![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "Stefan Raß"
@article{DBLP:journals/access/RassJHH24, author = {Stefan Rass and Max{-}Julian Jakobitsch and Stefan Haan and Moritz Hiebler}, title = {Computer-Aided Verification of {P/NP} Proofs: {A} Survey and Discussion}, journal = {{IEEE} Access}, volume = {12}, pages = {13513--13524}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3355540}, doi = {10.1109/ACCESS.2024.3355540}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RassJHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Rass24, author = {Stefan Rass}, title = {Tell me who you are friends with and {I} will tell you who you are: Unique neighborhoods in random graphs}, journal = {Theor. Comput. Sci.}, volume = {988}, pages = {114386}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114386}, doi = {10.1016/J.TCS.2024.114386}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/Rass24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-12852, author = {Mario Kahlhofer and Stefan Rass}, title = {Application Layer Cyber Deception without Developer Interaction}, journal = {CoRR}, volume = {abs/2405.12852}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.12852}, doi = {10.48550/ARXIV.2405.12852}, eprinttype = {arXiv}, eprint = {2405.12852}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-12852.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhmadRS23, author = {Shahzad Ahmad and Stefan Rass and Peter Schartner}, title = {False-Bottom Encryption: Deniable Encryption From Secret Sharing}, journal = {{IEEE} Access}, volume = {11}, pages = {62549--62564}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3288285}, doi = {10.1109/ACCESS.2023.3288285}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AhmadRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RassKWVP23, author = {Stefan Rass and Sandra K{\"{o}}nig and Jasmin Wachter and V{\'{\i}}ctor Mayoral Vilches and Emmanouil Panaousis}, title = {Game-theoretic {APT} defense: An experimental study on robotics}, journal = {Comput. Secur.}, volume = {132}, pages = {103328}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103328}, doi = {10.1016/J.COSE.2023.103328}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RassKWVP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stt/KahlhoferKHR23, author = {Mario Kahlhofer and Patrick Kern and S{\"{o}}ren Henning and Stefan Rass}, title = {Benchmarking Function Hook Latency in Cloud-Native Environments}, journal = {Softwaretechnik-Trends}, volume = {43}, number = {4}, year = {2023}, url = {https://fb-swt.gi.de/fileadmin/FB/SWT/Softwaretechnik-Trends/Verzeichnis/Band\_43\_Heft\_4/SSP23\_CR\_3.pdf}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stt/KahlhoferKHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/KoppeLR23, author = {Timo Koppe and Lukas Leisching and Stefanie Rasspe}, editor = {Tung X. Bui}, title = {Management of Digital Transformation: {A} Literature Review of Dynamic and Operational Capabilities}, booktitle = {56th Hawaii International Conference on System Sciences, {HICSS} 2023, Maui, Hawaii, USA, January 3-6, 2023}, pages = {4204--4213}, publisher = {ScholarSpace}, year = {2023}, url = {https://hdl.handle.net/10125/103146}, timestamp = {Thu, 16 Feb 2023 16:52:47 +0100}, biburl = {https://dblp.org/rec/conf/hicss/KoppeLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imw2/SubhechhaCBRSDV23, author = {Subhali Subhechha and Stefan Cosemans and Attilio Belmonte and Nouredine Rassoul and Shamin Houshmand Sharifi and Peter Debacker and Diederik Verkest and Romain Delhougne and Gouri Sankar Kar}, title = {Demonstration of multilevel multiply accumulate operations for AiMC using engineered a-IGZO transistors-based 2T1C gain cell arrays}, booktitle = {{IEEE} International Memory Workshop, {IMW} 2023, Monterey, CA, USA, May 21-24, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IMW56887.2023.10145946}, doi = {10.1109/IMW56887.2023.10145946}, timestamp = {Fri, 16 Jun 2023 08:54:55 +0200}, biburl = {https://dblp.org/rec/conf/imw2/SubhechhaCBRSDV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/momm/SonntagMR23, author = {Michael Sonntag and Ren{\'{e}} Mayrhofer and Stefan Rass}, editor = {Pari Delir Haghighi and Ismail Khalil and Gabriele Kotsis and Ngurah Agus Sanjaya Er}, title = {Anonymously Publishing Liveness Signals with Plausible Deniability}, booktitle = {Advances in Mobile Computing and Multimedia Intelligence - 21st International Conference, MoMM 2023, Denpasar, Bali, Indonesia, December 4-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14417}, pages = {3--19}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48348-6\_1}, doi = {10.1007/978-3-031-48348-6\_1}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/momm/SonntagMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AhmadR23, author = {Shahzad Ahmad and Stefan Rass}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {How to Plausibly Deny Steganographic Secrets}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {731--737}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012120100003555}, doi = {10.5220/0012120100003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AhmadR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-02152, author = {V{\'{\i}}ctor Mayoral Vilches and Gelei Deng and Yi Liu and Martin Pinzger and Stefan Rass}, title = {ExploitFlow, cyber security exploitation routes for Game Theory and {AI} research in robotics}, journal = {CoRR}, volume = {abs/2308.02152}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.02152}, doi = {10.48550/ARXIV.2308.02152}, eprinttype = {arXiv}, eprint = {2308.02152}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-02152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-06782, author = {Gelei Deng and Yi Liu and Victor Mayoral Vilches and Peng Liu and Yuekang Li and Yuan Xu and Tianwei Zhang and Yang Liu and Martin Pinzger and Stefan Rass}, title = {PentestGPT: An LLM-empowered Automatic Penetration Testing Tool}, journal = {CoRR}, volume = {abs/2308.06782}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.06782}, doi = {10.48550/ARXIV.2308.06782}, eprinttype = {arXiv}, eprint = {2308.06782}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-06782.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-05338, author = {Stefan Rass and Martin Pinzger}, title = {Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code}, journal = {CoRR}, volume = {abs/2309.05338}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.05338}, doi = {10.48550/ARXIV.2309.05338}, eprinttype = {arXiv}, eprint = {2309.05338}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-05338.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-09212, author = {V{\'{\i}}ctor Mayoral Vilches and Jason Jabbour and Yu{-}Shun Hsiao and Zishen Wan and Alejandra Mart{\'{\i}}nez{-}Fari{\~{n}}a and Marti{\~{n}}o Crespo{-}{\'{A}}lvarez and Matthew Stewart and Juan Manuel Reina{-}Mu{\~{n}}oz and Prateek Nagras and Gaurav Vikhe and Mohammad Bakhshalipour and Martin Pinzger and Stefan Rass and Smruti Panigrahi and Giulio Corradi and Niladri Roy and Phillip B. Gibbons and Sabrina M. Neuman and Brian Plancher and Vijay Janapa Reddi}, title = {RobotPerf: An Open-Source, Vendor-Agnostic, Benchmarking Suite for Evaluating Robotics Computing System Performance}, journal = {CoRR}, volume = {abs/2309.09212}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.09212}, doi = {10.48550/ARXIV.2309.09212}, eprinttype = {arXiv}, eprint = {2309.09212}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-09212.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-12702, author = {Mario Kahlhofer and Patrick Kern and S{\"{o}}ren Henning and Stefan Rass}, title = {Benchmarking Function Hook Latency in Cloud-Native Environments}, journal = {CoRR}, volume = {abs/2310.12702}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.12702}, doi = {10.48550/ARXIV.2310.12702}, eprinttype = {arXiv}, eprint = {2310.12702}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-12702.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/MehicRFV22, author = {Miralem Mehic and Stefan Rass and Peppino Fazio and Miroslav Vozn{\'{a}}k}, title = {Quantum Key Distribution Networks - {A} Quality of Service Perspective, 1}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06608-5}, doi = {10.1007/978-3-031-06608-5}, isbn = {978-3-031-06607-8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/MehicRFV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MehicRDV22, author = {Miralem Mehic and Stefan Rass and Emir Dervisevic and Miroslav Vozn{\'{a}}k}, title = {Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks}, journal = {{IEEE} Access}, volume = {10}, pages = {110512--110520}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3214511}, doi = {10.1109/ACCESS.2022.3214511}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MehicRDV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PandaRMLLP22, author = {Sakshyam Panda and Stefan Rass and Sotiris Moschoyiannis and Kaitai Liang and George Loukas and Emmanouil Panaousis}, title = {HoneyCar: {A} Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles}, journal = {{IEEE} Access}, volume = {10}, pages = {104671--104685}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3210117}, doi = {10.1109/ACCESS.2022.3210117}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/PandaRMLLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RassKWEH22, author = {Stefan Rass and Sandra K{\"{o}}nig and Jasmin Wachter and Manuel Egger and Manuel Hobisch}, title = {Supervised Machine Learning with Plausible Deniability}, journal = {Comput. Secur.}, volume = {112}, pages = {102506}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102506}, doi = {10.1016/J.COSE.2021.102506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RassKWEH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/VilchesGCRPMG22, author = {Victor Mayoral Vilches and Alfonso Glera{-}Pic{\'{o}}n and Unai Ayucar Carbajo and Stefan Rass and Martin Pinzger and Federico Maggi and Endika Gil{-}Uriarte}, title = {Hacking planned obsolescense in robotics, towards security-oriented robot teardown}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {80}, year = {2022}, url = {https://doi.org/10.14279/tuj.eceasst.80.1189}, doi = {10.14279/TUJ.ECEASST.80.1189}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eceasst/VilchesGCRPMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/RassKS22, author = {Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, title = {Games over Probability Distributions Revisited: New Equilibrium Models and Refinements}, journal = {Games}, volume = {13}, number = {6}, pages = {80}, year = {2022}, url = {https://doi.org/10.3390/g13060080}, doi = {10.3390/G13060080}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/games/RassKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/JokicCRSPBFB22, author = {Stefan Jokic and David Cleres and Frank Rassouli and Claudia Steurer{-}Stey and Milo A. Puhan and Martin H. Brutsche and Elgar Fleisch and Filipe Barata}, title = {TripletCough: Cougher Identification and Verification From Contact-Free Smartphone-Based Audio Recordings Using Metric Learning}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {26}, number = {6}, pages = {2746--2757}, year = {2022}, url = {https://doi.org/10.1109/JBHI.2022.3152944}, doi = {10.1109/JBHI.2022.3152944}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/JokicCRSPBFB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VierhauserWR22, author = {Michael Vierhauser and Rebekka Wohlrab and Stefan Rass}, title = {Towards Cost-Benefit-Aware Adaptive Monitoring for Cyber-Physical Systems}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10092919}, doi = {10.1109/CNS56114.2022.10092919}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VierhauserWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassK22, author = {Stefan Rass and Sandra K{\"{o}}nig}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Synchronization in Security Games}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {129--148}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_7}, doi = {10.1007/978-3-031-26369-9\_7}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-00956, author = {Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, title = {Defending Against Advanced Persistent Threats using Game-Theory}, journal = {CoRR}, volume = {abs/2205.00956}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.00956}, doi = {10.48550/ARXIV.2205.00956}, eprinttype = {arXiv}, eprint = {2205.00956}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-00956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-00957, author = {Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, title = {Decisions with Uncertain Consequences - {A} Total Ordering on Loss-Distributions}, journal = {CoRR}, volume = {abs/2205.00957}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.00957}, doi = {10.48550/ARXIV.2205.00957}, eprinttype = {arXiv}, eprint = {2205.00957}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-00957.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03674, author = {Stefan Rass and Sandra K{\"{o}}nig and Shahzad Ahmad and Maksim Goman}, title = {Metricizing the Euclidean Space towards Desired Distance Relations in Point Clouds}, journal = {CoRR}, volume = {abs/2211.03674}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03674}, doi = {10.48550/ARXIV.2211.03674}, eprinttype = {arXiv}, eprint = {2211.03674}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03674.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/coap/LiuzziLPR21, author = {Giampaolo Liuzzi and Marco Locatelli and Veronica Piccialli and Stefan Rass}, title = {Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex {QP} problems}, journal = {Comput. Optim. Appl.}, volume = {79}, number = {3}, pages = {561--599}, year = {2021}, url = {https://doi.org/10.1007/s10589-021-00282-7}, doi = {10.1007/S10589-021-00282-7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/coap/LiuzziLPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MehicNRMPAMSPPV20, author = {Miralem Mehic and Marcin Niemiec and Stefan Rass and Jiajun Ma and Momtchil Peev and Alejandro Aguado and Vicente Mart{\'{\i}}n and Stefan Schauer and Andreas Poppe and Christoph Pacher and Miroslav Vozn{\'{a}}k}, title = {Quantum Key Distribution: {A} Networking Perspective}, journal = {{ACM} Comput. Surv.}, volume = {53}, number = {5}, pages = {96:1--96:41}, year = {2021}, url = {https://doi.org/10.1145/3402192}, doi = {10.1145/3402192}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MehicNRMPAMSPPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftrob/ZhuRDV21, author = {Quanyan Zhu and Stefan Rass and Bernhard Dieber and V{\'{\i}}ctor Mayoral Vilches}, title = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice}, journal = {Found. Trends Robotics}, volume = {9}, number = {1}, pages = {1--129}, year = {2021}, url = {https://doi.org/10.1561/2300000061}, doi = {10.1561/2300000061}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftrob/ZhuRDV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/BreilingDPR21, author = {Benjamin Breiling and Bernhard Dieber and Martin Pinzger and Stefan Rass}, title = {A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows}, journal = {J. Cybersecur. Priv.}, volume = {1}, number = {1}, pages = {93--118}, year = {2021}, url = {https://doi.org/10.3390/jcp1010006}, doi = {10.3390/JCP1010006}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/BreilingDPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NisiotiLRP21, author = {Antonia Nisioti and George Loukas and Stefan Rass and Emmanouil Panaousis}, title = {Game-Theoretic Decision Support for Cyber Forensic Investigations}, journal = {Sensors}, volume = {21}, number = {16}, pages = {5300}, year = {2021}, url = {https://doi.org/10.3390/s21165300}, doi = {10.3390/S21165300}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/NisiotiLRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KonigSR21, author = {Sandra K{\"{o}}nig and Stefan Schauer and Stefan Rass}, editor = {Dimitri Percia David and Alain Mermoud and Thomas Maillart}, title = {Multi-categorical Risk Assessment for Urban Critical Infrastructures}, booktitle = {Critical Information Infrastructures Security - 16th International Conference, {CRITIS} 2021, Lausanne, Switzerland, September 27-29, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13139}, pages = {152--167}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93200-8\_9}, doi = {10.1007/978-3-030-93200-8\_9}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/KonigSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscram/SchauerRK21, author = {Stefan Schauer and Stefan Rass and Sandra K{\"{o}}nig}, editor = {Anouck Adrot and Rob Grace and Kathleen A. Moore and Christopher W. Zobel}, title = {Simulation-driven Risk Model for Interdependent Critical Infrastructures}, booktitle = {18th International Conference on Information Systems for Crisis Response and Management, {ISCRAM} 2021, Blacksburg, VA, USA, May 2021}, pages = {404--415}, publisher = {{ISCRAM} Digital Library}, year = {2021}, url = {https://idl.iscram.org/show.php?record=2342}, timestamp = {Thu, 10 Nov 2022 16:58:41 +0100}, biburl = {https://dblp.org/rec/conf/iscram/SchauerRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2021, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1}, doi = {10.1007/978-3-030-90370-1}, isbn = {978-3-030-90369-5}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05789, author = {Quanyan Zhu and Stefan Rass and Bernhard Dieber and Victor Mayoral Vilches}, title = {Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice}, journal = {CoRR}, volume = {abs/2103.05789}, year = {2021}, url = {https://arxiv.org/abs/2103.05789}, eprinttype = {arXiv}, eprint = {2103.05789}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05789.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-04267, author = {Stefan Rass and Sandra K{\"{o}}nig and Jasmin Wachter and Manuel Egger and Manuel Hobisch}, title = {Supervised Machine Learning with Plausible Deniability}, journal = {CoRR}, volume = {abs/2106.04267}, year = {2021}, url = {https://arxiv.org/abs/2106.04267}, eprinttype = {arXiv}, eprint = {2106.04267}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-04267.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-02364, author = {Sakshyam Panda and Stefan Rass and Sotiris Moschoyiannis and Kaitai Liang and George Loukas and Emmanouil Panaousis}, title = {HoneyCar: {A} Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles}, journal = {CoRR}, volume = {abs/2111.02364}, year = {2021}, url = {https://arxiv.org/abs/2111.02364}, eprinttype = {arXiv}, eprint = {2111.02364}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-02364.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/RassSKZ20, author = {Stefan Rass and Stefan Schauer and Sandra K{\"{o}}nig and Quanyan Zhu}, title = {Cyber-Security in Critical Infrastructures - {A} Game-Theoretic Approach}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-46908-5}, doi = {10.1007/978-3-030-46908-5}, isbn = {978-3-030-46907-8}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/RassSKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BauerRS20, author = {Sergei Bauer and Stefan Rass and Peter Schartner}, title = {Generic Parity-Based Concurrent Error Detection for Lightweight {ARX} Ciphers}, journal = {{IEEE} Access}, volume = {8}, pages = {142016--142025}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3010555}, doi = {10.1109/ACCESS.2020.3010555}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BauerRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RassZ20, author = {Stefan Rass and Quanyan Zhu}, title = {Computer {\&} security special issue editorial}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101678}, doi = {10.1016/J.COSE.2019.101678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RassZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SkopikLWVMFPKWT20, author = {Florian Skopik and Max Landauer and Markus Wurzenberger and Gernot Vormayr and Jelena Milosevic and Joachim Fabini and Wolfgang Pr{\"{u}}ggler and Oskar Kruschitz and Benjamin Widmann and Kevin Truckenthanner and Stefan Rass and Michael Simmer and Christoph Zauner}, title = {synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102544}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102544}, doi = {10.1016/J.JISA.2020.102544}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SkopikLWVMFPKWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/MehicFRMPPRNV20, author = {Miralem Mehic and Peppino Fazio and Stefan Rass and Oliver Maurhart and Momtchil Peev and Andreas Poppe and Jan Rozhon and Marcin Niemiec and Miroslav Vozn{\'{a}}k}, title = {A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {28}, number = {1}, pages = {168--181}, year = {2020}, url = {https://doi.org/10.1109/TNET.2019.2956079}, doi = {10.1109/TNET.2019.2956079}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/MehicFRMPPRNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ekaw/CichyR20, author = {Corinna Cichy and Stefan Rass}, editor = {Daniel Garijo and Agnieszka Lawrynowicz}, title = {Fuzzy Expert Systems for Automated Data Quality Assessment and Improvement Processes}, booktitle = {Proceedings of the {EKAW} 2020 Posters and Demonstrations Session co-located with 22nd International Conference on Knowledge Engineering and Knowledge Management {(EKAW} 2020), Globally online {\&} Bozen-Bolzano, Italy, September 17, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2751}, pages = {7--11}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2751/short2.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:37 +0100}, biburl = {https://dblp.org/rec/conf/ekaw/CichyR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassWK20, author = {Stefan Rass and Angelika Wiegele and Sandra K{\"{o}}nig}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Security Games over Lexicographic Orders}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {422--441}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_23}, doi = {10.1007/978-3-030-64793-3\_23}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoft/KubiakR0020, author = {Patrick Kubiak and Stefan Rass and Martin Pinzger and Stephan Schneider}, editor = {Marten van Sinderen and Leszek A. Maciaszek and Hans{-}Georg Fill}, title = {A Method for the Joint Analysis of Numerical and Textual IT-System Data to Predict Critical System States}, booktitle = {Software Technologies - 15th International Conference, {ICSOFT} 2020, Online Event, July 7-9, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1447}, pages = {242--261}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-83007-6\_12}, doi = {10.1007/978-3-030-83007-6\_12}, timestamp = {Thu, 14 Oct 2021 10:27:24 +0200}, biburl = {https://dblp.org/rec/conf/icsoft/KubiakR0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoft/KubiakR020, author = {Patrick Kubiak and Stefan Rass and Martin Pinzger}, editor = {Marten van Sinderen and Hans{-}Georg Fill and Leszek A. Maciaszek}, title = {IT-Application Behaviour Analysis: Predicting Critical System States on OpenStack using Monitoring Performance Data and Log Files}, booktitle = {Proceedings of the 15th International Conference on Software Technologies, {ICSOFT} 2020, Lieusaint, Paris, France, July 7-9, 2020}, pages = {589--596}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009779505890596}, doi = {10.5220/0009779505890596}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/icsoft/KubiakR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/SchauerR20, author = {Stefan Schauer and Stefan Rass}, editor = {Jason Staggs and Sujeet Shenoi}, title = {Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities}, booktitle = {Critical Infrastructure Protection {XIV} - 14th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {596}, pages = {307--323}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62840-6\_15}, doi = {10.1007/978-3-030-62840-6\_15}, timestamp = {Tue, 15 Dec 2020 14:42:39 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/SchauerR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscram/SchauerRKSSQ20, author = {Stefan Schauer and Stefan Rass and Sandra K{\"{o}}nig and Klaus Steinnocher and Thomas Schaberreiter and Gerald Quirchmayr}, editor = {Amanda Lee Hughes and Fiona McNeill and Christopher W. Zobel}, title = {Cross-Domain Risk Analysis to Strengthen City Resilience: the {ODYSSEUS} Approach}, booktitle = {17th International Conference on Information Systems for Crisis Response and Management, {ISCRAM} 2020, May 2020}, pages = {652--662}, publisher = {{ISCRAM} Digital Library}, year = {2020}, url = {https://idl.iscram.org/show.php?record=2261}, timestamp = {Thu, 10 Nov 2022 16:58:41 +0100}, biburl = {https://dblp.org/rec/conf/iscram/SchauerRKSSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/KonigGRA0H20, author = {Sandra K{\"{o}}nig and Antonios Gouglidis and Stefan Rass and Neil Adams and Paul Smith and David Hutchison}, editor = {Jacek Rak and David Hutchison}, title = {Analyzing Disaster-Induced Cascading Effects in Hybrid Critical Infrastructures: {A} Practical Approach}, booktitle = {Guide to Disaster-Resilient Communication Networks}, series = {Computer Communications and Networks}, pages = {769--789}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44685-7\_31}, doi = {10.1007/978-3-030-44685-7\_31}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ccn/KonigGRA0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-08211, author = {V{\'{\i}}ctor Mayoral Vilches and Martin Pinzger and Stefan Rass and Bernhard Dieber and Endika Gil{-}Uriarte}, title = {Can {ROS} be used securely in industry? Red teaming ROS-Industrial}, journal = {CoRR}, volume = {abs/2009.08211}, year = {2020}, url = {https://arxiv.org/abs/2009.08211}, eprinttype = {arXiv}, eprint = {2009.08211}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-08211.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-07759, author = {V{\'{\i}}ctor Mayoral Vilches and Irati Abad{-}Fern{\'{a}}ndez and Martin Pinzger and Stefan Rass and Bernhard Dieber and Alcino Cunha and Francisco J. Rodr{\'{\i}}guez{-}Lera and Giovanni Lacava and Angelica Marotta and Fabio Martinelli and Endika Gil{-}Uriarte}, title = {alurity, a toolbox for robot cybersecurity}, journal = {CoRR}, volume = {abs/2010.07759}, year = {2020}, url = {https://arxiv.org/abs/2010.07759}, eprinttype = {arXiv}, eprint = {2010.07759}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-07759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CichyR19, author = {Corinna Cichy and Stefan Rass}, title = {An Overview of Data Quality Frameworks}, journal = {{IEEE} Access}, volume = {7}, pages = {24634--24648}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2899751}, doi = {10.1109/ACCESS.2019.2899751}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CichyR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/SchauerGKWR19, author = {Stefan Schauer and Thomas Grafenauer and Sandra K{\"{o}}nig and Manuel Warum and Stefan Rass}, editor = {Simin Nadjm{-}Tehrani}, title = {Estimating Cascading Effects in Cyber-Physical Critical Infrastructures}, booktitle = {Critical Information Infrastructures Security - 14th International Conference, {CRITIS} 2019, Link{\"{o}}ping, Sweden, September 23-25, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11777}, pages = {43--56}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37670-3\_4}, doi = {10.1007/978-3-030-37670-3\_4}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/SchauerGKWR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BoumkheldPRP19, author = {Nadia Boumkheld and Sakshyam Panda and Stefan Rass and Emmanouil Panaousis}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Honeypot Type Selection Games for Smart Grid Networks}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {85--96}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_6}, doi = {10.1007/978-3-030-32430-8\_6}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BoumkheldPRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassKP19, author = {Stefan Rass and Sandra K{\"{o}}nig and Emmanouil Panaousis}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Cut-The-Rope: {A} Game of Stealthy Intrusion}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {404--416}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_24}, doi = {10.1007/978-3-030-32430-8\_24}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KubiakR18, author = {Patrick Kubiak and Stefan Rass}, title = {An Overview of Data-Driven Techniques for IT-Service-Management}, journal = {{IEEE} Access}, volume = {6}, pages = {63664--63688}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2875975}, doi = {10.1109/ACCESS.2018.2875975}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KubiakR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhuR18, author = {Quanyan Zhu and Stefan Rass}, title = {On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats}, journal = {{IEEE} Access}, volume = {6}, pages = {13958--13971}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2814481}, doi = {10.1109/ACCESS.2018.2814481}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhuR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/RassK18, author = {Stefan Rass and Sandra K{\"{o}}nig}, title = {Password Security as a Game of Entropies}, journal = {Entropy}, volume = {20}, number = {5}, pages = {312}, year = {2018}, url = {https://doi.org/10.3390/e20050312}, doi = {10.3390/E20050312}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/RassK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/FielderKPSR18, author = {Andrew Fielder and Sandra K{\"{o}}nig and Emmanouil Panaousis and Stefan Schauer and Stefan Rass}, title = {Risk Assessment Uncertainties in Cybersecurity Investments}, journal = {Games}, volume = {9}, number = {2}, pages = {34}, year = {2018}, url = {https://doi.org/10.3390/g9020034}, doi = {10.3390/G9020034}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/games/FielderKPSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/games/WachterRK18, author = {Jasmin Wachter and Stefan Rass and Sandra K{\"{o}}nig}, title = {Security from the Adversary's Inertia-Controlling Convergence Speed When Playing Mixed Strategy Equilibria}, journal = {Games}, volume = {9}, number = {3}, pages = {59}, year = {2018}, url = {https://doi.org/10.3390/g9030059}, doi = {10.3390/G9030059}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/games/WachterRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GrafenauerKRS18, author = {Thomas Grafenauer and Sandra K{\"{o}}nig and Stefan Rass and Stefan Schauer}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {30:1--30:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3240507}, doi = {10.1145/3230833.3240507}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GrafenauerKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuR18, author = {Quanyan Zhu and Stefan Rass}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Game Theory Meets Network Security: {A} Tutorial}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2163--2165}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3264421}, doi = {10.1145/3243734.3264421}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KonigSRS18, author = {Sandra K{\"{o}}nig and Thomas Schaberreiter and Stefan Rass and Stefan Schauer}, editor = {Eric A. M. Luiijf and Inga Zutautaite and Bernhard M. H{\"{a}}mmerli}, title = {A Measure for Resilience of Critical Infrastructures}, booktitle = {Critical Information Infrastructures Security - 13th International Conference, {CRITIS} 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11260}, pages = {57--71}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05849-4\_5}, doi = {10.1007/978-3-030-05849-4\_5}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/KonigSRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WachterRKS18, author = {Jasmin Wachter and Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Disappointment-Aversion in Security Games}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {314--325}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_18}, doi = {10.1007/978-3-030-01554-1\_18}, timestamp = {Tue, 07 May 2024 20:08:32 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WachterRKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscram/SchauerRKGL18, author = {Stefan Schauer and Stefan Rass and Sandra K{\"{o}}nig and Thomas Grafenauer and Martin Latzenhofer}, editor = {Kees Boersma and Brian M. Tomaszewski}, title = {Analyzing Cascading Effects among Critical Infrastructures}, booktitle = {Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, Rochester, NY, USA, May 20-23, 2018}, publisher = {{ISCRAM} Association}, year = {2018}, url = {http://idl.iscram.org/files/stefanschauer/2018/1568\_StefanSchauer\_etal2018.pdf}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscram/SchauerRKGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/RassSS18, author = {Stefan Rass and Andreas Schorn and Florian Skopik}, editor = {Eleni Kosta and Jo Pierson and Daniel Slamanig and Simone Fischer{-}H{\"{u}}bner and Stephan Krenn}, title = {Trust and Distrust: On Sense and Nonsense in Big Data}, booktitle = {Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th {IFIP} {WG} 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {547}, pages = {81--94}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-16744-8\_6}, doi = {10.1007/978-3-030-16744-8\_6}, timestamp = {Sun, 25 Oct 2020 23:04:38 +0100}, biburl = {https://dblp.org/rec/conf/primelife/RassSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-08066, author = {Quanyan Zhu and Stefan Rass}, title = {Game Theory Meets Network Security: {A} Tutorial at {ACM} {CCS}}, journal = {CoRR}, volume = {abs/1808.08066}, year = {2018}, url = {http://arxiv.org/abs/1808.08066}, eprinttype = {arXiv}, eprint = {1808.08066}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-08066.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00281, author = {Quanyan Zhu and Stefan Rass and Peter Schartner}, title = {Community-Based Security for the Internet of Things}, journal = {CoRR}, volume = {abs/1810.00281}, year = {2018}, url = {http://arxiv.org/abs/1810.00281}, eprinttype = {arXiv}, eprint = {1810.00281}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00281.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-03857, author = {Miralem Mehic and Peppino Fazio and Stefan Rass and Oliver Maurhart and Momtchil Peev and Andreas Poppe and Jan Rozhon and Marcin Niemiec and Miroslav Vozn{\'{a}}k}, title = {A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks}, journal = {CoRR}, volume = {abs/1810.03857}, year = {2018}, url = {http://arxiv.org/abs/1810.03857}, eprinttype = {arXiv}, eprint = {1810.03857}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-03857.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-05602, author = {Stefan Rass}, title = {Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks}, journal = {CoRR}, volume = {abs/1810.05602}, year = {2018}, url = {http://arxiv.org/abs/1810.05602}, eprinttype = {arXiv}, eprint = {1810.05602}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-05602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RassAASZM17, author = {Stefan Rass and Ali Alshawish and Mohamed Amine Abid and Stefan Schauer and Quanyan Zhu and Hermann de Meer}, title = {Physical Intrusion Games - Optimizing Surveillance by Simulation and Game Theory}, journal = {{IEEE} Access}, volume = {5}, pages = {8394--8407}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2693425}, doi = {10.1109/ACCESS.2017.2693425}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RassAASZM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/MehicMRV17, author = {Miralem Mehic and Oliver Maurhart and Stefan Rass and Miroslav Vozn{\'{a}}k}, title = {Implementation of quantum key distribution network simulation module in the network simulator {NS-3}}, journal = {Quantum Inf. Process.}, volume = {16}, number = {10}, pages = {253}, year = {2017}, url = {https://doi.org/10.1007/s11128-017-1702-z}, doi = {10.1007/S11128-017-1702-Z}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/MehicMRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ras/DieberBTKRS17, author = {Bernhard Dieber and Benjamin Breiling and Sebastian Taurer and Severin Kacianka and Stefan Rass and Peter Schartner}, title = {Security for the Robot Operating System}, journal = {Robotics Auton. Syst.}, volume = {98}, pages = {192--203}, year = {2017}, url = {https://doi.org/10.1016/j.robot.2017.09.017}, doi = {10.1016/J.ROBOT.2017.09.017}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ras/DieberBTKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dais/AlshawishARM17, author = {Ali Alshawish and Mohamed Amine Abid and Stefan Rass and Hermann de Meer}, title = {Playing a Multi-objective Spot-checking Game in Public Transportation Systems}, booktitle = {Proceedings of the 4th Workshop on Security in Highly Connected {IT} Systems, SHCIS@DAIS 2017, Neuch{\^{a}}tel, Switzerland, June 21 - 22, 2017}, pages = {31--36}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3099012.3099019}, doi = {10.1145/3099012.3099019}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dais/AlshawishARM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassKS17, author = {Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {494--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_26}, doi = {10.1007/978-3-319-68711-7\_26}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tale/RassW17, author = {Stefan Rass and Johannes Winkler}, title = {Learning pairing-based cryptography by hands-on exercises}, booktitle = {{IEEE} 6th International Conference on Teaching, Assessment, and Learning for Engineering, {TALE} 2017, Hong Kong, December 12-14, 2017}, pages = {186--191}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/TALE.2017.8252329}, doi = {10.1109/TALE.2017.8252329}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/tale/RassW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2017, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7}, doi = {10.1007/978-3-319-68711-7}, isbn = {978-3-319-68710-0}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Rass17, author = {Stefan Rass}, title = {Towards a Physical Oracle for the Partition Problem using Analogue Computing}, journal = {CoRR}, volume = {abs/1705.01826}, year = {2017}, url = {http://arxiv.org/abs/1705.01826}, eprinttype = {arXiv}, eprint = {1705.01826}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Rass17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-05893, author = {Andrew Fielder and Sandra K{\"{o}}nig and Emmanouil Panaousis and Stefan Schauer and Stefan Rass}, title = {Uncertainty in Cyber Security Investments}, journal = {CoRR}, volume = {abs/1712.05893}, year = {2017}, url = {http://arxiv.org/abs/1712.05893}, eprinttype = {arXiv}, eprint = {1712.05893}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-05893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RassS16, author = {Stefan Rass and Peter Schartner}, title = {On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack}, journal = {{IEEE} Access}, volume = {4}, pages = {7874--7882}, year = {2016}, url = {https://doi.org/10.1109/ACCESS.2016.2622724}, doi = {10.1109/ACCESS.2016.2622724}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RassS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jides/BeckR16, author = {Alexander Beck and Stefan Rass}, title = {Using neural networks to aid {CVSS} risk aggregation - An empirically validated approach}, journal = {J. Innov. Digit. Ecosyst.}, volume = {3}, number = {2}, pages = {148--154}, year = {2016}, url = {https://doi.org/10.1016/j.jides.2016.10.002}, doi = {10.1016/J.JIDES.2016.10.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jides/BeckR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/SeuschekR16, author = {Hermann Seuschek and Stefan Rass}, title = {Side-channel leakage models for {RISC} instruction set architectures from empirical data}, journal = {Microprocess. Microsystems}, volume = {47}, pages = {74--81}, year = {2016}, url = {https://doi.org/10.1016/j.micpro.2016.01.004}, doi = {10.1016/J.MICPRO.2016.01.004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/SeuschekR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/flairs/BeckR16, author = {Alexander Beck and Stefan Rass}, editor = {Zdravko Markov and Ingrid Russell}, title = {Security Risk Aggregation Based on Neural Networks - An Empirically Validated Approach}, booktitle = {Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, {FLAIRS} 2016, Key Largo, Florida, USA, May 16-18, 2016}, pages = {259--263}, publisher = {{AAAI} Press}, year = {2016}, url = {http://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS16/paper/view/12833}, timestamp = {Wed, 26 Oct 2022 08:35:12 +0200}, biburl = {https://dblp.org/rec/conf/flairs/BeckR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassZ16, author = {Stefan Rass and Quanyan Zhu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {{GADAPT:} {A} Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {314--326}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_18}, doi = {10.1007/978-3-319-47413-7\_18}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RassZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/DieberKRS16, author = {Bernhard Dieber and Severin Kacianka and Stefan Rass and Peter Schartner}, title = {Application-level security for ROS-based applications}, booktitle = {2016 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, {IROS} 2016, Daejeon, South Korea, October 9-14, 2016}, pages = {4477--4482}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IROS.2016.7759659}, doi = {10.1109/IROS.2016.7759659}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/DieberKRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/RassW16, author = {Stefan Rass and Raphael Wigoutschnigg}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {Arguable anonymity from key-privacy: The deterministic crowds protocol}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {571--576}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502860}, doi = {10.1109/NOMS.2016.7502860}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/RassW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/KonigSR16, author = {Sandra K{\"{o}}nig and Stefan Schauer and Stefan Rass}, editor = {Billy Bob Brumley and Juha R{\"{o}}ning}, title = {A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks}, booktitle = {Secure {IT} Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10014}, pages = {67--81}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47560-8\_5}, doi = {10.1007/978-3-319-47560-8\_5}, timestamp = {Sun, 25 Oct 2020 22:36:50 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/KonigSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/BusbyGRK16, author = {Jerry S. Busby and Antonios Gouglidis and Stefan Rass and Sandra K{\"{o}}nig}, title = {Modelling security risk in critical utilities: The system at risk as a three player game and agent society}, booktitle = {2016 {IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2016, Budapest, Hungary, October 9-12, 2016}, pages = {1758--1763}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SMC.2016.7844492}, doi = {10.1109/SMC.2016.7844492}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smc/BusbyGRK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Rass16, author = {Stefan Rass}, title = {On the Existence of Weak One-Way Functions}, journal = {CoRR}, volume = {abs/1609.01575}, year = {2016}, url = {http://arxiv.org/abs/1609.01575}, eprinttype = {arXiv}, eprint = {1609.01575}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Rass16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RassSB15, author = {Stefan Rass and Peter Schartner and Monika Brodbeck}, title = {Private function evaluation by local two-party computation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {7}, year = {2015}, url = {https://doi.org/10.1186/s13635-015-0025-9}, doi = {10.1186/S13635-015-0025-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RassSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/RassRVGPS15, author = {Stefan Rass and Benjamin Rainer and Matthias Vavti and Johannes G{\"{o}}llner and Andreas Peer and Stefan Schauer}, title = {Secure Communication over Software-Defined Networks}, journal = {Mob. Networks Appl.}, volume = {20}, number = {1}, pages = {105--110}, year = {2015}, url = {https://doi.org/10.1007/s11036-015-0582-7}, doi = {10.1007/S11036-015-0582-7}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/RassRVGPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RassS15, author = {Stefan Rass and Peter Schartner}, title = {Licensed processing of encrypted information}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {703--704}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346894}, doi = {10.1109/CNS.2015.7346894}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RassS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/SeuschekR15, author = {Hermann Seuschek and Stefan Rass}, title = {Side-Channel Leakage Models for {RISC} Instruction Set Architectures from Empirical Data}, booktitle = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira, Portugal, August 26-28, 2015}, pages = {423--430}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSD.2015.117}, doi = {10.1109/DSD.2015.117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/SeuschekR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassKS15, author = {Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Uncertainty in Games: Using Probability-Distributions as Payoffs}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {346--357}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_20}, doi = {10.1007/978-3-319-25594-1\_20}, timestamp = {Thu, 17 Sep 2020 10:44:10 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RassKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/SingerR15, author = {Robert Singer and Stefan Ra{\ss}}, editor = {Albert Fleischmann and Werner Schmidt and Christian Stary}, title = {Embodying Business Rules in {S-BPM}}, booktitle = {{S-BPM} in the Wild, Practical Value Creation}, pages = {187--199}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17542-3\_11}, doi = {10.1007/978-3-319-17542-3\_11}, timestamp = {Thu, 23 Jun 2022 19:54:12 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/SingerR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/SingerR15a, author = {Robert Singer and Stefan Ra{\ss}}, editor = {Albert Fleischmann and Werner Schmidt and Christian Stary}, title = {Structured Communication - Approaching {S-BPM} with Microsoft Technologies}, booktitle = {{S-BPM} in the Wild, Practical Value Creation}, pages = {235--255}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17542-3\_14}, doi = {10.1007/978-3-319-17542-3\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/SingerR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Rass15, author = {Stefan Rass}, title = {On Game-Theoretic Risk Management (Part Two) - Algorithms to Compute Nash-Equilibria in Games with Distributions as Payoffs}, journal = {CoRR}, volume = {abs/1511.08591}, year = {2015}, url = {http://arxiv.org/abs/1511.08591}, eprinttype = {arXiv}, eprint = {1511.08591}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Rass15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RassSW15a, author = {Stefan Rass and Peter Schartner and Markus S. Wamser}, title = {Oblivious Lookup Tables}, journal = {CoRR}, volume = {abs/1505.00605}, year = {2015}, url = {http://arxiv.org/abs/1505.00605}, eprinttype = {arXiv}, eprint = {1505.00605}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RassSW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RassS14, author = {Stefan Rass and Peter Schartner}, title = {Hardware-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {38}, number = {11}, pages = {733}, year = {2014}, url = {https://doi.org/10.1007/s11623-014-0293-4}, doi = {10.1007/S11623-014-0293-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RassS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassR14, author = {Stefan Rass and Benjamin Rainer}, editor = {Radha Poovendran and Walid Saad}, title = {Numerical Computation of Multi-goal Security Strategies}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {118--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_7}, doi = {10.1007/978-3-319-12601-2\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iot360/RassRVGPS14, author = {Stefan Rass and Benjamin Rainer and Matthias Vavti and Johannes G{\"{o}}llner and Andreas Peer and Stefan Schauer}, editor = {Raffaele Giaffreda and Dagmar Cag{\'{a}}nov{\'{a}} and Yong Li and Roberto Riggio and Agn{\`{e}}s Voisard}, title = {Secure Communication over Software-Defined Networks}, booktitle = {Internet of Things. IoT Infrastructures - First International Summit, IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {151}, pages = {211--221}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19743-2\_31}, doi = {10.1007/978-3-319-19743-2\_31}, timestamp = {Fri, 27 Mar 2020 08:54:59 +0100}, biburl = {https://dblp.org/rec/conf/iot360/RassRVGPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/SantisR14, author = {Fabrizio De Santis and Stefan Rass}, editor = {Diego F. Aranha and Alfred Menezes}, title = {On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {127--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_7}, doi = {10.1007/978-3-319-16295-9\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/SantisR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RassS14, author = {Stefan Rass and Peter Schartner}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Chameleon-Hashing f{\"{u}}r Interaktive Beweise der Verf{\"{u}}gbarkeit dynamischer Daten in der Cloud}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {187--199}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20042}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RassS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/SingerKR14, author = {Robert Singer and Johannes Kotremba and Stefan Rass}, title = {Modeling and Execution of Multienterprise Business Processes}, booktitle = {{IEEE} 16th Conference on Business Informatics, {CBI} 2014, Geneva, Switzerland, July 14-17, 2014 - Volume 2}, pages = {68--73}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CBI.2014.13}, doi = {10.1109/CBI.2014.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/SingerKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SingerKR14, author = {Robert Singer and Johannes Kotremba and Stefan Ra{\ss}}, title = {Modeling and Execution of Multienterprise Business Processes}, journal = {CoRR}, volume = {abs/1404.7618}, year = {2014}, url = {http://arxiv.org/abs/1404.7618}, eprinttype = {arXiv}, eprint = {1404.7618}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SingerKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0031437, author = {Albert Fleischmann and Stefan Rass and Robert Singer}, title = {{S-BPM} Illustrated - {A} Storybook about Business Process Modeling and Execution}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36904-9}, doi = {10.1007/978-3-642-36904-9}, isbn = {978-3-642-36903-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0031437.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/Rass13, author = {Stefan Rass}, title = {On Game-Theoretic Network Security Provisioning}, journal = {J. Netw. Syst. Manag.}, volume = {21}, number = {1}, pages = {47--64}, year = {2013}, url = {https://doi.org/10.1007/s10922-012-9229-1}, doi = {10.1007/S10922-012-9229-1}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/Rass13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WigoutschniggSR13, author = {Raphael Wigoutschnigg and Peter Schartner and Stefan Rass}, title = {Shared Crowds: {A} Token-Ring Approach to Hide the Receiver}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {383--389}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.51}, doi = {10.1109/ARES.2013.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WigoutschniggSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/RassRVS13, author = {Stefan Rass and Benjamin Rainer and Matthias Vavti and Stefan Schauer}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu}, title = {A Network Modeling and Analysis Tool for Perfectly Secure Communication}, booktitle = {27th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2013, Barcelona, Spain, March 25-28, 2013}, pages = {267--275}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/AINA.2013.34}, doi = {10.1109/AINA.2013.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/RassRVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/RassKS13, author = {Stefan Rass and Johannes Kotremba and Robert Singer}, title = {The {S-BPM} Architecture: {A} Framework for Multi-agent Systems}, booktitle = {2013 {IEEE/WIC/ACM} International Conferences on Web Intelligence and Intelligent Agent Technology, Atlanta, Georgia, USA, 17-20 November 2013, Workshop Proceedings}, pages = {78--82}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WI-IAT.2013.154}, doi = {10.1109/WI-IAT.2013.154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/RassKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/RassK13, author = {Stefan Rass and Sebastian Kurowski}, editor = {Holger Morgenstern and Ralf Ehlert and Felix C. Freiling and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {On Bayesian Trust and Risk Forecasting for Compound Systems}, booktitle = {Seventh International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013}, pages = {69--82}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMF.2013.13}, doi = {10.1109/IMF.2013.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/RassK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Rass13, author = {Stefan Rass}, editor = {Pierangela Samarati}, title = {Dynamic Proofs of Retrievability from Chameleon-Hashes}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {296--304}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223178/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Rass13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KotrembaRS13, author = {Johannes Kotremba and Stefan Ra{\ss} and Robert Singer}, title = {Distributed Business Processes - {A} Framework for Modeling and Execution}, journal = {CoRR}, volume = {abs/1309.3126}, year = {2013}, url = {http://arxiv.org/abs/1309.3126}, eprinttype = {arXiv}, eprint = {1309.3126}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KotrembaRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Rass13, author = {Stefan Rass}, title = {Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption}, journal = {CoRR}, volume = {abs/1312.3146}, year = {2013}, url = {http://arxiv.org/abs/1312.3146}, eprinttype = {arXiv}, eprint = {1312.3146}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Rass13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rass12, author = {Stefan Rass}, title = {Neue L{\"{o}}sungsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {473}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0161-z}, doi = {10.1007/S11623-012-0161-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rass12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RassSWK12, author = {Stefan Rass and Peter Schartner and Raphael Wigoutschnigg and Christian Kollmitzer}, title = {Anonymous Communication by Branch-and-Bound}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {94--102}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.64}, doi = {10.1109/ARES.2012.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RassSWK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RassK12, author = {Stefan Rass and Michal Koza}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {On Secure Communication over Wireless Sensor Networks}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {364--367}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/RassK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SlamanigR11, author = {Daniel Slamanig and Stefan Rass}, title = {Redigierbare Digitale Signaturen - Theorie und Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {757--762}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0181-0}, doi = {10.1007/S11623-011-0181-0}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SlamanigR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnit/Rass11, author = {Stefan Rass}, title = {Information-Theoretic Security as an Optimization Problem}, journal = {J. Next Gener. Inf. Technol.}, volume = {2}, number = {3}, pages = {72--83}, year = {2011}, url = {https://doi.org/10.4156/jnit.vol2.issue3.6}, doi = {10.4156/JNIT.VOL2.ISSUE3.6}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnit/Rass11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RassWS11, author = {Stefan Rass and Raphael Wigoutschnigg and Peter Schartner}, title = {Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {27--41}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.027}, doi = {10.22667/JOWUA.2011.12.31.027}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RassWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/RassS11, author = {Stefan Rass and Peter Schartner}, title = {A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {41}, number = {1}, pages = {107--119}, year = {2011}, url = {https://doi.org/10.1109/TSMCC.2010.2050686}, doi = {10.1109/TSMCC.2010.2050686}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/RassS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RassWS11, author = {Stefan Rass and Raphael Wigoutschnigg and Peter Schartner}, title = {Crowds Based on Secret-Sharing}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {359--364}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.60}, doi = {10.1109/ARES.2011.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RassWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/SlamanigR11, author = {Daniel Slamanig and Stefan Rass}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Boris Shishkov}, title = {On Security and Privacy in Cloud Computing}, booktitle = {{CLOSER} 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, Netherlands, 7-9 May, 2011}, pages = {604--609}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 03 Mar 2016 19:04:34 +0100}, biburl = {https://dblp.org/rec/conf/closer/SlamanigR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/Rass11, author = {Stefan Rass}, editor = {Holger Morgenstern and Ralf Ehlert and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {Towards a Rapid-Alert System for Security Incidents}, booktitle = {Sixth International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2011, Stuttgart, Germany, May 10-12, 2011}, pages = {122--136}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMF.2011.10}, doi = {10.1109/IMF.2011.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/Rass11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RassS11, author = {Stefan Rass and Peter Schartner}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Information-leakage in Hybrid Randomized Protocols}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {134--143}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RassS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RassS10, author = {Stefan Rass and Peter Schartner}, title = {Quantenkryptographie - {\"{U}}berblick und aktuelle Entwicklungen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {753--757}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0205-1}, doi = {10.1007/S11623-010-0205-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RassS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/RassWS10, author = {Stefan Rass and Angelika Wiegele and Peter Schartner}, title = {Building a Quantum Network: How to Optimize Security and Expenses}, journal = {J. Netw. Syst. Manag.}, volume = {18}, number = {3}, pages = {283--299}, year = {2010}, url = {https://doi.org/10.1007/s10922-010-9162-0}, doi = {10.1007/S10922-010-9162-0}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/RassWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/RassS10, author = {Stefan Rass and Peter Schartner}, title = {Non-interactive Information Reconciliation for Quantum Key Distribution}, booktitle = {24th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2010, Perth, Australia, 20-13 April 2010}, pages = {1054--1060}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/AINA.2010.27}, doi = {10.1109/AINA.2010.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/RassS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RassSK10, author = {Stefan Rass and David Schuller and Christian Kollmitzer}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {166--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_16}, doi = {10.1007/978-3-642-13241-4\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/RassSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/SlamanigR10, author = {Daniel Slamanig and Stefan Rass}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {201--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_19}, doi = {10.1007/978-3-642-13241-4\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/SlamanigR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/RassS10, author = {Stefan Rass and Peter Schartner}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Multipath Authentication without shared Secrets and with Applications in Quantum Networks}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {111--115}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/RassS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/SlamanigR10, author = {Daniel Slamanig and Stefan Rass}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Selectively Traceable Anonymous and Unlinkable Token-Based Transactions}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {289--303}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_19}, doi = {10.1007/978-3-642-25206-8\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/SlamanigR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SlamanigR10, author = {Daniel Slamanig and Stefan Rass}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Anonymous but Authorized Transactions Supporting Selective Traceability}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {132--141}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SlamanigR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-1802, author = {Martin Schaffer and Stefan Rass}, title = {Fusion Discrete Logarithm Problems}, journal = {CoRR}, volume = {abs/1001.1802}, year = {2010}, url = {http://arxiv.org/abs/1001.1802}, eprinttype = {arXiv}, eprint = {1001.1802}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-1802.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:books/daglib/0024644, author = {Stefan Rass}, title = {On Information-Theoretic Security - Contemporary Problems and Solutions}, school = {epubli GmbH}, year = {2009}, timestamp = {Tue, 15 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0024644.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RassS09, author = {Stefan Rass and Peter Schartner}, title = {Security in Quantum Networks as an Optimization Problem}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {493--498}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.84}, doi = {10.1109/ARES.2009.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RassS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/SchartnerR09, author = {Peter Schartner and Stefan Rass}, title = {How to overcome the 'Trusted Node Model' in Quantum Cryptography}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {259--262}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.171}, doi = {10.1109/CSE.2009.171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/SchartnerR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/RassSG09, author = {Stefan Rass and Peter Schartner and Michaela Greiler}, title = {Quantum Coin-Flipping-Based Authentication}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199383}, doi = {10.1109/ICC.2009.5199383}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/RassSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/gi/Rass09, author = {Stefan Rass}, editor = {Abraham Bernstein and Steffen H{\"{o}}lldobler and G{\"{u}}nter Hotz and Klaus{-}Peter L{\"{o}}hr and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Dietmar Saupe and Myra Spiliopoulou and Harald St{\"{o}}rrle and Dorothea Wagner}, title = {{\"{U}}ber Informationstheoretische Sicherheit: Aktuelle Probleme und L{\"{o}}sungen}, booktitle = {Ausgezeichnete Informatikdissertationen 2009}, series = {{LNI}}, volume = {{D-10}}, pages = {201--210}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/33670}, timestamp = {Tue, 04 Jul 2023 17:43:57 +0200}, biburl = {https://dblp.org/rec/conf/gi/Rass09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/FuchsRK08, author = {Simone Fuchs and Stefan Rass and Kyandoghere Kyamakya}, title = {Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {11}, year = {2008}, url = {https://doi.org/10.14279/tuj.eceasst.11.127}, doi = {10.14279/TUJ.ECEASST.11.127}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/FuchsRK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/DrechslerBR08, author = {J{\"{o}}rg Drechsler and Stefan Bender and Susanne R{\"{a}}ssler}, title = {Comparing Fully and Partially Synthetic Datasets for Statistical Disclosure Control in the German {IAB} Establishment Panel}, journal = {Trans. Data Priv.}, volume = {1}, number = {3}, pages = {105--130}, year = {2008}, url = {http://www.tdp.cat/issues/abs.a006a08.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/DrechslerBR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ambisys/FuchsRLK08, author = {Simone Fuchs and Stefan Rass and Bernhard Lamprecht and Kyandoghere Kyamakya}, editor = {Ben Liang and Roger M. Whitaker}, title = {A model for ontology-based scene description for context-aware driver assistance systems}, booktitle = {1st International {ICST} Conference on Ambient Media and Systems, {AMBI-SYS} 2008, Quebec, Canada, February 11-13, 2008}, pages = {5}, publisher = {{ICST}}, year = {2008}, url = {https://doi.org/10.4108/ICST.AMBISYS2008.2869}, doi = {10.4108/ICST.AMBISYS2008.2869}, timestamp = {Wed, 14 Dec 2022 11:41:06 +0100}, biburl = {https://dblp.org/rec/conf/ambisys/FuchsRLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/KollmitzerMSR08, author = {Christian Kollmitzer and Oliver Maurhart and Stefan Schauer and Stefan Rass}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {Application framework for high security requirements in R{\&}D environments based on quantum cryptography}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {193--197}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757478}, doi = {10.1109/CRISIS.2008.4757478}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/KollmitzerMSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurossc/RassFK08, author = {Stefan Rass and Simone Fuchs and Kyandoghere Kyamakya}, editor = {Daniel Roggen and Clemens Lombriser and Gerhard Tr{\"{o}}ster and Gerd Kortuem and Paul J. M. Havinga}, title = {A Game-Theoretic Approach to Co-operative Context-Aware Driving with Partially Random Behavior}, booktitle = {Smart Sensing and Context, Third European Conference, EuroSSC 2008, Zurich, Switzerland, October 29-31, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5279}, pages = {154--167}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88793-5\_12}, doi = {10.1007/978-3-540-88793-5\_12}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/eurossc/RassFK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icqnm/RassSGK08, author = {Stefan Rass and Mohamed Ali Sfaxi and Solange Ghernaouti{-}Helie and Kyandoghere Kyamakya}, title = {Secure Message Relay over Networks with QKD-Links}, booktitle = {Second International Conference on Quantum, Nano, and Micro Technologies, {ICQNM} 2008, February 10-15, 2008, Sainte Luce, Martinique, French Caribbean}, pages = {10--15}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICQNM.2008.14}, doi = {10.1109/ICQNM.2008.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icqnm/RassSGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icves/RassFK08, author = {Stefan Rass and Simone Fuchs and Kyandoghere Kyamakya}, title = {Towards a game-theoretic model of co-operative context-aware driving under random influences}, booktitle = {{IEEE} International Conference on Vehicular Electronics and Safety, {ICVES} 2008, Columbus, OH, USA, 22-24 September, 2008}, pages = {22--26}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICVES.2008.4640883}, doi = {10.1109/ICVES.2008.4640883}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icves/RassFK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/RassFSK08, author = {Stefan Rass and Simone Fuchs and Martin Schaffer and Kyandoghere Kyamakya}, editor = {Varsha K. Sadekar and Paolo Santi and Yih{-}Chun Hu and Martin Mauve}, title = {How to protect privacy in floating car data systems}, booktitle = {Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, {VANET} 2008, San Francisco, California, USA, September 15, 2008}, pages = {17--22}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1410043.1410047}, doi = {10.1145/1410043.1410047}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/RassFSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpnc/LamprechtRFK08, author = {Bernhard Lamprecht and Stefan Rass and Simone Fuchs and Kyandoghere Kyamakya}, title = {Fusion of an uncalibrated camera with velocity information for distance measurement from a moving camera on highways}, booktitle = {5th Workshop on Positioning, Navigation and Communication, {WPNC} 2008, Leibniz Universit{\"{a}}t Hannover, Hannover, Germany, March 27, 2008}, pages = {165--171}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WPNC.2008.4510371}, doi = {10.1109/WPNC.2008.4510371}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpnc/LamprechtRFK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/SchafferSR07, author = {Martin Schaffer and Peter Schartner and Stefan Rass}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {198--204}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/SchafferSR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itsc/LamprechtRFK07, author = {Bernhard Lamprecht and Stefan Rass and Simone Fuchs and Kyandoghere Kyamakya}, title = {Extrinsic Camera Calibration for an On-board Two-Camera System without overlapping Field of View}, booktitle = {{IEEE} Intelligent Transportation Systems Conference, {ITSC} 2007, Seattle, WA, USA, 30 September-3 October 2007}, pages = {265--270}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ITSC.2007.4357679}, doi = {10.1109/ITSC.2007.4357679}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/itsc/LamprechtRFK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/KimRLLE06, author = {Chul Kim and A. M. Rassau and Stefan Lachowicz and Mike Myung{-}Ok Lee and Kamran Eshraghian}, title = {3D-SoftChip: {A} Novel Architecture for Next-Generation Adaptive Computing Systems}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2006}, year = {2006}, url = {https://doi.org/10.1155/ASP/2006/75032}, doi = {10.1155/ASP/2006/75032}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/KimRLLE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mie/RodriguesRZBIRRSPNCHM06, author = {Jean Marie Rodrigues and Alan L. Rector and Pieter E. Zanstra and Robert H. Baud and Kerry Innes and Jeremy Rogers and Anne{-}Marie Rassinoux and Stefan Schulz and B{\'{e}}atrice Trombert Paviot and Huib ten Napel and Lucienne Clavel and Egbert J. van der Haring and Ceu Mateus}, editor = {Arie Hasman and Reinhold Haux and Johan van der Lei and Etienne De Clercq and Francis H. Roger France}, title = {An Ontology driven collaborative development for biomedical terminologies: from the French {CCAM} to the Australian {ICHI} coding system}, booktitle = {Ubiquity: Technologies for Better Health in Aging Societies - Proceedings of MIE2006, The XXst International Congress of the European Federation for Medical Informatics, Maastricht, The Netherlands, August 27-30, 2006}, series = {Studies in Health Technology and Informatics}, volume = {124}, pages = {863--868}, publisher = {{IOS} Press}, year = {2006}, url = {https://doi.org/10.3233/978-1-58603-647-8-863}, doi = {10.3233/978-1-58603-647-8-863}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mie/RodriguesRZBIRRSPNCHM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RassSG06, author = {Stefan Rass and Mohamed Ali Sfaxi and Solange Ghernaouti{-}Helie}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Achieving Unconditional Security in Existing Networks Using Quantum Cryptography}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {207--210}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 28 Sep 2006 10:10:32 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RassSG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/RasserJLWSTBTT05, author = {Paul E. Rasser and Patrick J. Johnston and Jim Lagopoulos and Philip B. Ward and Ulrich Schall and Renate Thienel and Stefan Bender and Arthur W. Toga and Paul M. Thompson}, title = {Functional {MRI} {BOLD} response to Tower of London performance of first-episode schizophrenia patients using cortical pattern matching}, journal = {NeuroImage}, volume = {26}, number = {3}, pages = {941--951}, year = {2005}, url = {https://doi.org/10.1016/j.neuroimage.2004.11.054}, doi = {10.1016/J.NEUROIMAGE.2004.11.054}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neuroimage/RasserJLWSTBTT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsi/KimRLNE05, author = {Chul Kim and A. M. Rassau and Stefan Lachowicz and Saeid Nooshabadi and Kamran Eshraghian}, editor = {Ricardo Augusto da Luz Reis and Adam Osseiran and Hans{-}J{\"{o}}rg Pfleiderer}, title = {3D-SoftChip: {A} Novel 3D Vertically Integrated Adaptive Computing System}, booktitle = {VLSI-SoC: From Systems To Silicon, Proceedings of {IFIP} {TC} 10, {WG} 10.5, Thirteenth International Conference on Very Large Scale Integration of System on Chip (VLSI-SoC 2005), October 17-19, 2005, Perth, Australia}, series = {{IFIP}}, volume = {240}, pages = {71--86}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-0-387-73661-7\_6}, doi = {10.1007/978-0-387-73661-7\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vlsi/KimRLNE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/delta/LeeLLRELA04, author = {Seung{-}Min Lee and Stefan Lachowicz and David Lucas and A. M. Rassau and Kamran Eshraghian and Mike Myung{-}Ok Lee and Kamal E. Alameh}, title = {A Novel Design of Beam Steering n-phase {OPTO-ULSI} Processor for {IIPS}}, booktitle = {2nd {IEEE} International Workshop on Electronic Design, Test and Applications {(DELTA} 2004), 28-30 January 2004, Perth, Australia}, pages = {395--402}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/DELTA.2004.10032}, doi = {10.1109/DELTA.2004.10032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/delta/LeeLLRELA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/RassauYCLECW98, author = {A. M. Rassau and T. C. B. Yu and H. Cheung and Stefan Lachowicz and Kamran Eshraghian and William A. Crossland and Tim D. Wilkinson}, editor = {Patrick M. Dewilde and Franz J. Rammig and Gerry Musgrave}, title = {Smart Pixel Implementation of a 2-D Parallel Nucleic Wavelet Transform for Mobile Multimedia Communications}, booktitle = {1998 Design, Automation and Test in Europe {(DATE} '98), February 23-26, 1998, Le Palais des Congr{\`{e}}s de Paris, Paris, France}, pages = {191--195}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/DATE.1998.655856}, doi = {10.1109/DATE.1998.655856}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/RassauYCLECW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.