We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Identitätsmanagement in Österreich mit MOA-ID 2.0
Lenz T., Zwattendorfer B., Stranacher K., Tauber A.
eGovernment Review, 2014
Malicious Hashing: Eve's Variant of SHA-1
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography
Keeping Secrets on Low-Cost Chips
Mangard S.
IEEE Security & Privacy, Vol. 11(4), 2013
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India
Sicheres Speichern in der Public Cloud mittels Smart Cards
Zwattendorfer B., Suzic B., Teufl P., Derler A.
D-A-CH Security 2013
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography
Secure and Privacy-Preserving Proxy Voting System
Zwattendorfer B., Hillebold C., Teufl P.
IEEE 10th International Conference on e-Business Engineering
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies
Mobile Device Encryption Systems
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference
Assessing the Suitability of Current Smartphone Platforms for Mobile Government
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance
Model-Based MCDC Testing of Complex Decisions for the Java Card Applet Firewall
Bloem R., Greimel K., Könighofer R., Röck F.
VALID Proceedings
Harnessing Electronic Signatures to Improve the Security of SMS-based Services
Zefferer T., Tauber A., Zwattendorfer B.
Web Information Systems and Technologies, 331-346, 2013
The Austrian Identity Ecosystem – An e-Government Experience
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, IGI Global, 288-309, 2013
Authentische und integritätsgesicherte Verwaltungsdaten
Stranacher K., Krnjic V., Zefferer T.
eGovernment Review, Vol. 11, 2013
Enhancing the Modularity and Applicability of Web-Based Signature-Verication Tools
Lenz T., Stranacher K., Zefferer T.
Webist 2013 Selected and revised papers, 173-188, 2013
Trust and Reliability for Public Sector Data
Stranacher K., Krnjic V., Zefferer T.
Proceedings of International Conference on e-Business and e-Government
Towards Mobile Government: Verification of Electronic Signatures on Smartphones
Zefferer T., Golser F., Lenz T.
Technology-Enabled Innovation for Democracy, Government and Governance
A Survey and Analysis of NFC-based Payment Solutions for Smartphones
Zefferer T.
IADIS International Conference e-Society 2013
Synthesizing Multiple Boolean Functions using Interpolation on a Single Proof
Hofferek G., Gupta A., Könighofer B., Jiang J., Bloem R.
2013 Formal Methods in Computer-Aided Design, FMCAD 2013
