Compact hardware implementations of the SHA-3 candidates ARIRANG, BLAKE, Grøstl, and Skein S Tillich, M Feldhofer, W Issovits, T Kern, H Kureck, M Mühlberghuber, ... IACR Cryptology ePrint Archive 2009, 349, 2009 | 75* | 2009 |
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases A Reiter, B Prünster, T Zefferer Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud …, 2017 | 48 | 2017 |
Compact hardware implementations of the SHA-3 candidates ARIRANG, BLAKE, Grøstl S Tillich, M Feldhofer, W Issovits, T Kern, H Kureck, M Mühlberghuber, ... and Skein. Cryptology ePrint Archive, Report 2009/349, 2009 | 45* | 2009 |
Factors influencing the adoption of and business case for Cloud computing in the public sector E Kuiper, F Van Dam, A Reiter, M Janssen eChallenges e-2014 Conference Proceedings, 1-10, 2014 | 27 | 2014 |
Secure Data Sharing and Processing in Heterogeneous Clouds B Suzic, A Reiter, F Reimair, D Venturi, B Kubo Procedia Computer Science 68, 116-126, 2015 | 25 | 2015 |
WebRTC: your privacy is at risk A Reiter, A Marsalek Proceedings of the Symposium on Applied Computing, 664-669, 2017 | 21 | 2017 |
Balancing Utility and Security: Securing Cloud Federations of Public Entities B Suzic, B Prünster, D Ziegler, A Marsalek, A Reiter OTM Confederated International Conferences" On the Move to Meaningful …, 2016 | 18 | 2016 |
Anonymous Communication in the Browser via Onion-Routing F Burgstaller, A Derler, S Kern, G Schanner, A Reiter 2015 10th International Conference on P2P, Parallel, Grid, Cloud and …, 2015 | 10 | 2015 |
Paving the Way for Security in Cloud-Based Mobile Augmentation Systems A Reiter, T Zefferer | 10 | 2015 |
Towards secure collaboration in federated cloud environments B Suzic, A Reiter Availability, Reliability and Security (ARES), 2016 11th International …, 2016 | 9 | 2016 |
POWER: A cloud-based mobile augmentation approach for web-and cross-platform applications A Reiter, T Zefferer Cloud Networking (CloudNet), 2015 IEEE 4th International Conference on, 226-231, 2015 | 9 | 2015 |
Flexible and Secure Resource Sharing for Mobile Augmentation Systems A Reiter, T Zefferer 2016 4th IEEE International Conference on Mobile Cloud Computing, Services …, 2016 | 5 | 2016 |
Cost-Effective Routing for a Greener Internet B Bergler, C Preschern, A Reiter, S Kraxberger Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and …, 2010 | 5 | 2010 |
Seamless integration of trusted computing into standard cryptographic frameworks A Reiter, G Neubauer, M Kapfenberger, J Winter, K Dietrich International Conference on Trusted Systems, 1-25, 2010 | 5 | 2010 |
Secure policy-based device-to-device offloading for mobile applications A Reiter Proceedings of the Symposium on Applied Computing, 516-521, 2017 | | 2017 |
Applied dynamic policy selection F Reimair, B Prünster, A Reiter, C Ertler Communications and Network Security (CNS), 2016 IEEE Conference on, 507-515, 2016 | | 2016 |
Enabling Secure Communication Over Existing Peer-to-Peer Frameworks A Reiter | | 2015 |