We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
An Overview of Cloud Identity Management-Models
Zwattendorfer B., Zefferer T., Stranacher K.
Proceedings of the 10th International Conference on Web Information Systems and Technologies, 10th International Conference on Web Information Systems and Technologies, 82-92
An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
Tauber A.
IEEE Conference on Communications and Network Security, IEEE Conference on Communications and Network Security
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Eichlseder M., Mendel F., Schläffer M.
Fast Software Encryption. FSE 2014, 2014 Fast Software Encryption Workshop, 473-488, (Lecture Notes in Computer Science; vol. 8540)
Key Recovery Attacks on Recent Authenticated Ciphers
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014, International Conference on Cryptology and Information Security in Latin America, 274-287, (LNCS)
Multi-platform Operating System Kernels
Gruß D.
, Master's Thesis
Automatic Error Localization for Software using Deductive Verification
Könighofer R., Tögl R., Bloem R.
Hardware and Software: Verification and Testing - Proceedings of the 10th International Haifa Verification Conference (HVC 2014), Haifa Verification Conference, 92-98, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8855)
SAT-based methods for circuit synthesis
Bloem R., Egly U., Klampfl P., Könighofer R., Lonsing F.
Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 31-34
SAT-Based Synthesis Methods for Safety Specs
Bloem R., Könighofer R., Seidl M.
Verification, Model Checking, and Abstract Interpretation, 15th International Conference, International Conference on Verification, Model Checking, and Abstract Interpretation, 1-20, (Lecture Notes in Computer Science; vol. 8318)
A Server-Based Signature Solution for Mobile Devices
Zefferer T.
The 12th International Conference on Advances in Mobile Computing and Multimedia, 12th International Conference on Advances in Mobile Computing & Multimedia (MoMM2014), 175-184
STORK 2.0: Breaking New Grounds on eID and Mandates
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress, 2014 ID World International Congress, 1-8
Supporting Decision Making and Policy Through Large Scale Pilots
Leitold H.
Advances in Human Factors and Ergonomics 2014, 5th International Conference on Applied Human Factors and Ergonomics, 2669-2679
Identitätsmanagement in Österreich mit MOA-ID 2.0
Lenz T., Zwattendorfer B., Stranacher K., Tauber A.
eGovernment Review, 18-19
Malicious Hashing: Eve's Variant of SHA-1
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 1-19, (Lecture Notes in Computer Science; vol. 8781)
Keeping Secrets on Low-Cost Chips
Mangard S.
IEEE Security & Privacy, Vol. 11(4), 75-77
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India, 215-226
Sicheres Speichern in der Public Cloud mittels Smart Cards
Zwattendorfer B., Suzic B., Teufl P., Derler A.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 120-132
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT, 10th International Joint Conference on e-Business and Telecommunications, 170-182
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography, 10th International Conference on Security and Cryptography, 347-354
Secure and Privacy-Preserving Proxy Voting System
Zwattendorfer B., Hillebold C., Teufl P.
IEEE 10th International Conference on e-Business Engineering, Workshop on Cloud Computing for Mechatronic Systems, 472-477
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, Association for Computing Machinery (ACM), 0-0