Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

Filter
Book
2018

Handbook of Model Checking

Clarke, E. M. (ed.), Henzinger, T. A., Veith, H. & Bloem, R. (ed.), 2018, Cham: Springer. 1210 p.

Research output: Book/ReportBookResearchpeer-review

2017

Privacy Technologies and Policy

Schweighofer, E. (ed.), Leitold, H. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2017, Graz: Springer Verlag.

Research output: Book/ReportBookResearchpeer-review

Open Access
2016

GDPR & ePrivacy: APF 2017, Pre-Proceedings of the 5th ENISA Annual Privacy Forum

Austria, A-SIT. Z. F. S. I. (ed.), Schweighofer, E. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2016, Graz: Österreichische Computergesellschaft. 257 p.

Research output: Book/ReportBookResearchpeer-review

2015

Decidability of Parameterized Verification

Khalimov, A., Bloem, R., Veith, H., Widder, J., Konnov, I., Rubin, S. & Jacobs, S., 2015, 1 ed. .

Research output: Book/ReportBookResearch

2013

Cryptography for Security and Privacy in Cloud Computing

Rass, S. & Slamanig, D., 2013, 1 ed. Artech House Publishers. (Information Security and Privacy)

Research output: Book/ReportBookResearch

Technology-Enabled Innovation for Democracy, Government and Governance

Austria, A-SIT. Z. F. S. I. (ed.), Kö, A. (ed.), Leitner, C. (ed.) & Prosser, A. (ed.), 2013, 1 ed. Graz: Springer. (LNCS)

Research output: Book/ReportBookResearchpeer-review

2012

Advancing Democracy, Government and Governance

Kö, A. (ed.), Leitner, C. (ed.), Leitold, H. (ed.) & Prosser, A. (ed.), 2012, 1 ed. Graz: Springer. (LNCS)

Research output: Book/ReportBookResearchpeer-review

2009

Enhancing cryptographic primitives with techniques from error correcting codes

Dodunekov, S. (ed.), Nikova, S. (ed.), Preneel, B. (ed.) & Rijmen, V. (ed.), 2009, 1 ed. Amsterdam: IOS Press. (NATO Science for Peace and Security Series, Sub-series D: Information and Communication Security)

Research output: Book/ReportBookResearch

Selected Areas in Cryptography (SAC 2009)

Rijmen, V. (ed.), 2009, 1 ed. Springer. (Lecture Notes in Computer Science)

Research output: Book/ReportBookResearch

2008

Cryptographic Hardware and Embedded Systems - CHES 2008

Oswald, M. E. (ed.) & Rohatgi, P. (ed.), 2008, 1 ed. Berlin / Heidelberg: Springer. (Lecture Notes in Computer Science - LNCS)

Research output: Book/ReportBookResearch

Proceedings of the International Conference on RFID Security 2007

Munilla, J. (ed.), Peinado, A. (ed.) & Rijmen, V. (ed.), 2008, 1 ed. Malaga: Peinado.

Research output: Book/ReportBookResearch

Progress in Cryptology - INDOCRYPT 2008

Roy Chowdhury, D. (ed.), Rijmen, V. (ed.) & Das, A. (ed.), 2008, 1 ed. Berlin / Heidelberg: Springer. (Lecture Notes in Computer Science - LNCS)

Research output: Book/ReportBookResearch

Trusted Computing - Challenges and Applications

Lipp, P. (ed.), Sadeghi, A-R. (ed.) & Koch, K-M. (ed.), 2008, 1 ed. Heidelberg: Springer. (Lecture Notes in Computer Science)

Research output: Book/ReportBookResearch

2007

Power Analysis Attacks - Revealing the Secrets of Smart Cards

Mangard, S., Oswald, M. E. & Popp, T., 2007, 1 ed. New York, NY: Springer.

Research output: Book/ReportBookResearch

2006

Communications and Multimedia Security

Austria, A-SIT. Z. F. S. I. (ed.) & Markatos, E. (ed.), 2006, 1 ed. Graz: Springer Berlin - Heidelberg. (LNCS)

Research output: Book/ReportBookResearch

2005

Advanced Encryption Standard - AES4

Rijmen, V. (ed.), 2005, Berlin: Springer. (Lecture Notes in Computer Science)

Research output: Book/ReportBookResearch

2003

Rechnerorganisation: Von Funktion zu Struktur

Posch, K-C., 2003, Graz: Eigenverlag.

Research output: Book/ReportBookResearch

2000

Sicherheit und Kryptografie in Java

Lipp, P., Bratko, D., Farmer, J., Sterbenz, A. & Platzer, W., 2000, München: Addison-Wesley. (Professionelle Programmierung)

Research output: Book/ReportBookResearch