We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
A Server-Based Signature Solution for Mobile Devices
Zefferer T.
The 12th International Conference on Advances in Mobile Computing and Multimedia
STORK 2.0: Breaking New Grounds on eID and Mandates
Leitold H., Lioy A., Ribeiro C.
Proceedings of ID World International Congress
Supporting Decision Making and Policy Through Large Scale Pilots
Leitold H.
Advances in Human Factors and Ergonomics 2014
Identitätsmanagement in Österreich mit MOA-ID 2.0
Lenz T., Zwattendorfer B., Stranacher K., Tauber A.
eGovernment Review, 2014
Malicious Hashing: Eve's Variant of SHA-1
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography
Keeping Secrets on Low-Cost Chips
Mangard S.
IEEE Security & Privacy, Vol. 11(4), 2013
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India
Sicheres Speichern in der Public Cloud mittels Smart Cards
Zwattendorfer B., Suzic B., Teufl P., Derler A.
D-A-CH Security 2013
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography
Secure and Privacy-Preserving Proxy Voting System
Zwattendorfer B., Hillebold C., Teufl P.
IEEE 10th International Conference on e-Business Engineering
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies
Mobile Device Encryption Systems
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference
Assessing the Suitability of Current Smartphone Platforms for Mobile Government
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance
Model-Based MCDC Testing of Complex Decisions for the Java Card Applet Firewall
Bloem R., Greimel K., Könighofer R., Röck F.
VALID Proceedings
Harnessing Electronic Signatures to Improve the Security of SMS-based Services
Zefferer T., Tauber A., Zwattendorfer B.
Web Information Systems and Technologies, 331-346, 2013
The Austrian Identity Ecosystem – An e-Government Experience
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, IGI Global, 288-309, 2013
Authentische und integritätsgesicherte Verwaltungsdaten
Stranacher K., Krnjic V., Zefferer T.
eGovernment Review, Vol. 11, 2013
Enhancing the Modularity and Applicability of Web-Based Signature-Verication Tools
Lenz T., Stranacher K., Zefferer T.
Webist 2013 Selected and revised papers, 173-188, 2013
Trust and Reliability for Public Sector Data
Stranacher K., Krnjic V., Zefferer T.
Proceedings of International Conference on e-Business and e-Government
