

    Fuß, J., Winter, P. & Pulls, T., 2013, WPES 2013 - Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society, Co-located with CCS 2013. p. 213-224 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    49 Citations (Scopus)
  • The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems

    Hermann, E. & Grimm, R., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society Press, p. 208-217 10 p. 6657242. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

  • 2012

    An on-line learning statistical model to detect malicious web requests

    Lampesberger, H., Winter, P., Zeilinger, M. & Hermann, E., 2012, Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, Revised Selected Papers. 96 ed. Vol. 96. p. 19-38 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 96 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    6 Citations (Scopus)
  • Cuteforce analyzer: Implementing a heterogeneous bruteforce cluster with specialized coprocessors

    Fuß, J., Hahn, W. A., Kolmhofer, R., Schönberger, G. & Wex, F., 2012, Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Proceedings. 1234567890 ed. Vol. 7394. p. 201-203 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    Open Access
  • Prototypische Implementierung des Limes-Sicherheitsmodells

    Translated title of the contribution: Prototyp Implementaion of the Limes Security ModelHermann, E. & Meinhart, C., 2012, Tagungsband des 6. Forschungsforums der österreichischen Fachhochschulen.

    Research output: Chapter in Book/Report/Conference proceedingsConference contribution

  • 2011

    GPU-assisted AES encryption using GCM

    Schönberger, G. & Fuß, J., 2011, Communications and Multimedia Security - 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Proceedings. p. 178-185 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7025 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    Open Access
    6 Citations (Scopus)
  • Inductive intrusion detection in flow-based network data using One-Class Support Vector Machines

    Winter, P., Hermann, E. & Zeilinger, M., 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings. IEEE, 5720582. (2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    82 Citations (Scopus)
  • On detecting abrupt changes in network entropy time series

    Winter, P., Lampesberger, H., Zeilinger, M. & Hermann, E., 2011, Communications and Multimedia Security - 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Proceedings. 7025 ed. Vol. 7025. p. 194-205 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7025 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    Open Access
    17 Citations (Scopus)
  • Rihamark: Perceptual image hash benchmarking

    Steinebach, M., Zauner, C. & Hermann, E., 2011, Proceedings of SPIE-IS and T Electronic Imaging - Media Watermarking, Security, and Forensics III. SPIE Press, 78800X. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 7880).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    38 Citations (Scopus)
  • The Limes Security Model for Information Flow Control

    Hermann, E., 2011, Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011. IEEE Computer Society Press, p. 573-580 8 p. 6045979. (Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011).

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

    3 Citations (Scopus)
  • 2010

    Empirical Evaluation of the Internet Analysis System for Application in the Field of Anomaly Detection

    Lampesberger, H., 2010, Proceedings - European Conference on Computer Network Defense, EC2ND 2010. IEEE Computer Society Press, p. 63-70 8 p. 5663318. (Proceedings - European Conference on Computer Network Defense, EC2ND 2010).

    Research output: Chapter in Book/Report/Conference proceedingsConference contribution

  • 2007

    Trusted Infrastructures for Identities

    Translated title of the contribution: Trusted Infrastructures for IdentitiesFichtinger, B., Hermann, E., Kuntze, N. & Schmidt, A. U., 2007, 5th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods incorporating the 3rd International ODRL Workshop. Nova Science Publishers, Inc., p. 169-181

    Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

  • 2006

    Implementing Zero-Knowledge Authentication in OpenSSH

    Gaupmann, A., Schausberger, C., Zehl, U. & Fuß, J., 2006, Sicherheit 2006. Vol. P-77. p. 302-305 4 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)).

    Research output: Chapter in Book/Report/Conference proceedingsConference contribution