We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
The Austrian Identity Ecosystem – An e-Government Experience
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, IGI Global, 288-309, (Advances in Information Security, Privacy, and Ethics (AISPE))
Authentische und integritätsgesicherte Verwaltungsdaten
Stranacher K., Krnjic V., Zefferer T.
eGovernment Review, Vol. 11, 30-31
Enhancing the Modularity and Applicability of Web-Based Signature-Verication Tools
Lenz T., Stranacher K., Zefferer T.
Webist 2013 Selected and revised papers, 173-188
Trust and Reliability for Public Sector Data
Stranacher K., Krnjic V., Zefferer T.
Proceedings of International Conference on e-Business and e-Government, International Conference on e-Business and e-Government, 124-132
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT, 10th International Joint Conference on e-Business and Telecommunications, 170-182
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography, 10th International Conference on Security and Cryptography, 347-354
Towards Mobile Government: Verification of Electronic Signatures on Smartphones
Zefferer T., Golser F., Lenz T.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 140-151
Synthesizing Multiple Boolean Functions using Interpolation on a Single Proof
Hofferek G., Gupta A., Könighofer B., Jiang J., Bloem R.
2013 Formal Methods in Computer-Aided Design, FMCAD 2013, 13th International Conference on Formal Methods in Computer-Aided Design, 77-84
Mobile Device Encryption Systems
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013), Auckland, New Zealand, 8-10 July 2013, 203-216
A Survey and Analysis of NFC-based Payment Solutions for Smartphones
Zefferer T.
IADIS International Conference e-Society 2013, 2013 IADIS International Conference e-Society, 275-282
Assessing the Suitability of Current Smartphone Platforms for Mobile Government
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 125-139
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, Association of Computing Machinery, 0-0
Technology-Enabled Innovation for Democracy, Government and Governance
Leitold H., Kö A., Leitner C., Prosser A.
, Springer, (LNCS)
Towards a Certified Electronic Mail System
Tauber A., Draper-Gil G., Ferrer-Gomila J., Hinarejos M.
Architectures and Protocols for Secure Information Technology, IGI Global, 46-70, (Advances in Information Security, Privacy, and Ethics (AISPE))
Cloud Computing in E-Government across Europe
Zwattendorfer B., Stranacher K., Tauber A., Reichstädter P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 181-195, (Lecture notes in computer science)
Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies
Könighofer R., Hofferek G., Bloem R.
International Journal on Software Tools for Technology Transfer, Vol. 15(5-6), 563-583
Towards a Federated Identity as a Service Model
Zwattendorfer B., Stranacher K., Tauber A.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 43-57, (Lecture notes in computer science)
Towards Efficient Parameterized Synthesis
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation, International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 108-127, (Lecture Notes in Computer Science)
PARTY: parameterized synthesis of token rings
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification, International Conference on Computer Aided Verification, 928 - 933, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8044 LNCS)