Security for the robot operating system B Dieber, B Breiling, S Taurer, S Kacianka, S Rass, P Schartner Robotics and Autonomous Systems 98, 192-203, 2017 | 185 | 2017 |
Application-level security for ROS-based applications B Dieber, S Kacianka, S Rass, P Schartner 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems …, 2016 | 117 | 2016 |
Secure communication for the robot operating system B Breiling, B Dieber, P Schartner 2017 annual IEEE international systems conference (SysCon), 1-6, 2017 | 112 | 2017 |
Unique user-generated digital pseudonyms P Schartner, M Schaffer International Workshop on Mathematical Methods, Models, and Architectures …, 2005 | 42 | 2005 |
Secure online exams using students' devices G Frankl, P Schartner, G Zebedin Proceedings of the 2012 IEEE Global Engineering Education Conference (EDUCON …, 2012 | 26 | 2012 |
A unified framework for the analysis of availability, reliability and security, with applications to quantum networks S Rass, P Schartner IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2010 | 24 | 2010 |
On the security of a universal cryptocomputer: the chosen instruction attack S Rass, P Schartner IEEE Access 4, 7874-7882, 2016 | 20 | 2016 |
Multipath Authentication without shared Secrets and with Applications in Quantum Networks. S Rass, P Schartner Security and Management, 111-115, 2010 | 18 | 2010 |
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender-and Receiver-Anonymity. S Rass, R Wigoutschnigg, P Schartner J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (4), 27-41, 2011 | 16 | 2011 |
Attacking mTAN-applications like e-banking and mobile signatures P Schartner, S Bürger University of Klagenfurt, 2011 | 15 | 2011 |
Building a quantum network: How to optimize security and expenses S Rass, A Wiegele, P Schartner Journal of Network and Systems Management 18, 283-299, 2010 | 15 | 2010 |
How to overcome the'Trusted Node Model'in Quantum Cryptography P Schartner, S Rass 2009 International conference on computational science and engineering 3 …, 2009 | 15 | 2009 |
Quantum key distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option P Schartner, S Rass 2010 International Computer Symposium (ICS2010), 131-136, 2010 | 14 | 2010 |
Video surveillance: A distributed approach to protect privacy M Schaffer, P Schartner IFIP International Conference on Communications and Multimedia Security, 140-149, 2005 | 13 | 2005 |
The “Secure Exam Environment”: e-testing with students’ own devices G Frankl, P Schartner, D Jost Tomorrow's Learning: Involving Everyone. Learning with and about …, 2017 | 12 | 2017 |
Information-leakage in hybrid randomized protocols S Rass, P Schartner Proceedings of the International Conference on Security and Cryptography …, 2011 | 12 | 2011 |
Game-theoretic security analysis of quantum networks S Rass, P Schartner 2009 Third International Conference on Quantum, Nano and Micro Technologies …, 2009 | 12 | 2009 |
Secure data recording and bio-inspired functional integrity for intelligent robots S Taurer, B Dieber, P Schartner 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems …, 2018 | 11 | 2018 |
Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. M Schaffer, P Schartner, S Rass Security and Management, 198-204, 2007 | 11 | 2007 |
Generic parity-based concurrent error detection for lightweight ARX ciphers S Bauer, S Rass, P Schartner IEEE Access 8, 142016-142025, 2020 | 10 | 2020 |