Bernd Prünster

Orcid: 0000-0001-7902-0087

Affiliations:
  • Graz University of Technology, Austria


According to our database1, Bernd Prünster authored at least 23 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions.
Proceedings of the 24th Annual International Conference on Digital Government Research, 2023

Towards a Mobile-First Cross-Border eID Framework.
Proceedings of the 24th Annual International Conference on Digital Government Research, 2023

2022
Total Eclipse of the Heart - Disrupting the InterPlanetary File System.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
AndroTIME: Identifying Timing Side Channels in the Android API.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality.
Proceedings of the Network and System Security - 14th International Conference, 2020

Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

AndroPRINT: analysing the fingerprintability of the Android API.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs.
Proceedings of the Security and Privacy in Communication Networks, 2019

Fides: Unleashing the Full Potential of Remote Attestation.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Prying CoW: Inferring Secrets across Virtual Machine Boundaries.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won't Do.
Proceedings of the Security and Privacy in Communication Networks, 2018

On the structure and authorization management of RESTful web services.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
The Net Rat - Rethinking Connected Services for Increased Security.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Balancing Utility and Security: Securing Cloud Federations of Public Entities.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Applied dynamic policy selection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
In Certificates We Trust - Revisited.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Applying the Formal Concept Analysis to Introduce Guidance in an Inquiry-Based Learning Environment.
Proceedings of the 15th IEEE International Conference on Advanced Learning Technologies, 2015


  Loading...