We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation
Rath C., Roth S., Bratko H., Zefferer T.
Electronic Government and the Information Systems Perspective. EGOVIS 2015, 4th International Conference on Electronic Government and the Information Systems Perspective , 71-85, (Lecture Notes in Computer Science; vol. 9265)
POWER: A Cloud-based Mobile Augmentation Approach for Web- and Cross-Platform Applications
Reiter A., Zefferer T.
2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 4th International Conference on Cloud Networking, 226-231
Paving the Way for Security in Cloud-Based Mobile Augmentation Systems
Reiter A., Zefferer T.
3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015), 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 89-98
Secure single sign-on authentication using eIDs across public clouds
Zwattendorfer B., Tauber A.
International Journal of Internet Technology and Secured Transactions, Vol. 5(4), 291-306
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 490-509, ( Lecture Notes in Computer Science; vol. 9453)
Forgery Attacks on round-reduced ICEPOLE-128
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015, 22nd International Workshop on Selected Areas in Cryptography, 479-492, (Lecture Notes in Computer Science; vol. 9566)
Cryptanalysis of Ascon
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015, Cryptographers´ Track at the RSA Conference, 371-387, (Lecture Notes in Computer Science; vol. 9048)
Related-Key Forgeries for Proest-OTR
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015, 2015 Fast Software Encryption Workshop, 282-296, (Lecture Notes in Computer Science(; vol. 9054)
On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014, 2014 International Conference on Smart Card Research and Advanced Applications, 233-244, ( Lecture Notes in Computer Science; vol. 8968)
Do you think your passwords are secure?
Ziegler D., Stromberger C., Rauter M., Teufl P., Hein D.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Android - On-Device Detection of SMS Catchers and Sniffers
Teufl P., Zefferer T., Wörgötter C., Oprisnik A., Hein D.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
Android Encryption Systems
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
How to Handle Assumptions in Synthesis
Bloem R., Ehlers R., Jacobs S., Könighofer R.
Proceedings 3rd Workshop on Synthesis (SYNT 2014), Workshop on Synthesis (SYNT 2014), 34-50, (EPTCS; vol. 157)
Parameterized Synthesis Case Study: AMBA AHB
Khalimov A., Bloem R., Jacobs S.
SYNT 2014, 68-83
Automating Test-Suite Augmentation
Bloem R., Könighofer R., Röck F., Tautschnig M.
International Conference on Quality Software, International Conference on Quality Software, 67-72
Security Concepts for a Distributed Architecture for Activity Logging and Analysis
Pammer-Schindler V., Stern H., Edler S., Hein D., Pirker M., Bloem R., Wertner A.
Proceeding i-KNOW '14 Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business, 14th International Conference on Knowledge Technologies and Data-driven Business (i-KNOW 2014), ?-?
Measuring Usability to Improve the Efficiency of Electronic Signature-based E-Government Solutions
Zefferer T., Krnjic V., Stranacher K., Zwattendorfer B.
Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders, 45-74
A Comparative Survey of Cloud Identity Management-Models
Zwattendorfer B., Zefferer T., Stranacher K.
Web Information Systems and Technologies 2014, Springer, 128-144
Synthesizing Robust Systems
Bloem R., Chatterjee K., Greimel K., Henzinger T., Hofferek G., Jobstmann B., Könighofer B., Könighofer R.
Acta informatica, Vol. 51(3), 193-220
Synthesis of Synchronization using Uninterpreted Functions
Bloem R., Hofferek G., Könighofer B., Könighofer R., Außerlechner S., Spörk R.
Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design FMCAD 2014, International Conference on Formal Methods in Computer-Aided Design, 35-42