We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency, 1st IEEE International Conference on Blockchain and Cryptocurrency, 394-402
CrySIL: Bringing Crypto to the Modern User
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, Springer International Publishing, 70-90, (Lecture Notes in Business Information Processing; vol. 246)
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective, 4th International Conference on Electronic Government and the Information Systems Perspective , 86-100
In Certificates We Trust - Revisited
Reimair F., Teufl P., Prünster B.
Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), 702-709
Attribute-based Encryption goes X.509
Reimair F., Feichtner J., Teufl P.
IEEE International Conference on e-Business Engineering (ICEBE), IEEE International Conference on e-Business Engineering, 393-400
WebCrySIL - Web Cryptographic Service Interoperability Layer
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies, 11th International Conference on Web Information Systems and Technologies, 35-44
MoCrySIL - Carry Your Cryptographic Keys in Your Pocket
Reimair F., Teufl P., Kollmann C., Thaller C.
12th International Conference on Security and Cryptography, 285-292
Do you think your passwords are secure?
Ziegler D., Stromberger C., Rauter M., Teufl P., Hein D.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Android - On-Device Detection of SMS Catchers and Sniffers
Teufl P., Zefferer T., Wörgötter C., Oprisnik A., Hein D.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Android Encryption Systems
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Teufl P., Ferk M., Fitzek A., Hein D., Orthacker C., Kraxberger S.
Security and communication networks, Vol. 9, 389-419
Sicheres Speichern in der Public Cloud mittels Smart Cards
Zwattendorfer B., Suzic B., Teufl P., Derler A.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 120-132
Group Signatures on Mobile Devices: Practical Experiences
Potzmader K., Winter J., Hein D., Hanser C., Teufl P., Chen L.
Trust and trustworthy computing, 6th International Conference on Trust & Trustworthy Computing, 47-64, (Lecture Notes in Computer Science; vol. 7904)
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT, 10th International Joint Conference on e-Business and Telecommunications, 170-182
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography, 10th International Conference on Security and Cryptography, 347-354
Secure and Privacy-Preserving Proxy Voting System
Zwattendorfer B., Hillebold C., Teufl P.
IEEE 10th International Conference on e-Business Engineering, Workshop on Cloud Computing for Mechatronic Systems, 472-477
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, Association of Computing Machinery, 0-0
Mobile Device Encryption Systems
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013), Auckland, New Zealand, 8-10 July 2013, 203-216
Secure Hardware-Based Public Cloud Storage
Zwattendorfer B., Suzic B., Teufl P., Derler A.
Open Identity Summit 2013, Open Identity Summit 2013, 43-54
Assessing the Suitability of Current Smartphone Platforms for Mobile Government
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 125-139