Peter Kieseberg
Peter Kieseberg
SBA Research & UAS St. Pölten
Verified email at fhstp.ac.at - Homepage
TitleCited byYear
QR code security
P Kieseberg, M Leithner, M Mulazzani, L Munroe, S Schrittwieser, ...
Proceedings of the 8th International Conference on Advances in Mobile …, 2010
1492010
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
S Schrittwieser, P Frühwirt, P Kieseberg, M Leithner, M Mulazzani, ...
NDSS, 2012
1062012
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
382014
Innodb database forensics: Reconstructing data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
332012
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, ER Weippl
Int. J. Communication Networks and Distributed Systems 1 (3/4), 1, 2012
272012
The right to be forgotten: towards machine learning on perturbed knowledge bases
B Malle, P Kieseberg, E Weippl, A Holzinger
International Conference on Availability, Reliability, and Security, 251-266, 2016
222016
Protecting anonymity in data-driven biomedical science
P Kieseberg, H Hobel, S Schrittwieser, E Weippl, A Holzinger
Interactive Knowledge Discovery and Data Mining in Biomedical Informatics …, 2014
212014
An Algorithm for k-anonymity-based Fingerprinting
S Schrittwieser, P Kieseberg, I Echizen, S Wohlgemuth, N Sonehara, ...
202011
A tamper-proof audit and control system for the doctor in the loop
P Kieseberg, B Malle, P Frühwirt, E Weippl, A Holzinger
Brain informatics 3 (4), 269-279, 2016
182016
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
P Frühwirt, P Kieseberg, S Schrittwieser, M Huber, E Weippl
Information Security Technical Report 17 (4), 227-238, 2013
182013
Trees Cannot Lie: Using Data Structures for Forensics Purposes
P Kieseberg, S Schrittwieser, M Mulazzani, M Huber, E Weippl
Intelligence and Security Informatics Conference (EISIC), 2011 European, 282-285, 2011
172011
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
P Kieseberg, S Schrittwieser, M Mulazzani, I Echizen, E Weippl
Electronic Markets 24 (2), 113-124, 2014
152014
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl
International Journal of Pervasive Computing and Communications 9 (1), 37-51, 2013
142013
Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten
E Fosch Villaronga, P Kieseberg, T Li
Computer Law & Security Review, 2017
13*2017
Malicious pixels using qr codes as attack vector
P Kieseberg, S Schrittwieser, M Leithner, M Mulazzani, E Weippl, ...
Trustworthy ubiquitous computing, 21-38, 2012
122012
E-voting Authentication with QR-codes
S Falkner, P Kieseberg, DE Simos, C Traxler, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
112014
Can we trust Machine Learning Results? Artificial Intelligence in Safety-Critical decision Support
K Holzinger, K Mak, P Kieseberg, A Holzinger
ERCIM NEWS, 42-43, 2018
102018
Witnesses for the doctor in the loop
P Kieseberg, J Schantl, P Frühwirt, E Weippl, A Holzinger
International Conference on Brain Informatics and Health, 369-378, 2015
102015
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation 11 (4), 336-348, 2014
102014
Covert Computation—Hiding code in code through compile-time obfuscation
S Schrittwieser, S Katzenbeisser, P Kieseberg, M Huber, M Leithner, ...
Computers & security 42, 13-26, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20