If you made any changes in Pure these will be visible here soon.

Personal profile

External positions

A-SIT Zentrum für sichere Informationstechnologie - Austria

1 Jan 2017 → …

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 7 Similar Profiles
Peer to peer networks Engineering & Materials Science
Smartphones Engineering & Materials Science
Communication Engineering & Materials Science
Program processors Engineering & Materials Science
Electronic money Engineering & Materials Science
Android (operating system) Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2018 2019

  • 4 Conference contribution

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Zefferer, T., Kollmann, C. P. & Teufl, P., 2019, (Accepted/In press) IEEE International Conference on Blockchain and Cryptocurrency. IEEE Xplore

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C., 28 Jul 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Vol. 1: SECRYPT. p. 380-387 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Smartphones
Program processors
Electronic money
Android (operating system)