Mr Peter Kieseberg
SBA Research
Graduate Student, Computer Science
Austria
My Publications
Security and privacy of smartphone messaging applications
International Journal of Pervasive Computing and Communications
June 2015
Security tests for mobile applications — Why using TLS/SSL is not enough
April 2015
Towards a forensic-aware database solution: Using a secured database replication protoc...
Digital Investigation
December 2014
AES-SEC: Improving Software Obfuscation through Hardware-Assistance
September 2014
Covert Computation — Hiding code in code through compile-time obfuscation
Computers & Security
May 2014
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive micr...
Electronic Markets
April 2014
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applica...
January 2014
QR Code Security: A Survey of Attacks and Challenges for Usable Security
January 2014
Using Model Driven Security Approaches in Web Application Development
January 2014
E-voting Authentication with QR-codes
January 2014
Protecting Anonymity in Data-Driven Biomedical Science
January 2014
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from re...
Information Security Technical Report
May 2013
Data confidentiality using fragmentation in cloud computing
International Journal of Pervasive Computing and Communications
March 2013
Using the structure of B+‐trees for enhancing logging mechanisms of databases
International Journal of Web Information Systems
March 2013
Quantifying Windows File Slack Size and Stability
January 2013
Covert computation
January 2013
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs
August 2012
INMOTOS
January 2012
An Algorithm for k-Anonymity-Based Fingerprinting
January 2012
Malicious Pixels Using QR Codes as Attack Vector
January 2012
Digital forensics for enterprise rights management systems
January 2012
Trees Cannot Lie: Using Data Structures for Forensics Purposes
September 2011
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata...
August 2011
Using the structure of B+-trees for enhancing logging mechanisms of databases
January 2011
QR code security
January 2010
Anonymity and Pseudonymity in Data-Driven Science