default search action
Stefan Rass
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Stefan Rass, Max-Julian Jakobitsch, Stefan Haan, Moritz Hiebler:
Computer-Aided Verification of P/NP Proofs: A Survey and Discussion. IEEE Access 12: 13513-13524 (2024) - [j45]Stefan Rass, Miralem Mehic, Miroslav Voznák, Sandra König:
Hacking the Least Trusted Node: Indirect Eavesdropping in Quantum Networks. IEEE Access 12: 160973-160981 (2024) - [j44]Stefan Rass:
Tell me who you are friends with and I will tell you who you are: Unique neighborhoods in random graphs. Theor. Comput. Sci. 988: 114386 (2024) - [j43]Stefan Rass, Max-Julian Jakobitsch, Stefan Haan, Moritz Hiebler:
Threshold sampling. Theor. Comput. Sci. 1019: 114847 (2024) - [j42]Stefan Rass, Sandra König, Shahzad Ahmad, Maksim Goman:
Metricizing the Euclidean Space Toward Desired Distance Relations in Point Clouds. IEEE Trans. Inf. Forensics Secur. 19: 7304-7319 (2024) - [c73]Mario Kahlhofer, Stefan Rass:
Application Layer Cyber Deception Without Developer Interaction. EuroS&P Workshops 2024: 416-429 - [c72]Eckhard Pflügel, Stefan Rass:
Ransom Roulette: Learning the Games Behind Cyber Extortion. GameSec 2024: 67-86 - [c71]Víctor Mayoral Vilches, Jason Jabbour, Yu-Shun Hsiao, Zishen Wan, Martiño Crespo-Álvarez, Matthew Stewart, Juan Manuel Reina-Muñoz, Prateek Nagras, Gaurav Vikhe, Mohammad Bakhshalipour, Martin Pinzger, Stefan Rass, Smruti Panigrahi, Giulio Corradi, Niladri Roy, Phillip B. Gibbons, Sabrina M. Neuman, Brian Plancher, Vijay Janapa Reddi:
RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance. ICRA 2024: 8288-8297 - [c70]Mario Kahlhofer, Stefan Achleitner, Stefan Rass, René Mayrhofer:
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires. RAID 2024: 317-336 - [c69]Gelei Deng, Yi Liu, Víctor Mayoral Vilches, Peng Liu, Yuekang Li, Yuan Xu, Martin Pinzger, Stefan Rass, Tianwei Zhang, Yang Liu:
PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing. USENIX Security Symposium 2024 - [i28]Mario Kahlhofer, Stefan Rass:
Application Layer Cyber Deception without Developer Interaction. CoRR abs/2405.12852 (2024) - [i27]Mario Kahlhofer, Stefan Achleitner, Stefan Rass, René Mayrhofer:
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires. CoRR abs/2408.10796 (2024) - 2023
- [j41]Shahzad Ahmad, Stefan Rass, Peter Schartner:
False-Bottom Encryption: Deniable Encryption From Secret Sharing. IEEE Access 11: 62549-62564 (2023) - [j40]Stefan Rass, Sandra König, Jasmin Wachter, Víctor Mayoral Vilches, Emmanouil Panaousis:
Game-theoretic APT defense: An experimental study on robotics. Comput. Secur. 132: 103328 (2023) - [j39]Mario Kahlhofer, Patrick Kern, Sören Henning, Stefan Rass:
Benchmarking Function Hook Latency in Cloud-Native Environments. Softwaretechnik-Trends 43(4) (2023) - [c68]Michael Sonntag, René Mayrhofer, Stefan Rass:
Anonymously Publishing Liveness Signals with Plausible Deniability. MoMM 2023: 3-19 - [c67]Shahzad Ahmad, Stefan Rass:
How to Plausibly Deny Steganographic Secrets. SECRYPT 2023: 731-737 - [i26]Víctor Mayoral Vilches, Gelei Deng, Yi Liu, Martin Pinzger, Stefan Rass:
ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics. CoRR abs/2308.02152 (2023) - [i25]Gelei Deng, Yi Liu, Victor Mayoral Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass:
PentestGPT: An LLM-empowered Automatic Penetration Testing Tool. CoRR abs/2308.06782 (2023) - [i24]Stefan Rass, Martin Pinzger:
Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code. CoRR abs/2309.05338 (2023) - [i23]Víctor Mayoral Vilches, Jason Jabbour, Yu-Shun Hsiao, Zishen Wan, Alejandra Martínez-Fariña, Martiño Crespo-Álvarez, Matthew Stewart, Juan Manuel Reina-Muñoz, Prateek Nagras, Gaurav Vikhe, Mohammad Bakhshalipour, Martin Pinzger, Stefan Rass, Smruti Panigrahi, Giulio Corradi, Niladri Roy, Phillip B. Gibbons, Sabrina M. Neuman, Brian Plancher, Vijay Janapa Reddi:
RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance. CoRR abs/2309.09212 (2023) - [i22]Mario Kahlhofer, Patrick Kern, Sören Henning, Stefan Rass:
Benchmarking Function Hook Latency in Cloud-Native Environments. CoRR abs/2310.12702 (2023) - 2022
- [b4]Miralem Mehic, Stefan Rass, Peppino Fazio, Miroslav Voznák:
Quantum Key Distribution Networks - A Quality of Service Perspective, 1. Springer 2022, ISBN 978-3-031-06607-8, pp. 1-223 - [j38]Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis:
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. IEEE Access 10: 104671-104685 (2022) - [j37]Miralem Mehic, Stefan Rass, Emir Dervisevic, Miroslav Voznák:
Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks. IEEE Access 10: 110512-110520 (2022) - [j36]Stefan Rass, Sandra König, Jasmin Wachter, Manuel Egger, Manuel Hobisch:
Supervised Machine Learning with Plausible Deniability. Comput. Secur. 112: 102506 (2022) - [j35]Victor Mayoral Vilches, Alfonso Glera-Picón, Unai Ayucar Carbajo, Stefan Rass, Martin Pinzger, Federico Maggi, Endika Gil-Uriarte:
Hacking planned obsolescense in robotics, towards security-oriented robot teardown. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [j34]Stefan Rass, Sandra König, Stefan Schauer:
Games over Probability Distributions Revisited: New Equilibrium Models and Refinements. Games 13(6): 80 (2022) - [c66]Michael Vierhauser, Rebekka Wohlrab, Stefan Rass:
Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical Systems. CNS 2022: 1-6 - [c65]Stefan Rass, Sandra König:
Synchronization in Security Games. GameSec 2022: 129-148 - [i21]Stefan Rass, Sandra König, Stefan Schauer:
Defending Against Advanced Persistent Threats using Game-Theory. CoRR abs/2205.00956 (2022) - [i20]Stefan Rass, Sandra König, Stefan Schauer:
Decisions with Uncertain Consequences - A Total Ordering on Loss-Distributions. CoRR abs/2205.00957 (2022) - [i19]Stefan Rass, Sandra König, Shahzad Ahmad, Maksim Goman:
Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds. CoRR abs/2211.03674 (2022) - 2021
- [j33]Giampaolo Liuzzi, Marco Locatelli, Veronica Piccialli, Stefan Rass:
Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems. Comput. Optim. Appl. 79(3): 561-599 (2021) - [j32]Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Martín, Stefan Schauer, Andreas Poppe, Christoph Pacher, Miroslav Voznák:
Quantum Key Distribution: A Networking Perspective. ACM Comput. Surv. 53(5): 96:1-96:41 (2021) - [j31]Quanyan Zhu, Stefan Rass, Bernhard Dieber, Víctor Mayoral Vilches:
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice. Found. Trends Robotics 9(1): 1-129 (2021) - [j30]Benjamin Breiling, Bernhard Dieber, Martin Pinzger, Stefan Rass:
A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows. J. Cybersecur. Priv. 1(1): 93-118 (2021) - [j29]Antonia Nisioti, George Loukas, Stefan Rass, Emmanouil Panaousis:
Game-Theoretic Decision Support for Cyber Forensic Investigations. Sensors 21(16): 5300 (2021) - [c64]Sandra König, Stefan Schauer, Stefan Rass:
Multi-categorical Risk Assessment for Urban Critical Infrastructures. CRITIS 2021: 152-167 - [c63]Stefan Schauer, Stefan Rass, Sandra König:
Simulation-driven Risk Model for Interdependent Critical Infrastructures. ISCRAM 2021: 404-415 - [e2]Branislav Bosanský, Cleotilde Gonzalez, Stefan Rass, Arunesh Sinha:
Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings. Lecture Notes in Computer Science 13061, Springer 2021, ISBN 978-3-030-90369-5 [contents] - [i18]Quanyan Zhu, Stefan Rass, Bernhard Dieber, Victor Mayoral Vilches:
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice. CoRR abs/2103.05789 (2021) - [i17]Stefan Rass, Sandra König, Jasmin Wachter, Manuel Egger, Manuel Hobisch:
Supervised Machine Learning with Plausible Deniability. CoRR abs/2106.04267 (2021) - [i16]Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis:
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. CoRR abs/2111.02364 (2021) - 2020
- [b3]Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu:
Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach. Springer 2020, ISBN 978-3-030-46907-8, pp. 1-282 - [j28]Sergei Bauer, Stefan Rass, Peter Schartner:
Generic Parity-Based Concurrent Error Detection for Lightweight ARX Ciphers. IEEE Access 8: 142016-142025 (2020) - [j27]Stefan Rass, Quanyan Zhu:
Computer & security special issue editorial. Comput. Secur. 89 (2020) - [j26]Florian Skopik, Max Landauer, Markus Wurzenberger, Gernot Vormayr, Jelena Milosevic, Joachim Fabini, Wolfgang Prüggler, Oskar Kruschitz, Benjamin Widmann, Kevin Truckenthanner, Stefan Rass, Michael Simmer, Christoph Zauner:
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. J. Inf. Secur. Appl. 54: 102544 (2020) - [j25]Miralem Mehic, Peppino Fazio, Stefan Rass, Oliver Maurhart, Momtchil Peev, Andreas Poppe, Jan Rozhon, Marcin Niemiec, Miroslav Voznák:
A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks. IEEE/ACM Trans. Netw. 28(1): 168-181 (2020) - [c62]Corinna Cichy, Stefan Rass:
Fuzzy Expert Systems for Automated Data Quality Assessment and Improvement Processes. EKAW (Posters & Demos) 2020: 7-11 - [c61]Stefan Rass, Angelika Wiegele, Sandra König:
Security Games over Lexicographic Orders. GameSec 2020: 422-441 - [c60]Patrick Kubiak, Stefan Rass, Martin Pinzger, Stephan Schneider:
A Method for the Joint Analysis of Numerical and Textual IT-System Data to Predict Critical System States. ICSOFT (Selected Papers) 2020: 242-261 - [c59]Patrick Kubiak, Stefan Rass, Martin Pinzger:
IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log Files. ICSOFT 2020: 589-596 - [c58]Stefan Schauer, Stefan Rass:
Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities. Critical Infrastructure Protection 2020: 307-323 - [c57]Stefan Schauer, Stefan Rass, Sandra König, Klaus Steinnocher, Thomas Schaberreiter, Gerald Quirchmayr:
Cross-Domain Risk Analysis to Strengthen City Resilience: the ODYSSEUS Approach. ISCRAM 2020: 652-662 - [p4]Sandra König, Antonios Gouglidis, Stefan Rass, Neil Adams, Paul Smith, David Hutchison:
Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: A Practical Approach. Guide to Disaster-Resilient Communication Networks 2020: 769-789 - [i15]Víctor Mayoral Vilches, Martin Pinzger, Stefan Rass, Bernhard Dieber, Endika Gil-Uriarte:
Can ROS be used securely in industry? Red teaming ROS-Industrial. CoRR abs/2009.08211 (2020) - [i14]Víctor Mayoral Vilches, Irati Abad-Fernández, Martin Pinzger, Stefan Rass, Bernhard Dieber, Alcino Cunha, Francisco J. Rodríguez-Lera, Giovanni Lacava, Angelica Marotta, Fabio Martinelli, Endika Gil-Uriarte:
alurity, a toolbox for robot cybersecurity. CoRR abs/2010.07759 (2020)
2010 – 2019
- 2019
- [j24]Corinna Cichy, Stefan Rass:
An Overview of Data Quality Frameworks. IEEE Access 7: 24634-24648 (2019) - [c56]Stefan Schauer, Thomas Grafenauer, Sandra König, Manuel Warum, Stefan Rass:
Estimating Cascading Effects in Cyber-Physical Critical Infrastructures. CRITIS 2019: 43-56 - [c55]Nadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis:
Honeypot Type Selection Games for Smart Grid Networks. GameSec 2019: 85-96 - [c54]Stefan Rass, Sandra König, Emmanouil Panaousis:
Cut-The-Rope: A Game of Stealthy Intrusion. GameSec 2019: 404-416 - 2018
- [j23]Quanyan Zhu, Stefan Rass:
On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats. IEEE Access 6: 13958-13971 (2018) - [j22]Patrick Kubiak, Stefan Rass:
An Overview of Data-Driven Techniques for IT-Service-Management. IEEE Access 6: 63664-63688 (2018) - [j21]Stefan Rass, Sandra König:
Password Security as a Game of Entropies. Entropy 20(5): 312 (2018) - [j20]Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Schauer, Stefan Rass:
Risk Assessment Uncertainties in Cybersecurity Investments. Games 9(2): 34 (2018) - [j19]Jasmin Wachter, Stefan Rass, Sandra König:
Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria. Games 9(3): 59 (2018) - [c53]Thomas Grafenauer, Sandra König, Stefan Rass, Stefan Schauer:
A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. ARES 2018: 30:1-30:8 - [c52]Quanyan Zhu, Stefan Rass:
Game Theory Meets Network Security: A Tutorial. CCS 2018: 2163-2165 - [c51]Sandra König, Thomas Schaberreiter, Stefan Rass, Stefan Schauer:
A Measure for Resilience of Critical Infrastructures. CRITIS 2018: 57-71 - [c50]Jasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer:
Disappointment-Aversion in Security Games. GameSec 2018: 314-325 - [c49]Stefan Schauer, Stefan Rass, Sandra König, Thomas Grafenauer, Martin Latzenhofer:
Analyzing Cascading Effects among Critical Infrastructures. ISCRAM 2018 - [c48]Stefan Rass, Andreas Schorn, Florian Skopik:
Trust and Distrust: On Sense and Nonsense in Big Data. Privacy and Identity Management 2018: 81-94 - [i13]Quanyan Zhu, Stefan Rass:
Game Theory Meets Network Security: A Tutorial at ACM CCS. CoRR abs/1808.08066 (2018) - [i12]Quanyan Zhu, Stefan Rass, Peter Schartner:
Community-Based Security for the Internet of Things. CoRR abs/1810.00281 (2018) - [i11]Miralem Mehic, Peppino Fazio, Stefan Rass, Oliver Maurhart, Momtchil Peev, Andreas Poppe, Jan Rozhon, Marcin Niemiec, Miroslav Voznák:
A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks. CoRR abs/1810.03857 (2018) - [i10]Stefan Rass:
Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks. CoRR abs/1810.05602 (2018) - 2017
- [j18]Stefan Rass, Ali Alshawish, Mohamed Amine Abid, Stefan Schauer, Quanyan Zhu, Hermann de Meer:
Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory. IEEE Access 5: 8394-8407 (2017) - [j17]Miralem Mehic, Oliver Maurhart, Stefan Rass, Miroslav Voznák:
Implementation of quantum key distribution network simulation module in the network simulator NS-3. Quantum Inf. Process. 16(10): 253 (2017) - [j16]Bernhard Dieber, Benjamin Breiling, Sebastian Taurer, Severin Kacianka, Stefan Rass, Peter Schartner:
Security for the Robot Operating System. Robotics Auton. Syst. 98: 192-203 (2017) - [c47]Ali Alshawish, Mohamed Amine Abid, Stefan Rass, Hermann de Meer:
Playing a Multi-objective Spot-checking Game in Public Transportation Systems. SHCIS@DAIS 2017: 31-36 - [c46]Stefan Rass, Sandra König, Stefan Schauer:
On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. GameSec 2017: 494-505 - [c45]Stefan Rass, Johannes Winkler:
Learning pairing-based cryptography by hands-on exercises. TALE 2017: 186-191 - [e1]Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer:
Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10575, Springer 2017, ISBN 978-3-319-68710-0 [contents] - [i9]Stefan Rass:
Towards a Physical Oracle for the Partition Problem using Analogue Computing. CoRR abs/1705.01826 (2017) - [i8]Andrew Fielder, Sandra König, Emmanouil Panaousis, Stefan Schauer, Stefan Rass:
Uncertainty in Cyber Security Investments. CoRR abs/1712.05893 (2017) - 2016
- [j15]Stefan Rass, Peter Schartner:
On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack. IEEE Access 4: 7874-7882 (2016) - [j14]Alexander Beck, Stefan Rass:
Using neural networks to aid CVSS risk aggregation - An empirically validated approach. J. Innov. Digit. Ecosyst. 3(2): 148-154 (2016) - [j13]Hermann Seuschek, Stefan Rass:
Side-channel leakage models for RISC instruction set architectures from empirical data. Microprocess. Microsystems 47: 74-81 (2016) - [c44]Alexander Beck, Stefan Rass:
Security Risk Aggregation Based on Neural Networks - An Empirically Validated Approach. FLAIRS 2016: 259-263 - [c43]Stefan Rass, Quanyan Zhu:
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats. GameSec 2016: 314-326 - [c42]Bernhard Dieber, Severin Kacianka, Stefan Rass, Peter Schartner:
Application-level security for ROS-based applications. IROS 2016: 4477-4482 - [c41]Stefan Rass, Raphael Wigoutschnigg:
Arguable anonymity from key-privacy: The deterministic crowds protocol. NOMS 2016: 571-576 - [c40]Sandra König, Stefan Schauer, Stefan Rass:
A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. NordSec 2016: 67-81 - [c39]Jerry S. Busby, Antonios Gouglidis, Stefan Rass, Sandra König:
Modelling security risk in critical utilities: The system at risk as a three player game and agent society. SMC 2016: 1758-1763 - [i7]Stefan Rass:
On the Existence of Weak One-Way Functions. CoRR abs/1609.01575 (2016) - 2015
- [j12]Stefan Rass, Peter Schartner, Monika Brodbeck:
Private function evaluation by local two-party computation. EURASIP J. Inf. Secur. 2015: 7 (2015) - [j11]Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer:
Secure Communication over Software-Defined Networks. Mob. Networks Appl. 20(1): 105-110 (2015) - [c38]Stefan Rass, Peter Schartner:
Licensed processing of encrypted information. CNS 2015: 703-704 - [c37]Hermann Seuschek, Stefan Rass:
Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data. DSD 2015: 423-430 - [c36]Stefan Rass, Sandra König, Stefan Schauer:
Uncertainty in Games: Using Probability-Distributions as Payoffs. GameSec 2015: 346-357 - [p3]Robert Singer, Stefan Raß:
Embodying Business Rules in S-BPM. S-BPM in the Wild, Practical Value Creation 2015: 187-199 - [p2]Robert Singer, Stefan Raß:
Structured Communication - Approaching S-BPM with Microsoft Technologies. S-BPM in the Wild, Practical Value Creation 2015: 235-255 - [i6]Stefan Rass, Peter Schartner, Markus S. Wamser:
Oblivious Lookup Tables. CoRR abs/1505.00605 (2015) - [i5]Stefan Rass:
On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs. CoRR abs/1511.08591 (2015) - 2014
- [j10]Stefan Rass, Peter Schartner:
Hardware-Sicherheit. Datenschutz und Datensicherheit 38(11): 733 (2014) - [c35]Stefan Rass, Benjamin Rainer:
Numerical Computation of Multi-goal Security Strategies. GameSec 2014: 118-133 - [c34]Stefan Rass, Benjamin Rainer, Matthias Vavti, Johannes Göllner, Andreas Peer, Stefan Schauer:
Secure Communication over Software-Defined Networks. IoT360 (2) 2014: 211-221 - [c33]Fabrizio De Santis, Stefan Rass:
On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages. LATINCRYPT 2014: 127-145 - [c32]Stefan Rass, Peter Schartner:
Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud. Sicherheit 2014: 187-199 - [c31]Robert Singer, Johannes Kotremba, Stefan Rass:
Modeling and Execution of Multienterprise Business Processes. CBI (2) 2014: 68-73 - [i4]Robert Singer, Johannes Kotremba, Stefan Raß:
Modeling and Execution of Multienterprise Business Processes. CoRR abs/1404.7618 (2014) - 2013
- [b2]Albert Fleischmann, Stefan Rass, Robert Singer:
S-BPM Illustrated - A Storybook about Business Process Modeling and Execution. Springer 2013, ISBN 978-3-642-36903-2, pp. I-X, 1-143 - [j9]Stefan Rass:
On Game-Theoretic Network Security Provisioning. J. Netw. Syst. Manag. 21(1): 47-64 (2013) - [c30]Raphael Wigoutschnigg, Peter Schartner, Stefan Rass:
Shared Crowds: A Token-Ring Approach to Hide the Receiver. ARES 2013: 383-389 - [c29]Stefan Rass, Benjamin Rainer, Matthias Vavti, Stefan Schauer:
A Network Modeling and Analysis Tool for Perfectly Secure Communication. AINA 2013: 267-275 - [c28]Stefan Rass, Johannes Kotremba, Robert Singer:
The S-BPM Architecture: A Framework for Multi-agent Systems. Web Intelligence/IAT Workshops 2013: 78-82 - [c27]Stefan Rass, Sebastian Kurowski:
On Bayesian Trust and Risk Forecasting for Compound Systems. IMF 2013: 69-82 - [c26]Stefan Rass:
Dynamic Proofs of Retrievability from Chameleon-Hashes. SECRYPT 2013: 296-304 - [i3]Johannes Kotremba, Stefan Raß, Robert Singer:
Distributed Business Processes - A Framework for Modeling and Execution. CoRR abs/1309.3126 (2013) - [i2]Stefan Rass:
Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption. CoRR abs/1312.3146 (2013) - 2012
- [j8]Stefan Rass:
Neue Lösungsansätze. Datenschutz und Datensicherheit 36(7): 473 (2012) - [c25]Stefan Rass, Peter Schartner, Raphael Wigoutschnigg, Christian Kollmitzer:
Anonymous Communication by Branch-and-Bound. ARES 2012: 94-102 - [c24]Stefan Rass, Michal Koza:
On Secure Communication over Wireless Sensor Networks. SECRYPT 2012: 364-367 - 2011
- [j7]Daniel Slamanig, Stefan Rass:
Redigierbare Digitale Signaturen - Theorie und Praxis. Datenschutz und Datensicherheit 35(11): 757-762 (2011) - [j6]Stefan Rass:
Information-Theoretic Security as an Optimization Problem. J. Next Gener. Inf. Technol. 2(3): 72-83 (2011) - [j5]Stefan Rass, Raphael Wigoutschnigg, Peter Schartner:
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(4): 27-41 (2011) - [j4]Stefan Rass, Peter Schartner:
A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks. IEEE Trans. Syst. Man Cybern. Part C 41(1): 107-119 (2011) - [c23]Stefan Rass, Raphael Wigoutschnigg, Peter Schartner:
Crowds Based on Secret-Sharing. ARES 2011: 359-364 - [c22]Daniel Slamanig, Stefan Rass:
On Security and Privacy in Cloud Computing. CLOSER 2011: 604-609 - [c21]Stefan Rass:
Towards a Rapid-Alert System for Security Incidents. IMF 2011: 122-136 - [c20]Stefan Rass, Peter Schartner:
Information-leakage in Hybrid Randomized Protocols. SECRYPT 2011: 134-143 - 2010
- [j3]Stefan Rass, Peter Schartner:
Quantenkryptographie - Überblick und aktuelle Entwicklungen. Datenschutz und Datensicherheit 34(11): 753-757 (2010) - [j2]Stefan Rass, Angelika Wiegele, Peter Schartner:
Building a Quantum Network: How to Optimize Security and Expenses. J. Netw. Syst. Manag. 18(3): 283-299 (2010) - [c19]Stefan Rass, Peter Schartner:
Non-interactive Information Reconciliation for Quantum Key Distribution. AINA 2010: 1054-1060 - [c18]Stefan Rass, David Schuller, Christian Kollmitzer:
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication. Communications and Multimedia Security 2010: 166-177 - [c17]Daniel Slamanig, Stefan Rass:
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. Communications and Multimedia Security 2010: 201-213 - [c16]Stefan Rass, Peter Schartner:
Multipath Authentication without shared Secrets and with Applications in Quantum Networks. Security and Management 2010: 111-115 - [c15]Daniel Slamanig, Stefan Rass:
Selectively Traceable Anonymous and Unlinkable Token-Based Transactions. ICETE (Selected Papers) 2010: 289-303 - [c14]Daniel Slamanig, Stefan Rass:
Anonymous but Authorized Transactions Supporting Selective Traceability. SECRYPT 2010: 132-141 - [i1]Martin Schaffer, Stefan Rass:
Fusion Discrete Logarithm Problems. CoRR abs/1001.1802 (2010)
2000 – 2009
- 2009
- [b1]Stefan Rass:
On Information-Theoretic Security - Contemporary Problems and Solutions. epubli GmbH, 2009, pp. 1-194 - [c13]Stefan Rass, Peter Schartner:
Security in Quantum Networks as an Optimization Problem. ARES 2009: 493-498 - [c12]Peter Schartner, Stefan Rass:
How to overcome the 'Trusted Node Model' in Quantum Cryptography. CSE (3) 2009: 259-262 - [c11]Stefan Rass, Peter Schartner, Michaela Greiler:
Quantum Coin-Flipping-Based Authentication. ICC 2009: 1-5 - [p1]Stefan Rass:
Über Informationstheoretische Sicherheit: Aktuelle Probleme und Lösungen. Ausgezeichnete Informatikdissertationen 2009: 201-210 - 2008
- [j1]Simone Fuchs, Stefan Rass, Kyandoghere Kyamakya:
Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 11 (2008) - [c10]Simone Fuchs, Stefan Rass, Bernhard Lamprecht, Kyandoghere Kyamakya:
A model for ontology-based scene description for context-aware driver assistance systems. AMBI-SYS 2008: 5 - [c9]Christian Kollmitzer, Oliver Maurhart, Stefan Schauer, Stefan Rass:
Application framework for high security requirements in R&D environments based on quantum cryptography. CRiSIS 2008: 193-197 - [c8]Stefan Rass, Simone Fuchs, Kyandoghere Kyamakya:
A Game-Theoretic Approach to Co-operative Context-Aware Driving with Partially Random Behavior. EuroSSC 2008: 154-167 - [c7]Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie, Kyandoghere Kyamakya:
Secure Message Relay over Networks with QKD-Links. ICQNM 2008: 10-15 - [c6]Stefan Rass, Simone Fuchs, Kyandoghere Kyamakya:
Towards a game-theoretic model of co-operative context-aware driving under random influences. ICVES 2008: 22-26 - [c5]Stefan Rass, Simone Fuchs, Martin Schaffer, Kyandoghere Kyamakya:
How to protect privacy in floating car data systems. Vehicular Ad Hoc Networks 2008: 17-22 - [c4]Bernhard Lamprecht, Stefan Rass, Simone Fuchs, Kyandoghere Kyamakya:
Fusion of an uncalibrated camera with velocity information for distance measurement from a moving camera on highways. WPNC 2008: 165-171 - 2007
- [c3]Martin Schaffer, Peter Schartner, Stefan Rass:
Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy. Security and Management 2007: 198-204 - [c2]Bernhard Lamprecht, Stefan Rass, Simone Fuchs, Kyandoghere Kyamakya:
Extrinsic Camera Calibration for an On-board Two-Camera System without overlapping Field of View. ITSC 2007: 265-270 - 2006
- [c1]Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. SECRYPT 2006: 207-210
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint