- user-agent string".
Unger T,
Mulazzani M, Frühwirt D,
Huber M,
Schrittwieser S,
Weippl E (September 2013). SHPF:
Enhancing HTTP(S)
Session Security with Browser...
-
November 2023. Judmayer, Aljosha; Stifter, Nicholas; Krombholz, Katharina;
Weippl,
Edgar (2017). "History of
Cryptographic Currencies".
Blocks and Chains...
- 2013-04-06{{citation}}: CS1 maint:
multiple names:
authors list (link) Racz, N.,
Weippl, E. & Seufert, A. (2010), Bart De Decker;
Ingrid Schaumüller-Bichl (eds...
- Online. Que. p. 6. ISBN 9780132713900. Krombholz, Katharina; Merkl, Dieter;
Weippl,
Edgar (26 July 2012). "Fake
Identities in
Social Media: A Case
Study on...
-
Retrieved 9
September 2022. Biffl, Stefan; Eckhart, Matthias; Lüder, Arndt;
Weippl,
Edgar (2019).
Security and
Quality in Cyber-Physical
Systems Engineering...
- 2021-03-02. Judmayer, Aljosha; Stifter, Nicholas; Krombholz, Katharina;
Weippl,
Edgar (2022) [2017].
Blocks and Chains:
Introduction to Bitcoin, Cryptocurrencies...
- set intersection"
Archived 2017-07-11 at the
Wayback Machine. In
Edgar R.
Weippl,
Stefan Katzenbeisser,
Christopher Kruegel,
Andrew C. Myers, and Shai Halevi...
-
Abstractions of
Bayesian Belief Networks". In Pernul, Günther; Y A Ryan, Peter;
Weippl,
Edgar (eds.).
Computer Security --
ESORICS 2015.
Lecture Notes in Computer...
-
Retrieved 2023-04-25. Wenzl, Matthias; Merzdovnik, Georg; Ullrich, Johanna;
Weippl,
Edgar R. (June 2019) [February 2019,
November 2018, May 2018]. "From hack...
- (1903) Beiträge zur
Naturgeschichte der
Honigbiene (1910) [with
Theodor Weippl and
Enoch Zander] Der
Entwicklungsgedanke in der gegenwärtigen Natur- und...