Follow
Bernd Prünster
Bernd Prünster
Verified email at iaik.tugraz.at
Title
Cited by
Cited by
Year
Hybrid mobile edge computing: Unleashing the full potential of edge computing in mobile device use cases
A Reiter, B Prünster, T Zefferer
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
482017
Total eclipse of the heart–disrupting the {InterPlanetary} file system
B Prünster, A Marsalek, T Zefferer
31st USENIX Security Symposium (USENIX Security 22), 3735-3752, 2022
192022
Phish-hook: Detecting phishing certificates using certificate transparency logs
E Fasllija, HF Enişer, B Prünster
Security and Privacy in Communication Networks: 15th EAI International …, 2019
192019
Balancing utility and security: Securing cloud federations of public entities
B Suzic, B Prünster, D Ziegler, A Marsalek, A Reiter
On the Move to Meaningful Internet Systems: OTM 2016 Conferences …, 2016
182016
Fides: Unleashing the Full Potential of Remote Attestation.
B Prünster, G Palfinger, C Kollmann
ICETE (2), 314-321, 2019
112019
A holistic approach towards peer-to-peer security and why proof of work won’t do
B Prünster, D Ziegler, C Kollmann, B Suzic
Security and Privacy in Communication Networks: 14th International …, 2018
82018
In Certificates We Trust--Revisited
F Reimair, P Teufl, B Prünster
2015 IEEE Trustcom/BigDataSE/ISPA 1, 702-709, 2015
82015
Applying the formal concept analysis to introduce guidance in an inquiry-based learning environment
MA Bedek, S Kopeinik, B Prünster, D Albert
2015 IEEE 15th International Conference on Advanced Learning Technologies …, 2015
72015
Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation.
F Hörandner, B Prünster
SECRYPT, 149-160, 2021
42021
AndroTIME: Identifying Timing Side Channels in the Android API
G Palfinger, B Prünster, DJ Ziegler
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
42020
On the structure and authorization management of restful web services
B Suzic, B Prünster, D Ziegler
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1716-1724, 2018
42018
Cloud technology options towards Free Flow of Data
E Rios, T Carnehult, B Prünster, B Suzic, E Prieto, N Notario, G Suciu, ...
42017
Androprint: analysing the fingerprintability of the android api
G Palfinger, B Prünster
Proceedings of the 15th International Conference on Availability …, 2020
32020
Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption.
D Ziegler, A Marsalek, B Prünster, J Sabongui
ICETE (2), 547-552, 2020
32020
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks.
B Prünster, E Fasllija, D Mocher
ICETE (2), 252-259, 2019
22019
Spoof-of-Work: Evaluating Device Authorisation in Mobile Mining Processes
D Ziegler, B Prünster, A Marsalek, C Kollmann
Proceedings of the 15th International Joint Conference on e-Business and …, 2018
22018
Multiply, Divide, and Conquer–Making Fully Decentralised Access Control a Reality
B Prünster, D Ziegler, G Palfinger
International Conference on Network and System Security, 311-326, 2020
12020
Prying CoW: Inferring Secrets across Virtual Machine Boundaries.
G Palfinger, B Prünster, D Ziegler
ICETE (2), 187-197, 2019
12019
SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform
A Marsalek, B Prünster, B Suzic, T Zefferer
Information Systems Security: 14th International Conference, ICISS 2018 …, 2018
12018
Grið–Secure Information Exchange Based on an Inverted Trust Model
B Prünster
12016
The system can't perform the operation now. Try again later.
Articles 1–20