Hybrid mobile edge computing: Unleashing the full potential of edge computing in mobile device use cases A Reiter, B Prünster, T Zefferer 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017 | 48 | 2017 |
Total eclipse of the heart–disrupting the {InterPlanetary} file system B Prünster, A Marsalek, T Zefferer 31st USENIX Security Symposium (USENIX Security 22), 3735-3752, 2022 | 19 | 2022 |
Phish-hook: Detecting phishing certificates using certificate transparency logs E Fasllija, HF Enişer, B Prünster Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 19 | 2019 |
Balancing utility and security: Securing cloud federations of public entities B Suzic, B Prünster, D Ziegler, A Marsalek, A Reiter On the Move to Meaningful Internet Systems: OTM 2016 Conferences …, 2016 | 18 | 2016 |
Fides: Unleashing the Full Potential of Remote Attestation. B Prünster, G Palfinger, C Kollmann ICETE (2), 314-321, 2019 | 11 | 2019 |
A holistic approach towards peer-to-peer security and why proof of work won’t do B Prünster, D Ziegler, C Kollmann, B Suzic Security and Privacy in Communication Networks: 14th International …, 2018 | 8 | 2018 |
In Certificates We Trust--Revisited F Reimair, P Teufl, B Prünster 2015 IEEE Trustcom/BigDataSE/ISPA 1, 702-709, 2015 | 8 | 2015 |
Applying the formal concept analysis to introduce guidance in an inquiry-based learning environment MA Bedek, S Kopeinik, B Prünster, D Albert 2015 IEEE 15th International Conference on Advanced Learning Technologies …, 2015 | 7 | 2015 |
Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation. F Hörandner, B Prünster SECRYPT, 149-160, 2021 | 4 | 2021 |
AndroTIME: Identifying Timing Side Channels in the Android API G Palfinger, B Prünster, DJ Ziegler 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 4 | 2020 |
Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption. D Ziegler, A Marsalek, B Prünster, J Sabongui ICETE (2), 547-552, 2020 | 4 | 2020 |
On the structure and authorization management of restful web services B Suzic, B Prünster, D Ziegler Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1716-1724, 2018 | 4 | 2018 |
Cloud technology options towards Free Flow of Data E Rios, T Carnehult, B Prünster, B Suzic, E Prieto, N Notario, G Suciu, ... | 4 | 2017 |
Androprint: analysing the fingerprintability of the android api G Palfinger, B Prünster Proceedings of the 15th International Conference on Availability …, 2020 | 3 | 2020 |
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks. B Prünster, E Fasllija, D Mocher ICETE (2), 252-259, 2019 | 2 | 2019 |
Spoof-of-Work: Evaluating Device Authorisation in Mobile Mining Processes D Ziegler, B Prünster, A Marsalek, C Kollmann Proceedings of the 15th International Joint Conference on e-Business and …, 2018 | 2 | 2018 |
Multiply, Divide, and Conquer–Making Fully Decentralised Access Control a Reality B Prünster, D Ziegler, G Palfinger International Conference on Network and System Security, 311-326, 2020 | 1 | 2020 |
Prying CoW: Inferring Secrets across Virtual Machine Boundaries. G Palfinger, B Prünster, D Ziegler ICETE (2), 187-197, 2019 | 1 | 2019 |
SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform A Marsalek, B Prünster, B Suzic, T Zefferer Information Systems Security: 14th International Conference, ICISS 2018 …, 2018 | 1 | 2018 |
Grið–Secure Information Exchange Based on an Inverted Trust Model B Prünster | 1 | 2016 |