-
November 2023. Judmayer, Aljosha; Stifter, Nicholas; Krombholz, Katharina;
Weippl,
Edgar (2017). "History of
Cryptographic Currencies".
Blocks and Chains...
- user-agent string".
Unger T,
Mulazzani M, Frühwirt D,
Huber M,
Schrittwieser S,
Weippl E (September 2013). SHPF:
Enhancing HTTP(S)
Session Security with Browser...
-
Retrieved 9
September 2022. Biffl, Stefan; Eckhart, Matthias; Lüder, Arndt;
Weippl,
Edgar (2019).
Security and
Quality in Cyber-Physical
Systems Engineering...
- from the
original (PDF) on 2012-03-12,
retrieved 2013-04-06 Racz, Nicolas;
Weippl, Edgar; Seufert,
Andreas (2010), Bart De Decker;
Ingrid Schaumüller-Bichl...
- Online. Que. p. 6. ISBN 9780132713900. Krombholz, Katharina; Merkl, Dieter;
Weippl,
Edgar (26 July 2012). "Fake
Identities in
Social Media: A Case
Study on...
- ISSN 1065-898X. S2CID 205732672. Krombholz, Katharina; Merkl, Dieter;
Weippl,
Edgar (December 2012). "Fake
identities in
social media: A case
study on...
- ISBN 9780128214695. Shandilya,
Shishir K.; Chun, Soon Ae; Shandilya, Smita;
Weippl,
Edgar (2018).
Internet of
Things Security: Fundamentals,
Techniques and...
- set intersection"
Archived 2017-07-11 at the
Wayback Machine. In
Edgar R.
Weippl,
Stefan Katzenbeisser,
Christopher Kruegel,
Andrew C. Myers, and Shai Halevi...
-
facilities and
personal remains a
challenge for the NCCP. Goss, Paul E; Str****er-
Weippl, Kathrin; Lee-Bychkovsky,
Brittany L; Fan, Lei; Li, Junjie; Chavarri-Guerra...
-
Abstractions of
Bayesian Belief Networks". In Pernul, Günther; Y A Ryan, Peter;
Weippl,
Edgar (eds.).
Computer Security --
ESORICS 2015.
Lecture Notes in Computer...