We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Model-Based MCDC Testing of Complex Decisions for the Java Card Applet Firewall
Bloem R., Greimel K., Könighofer R., Röck F.
VALID Proceedings
Harnessing Electronic Signatures to Improve the Security of SMS-based Services
Zefferer T., Tauber A., Zwattendorfer B.
Web Information Systems and Technologies, 331-346, 2013
The Austrian Identity Ecosystem – An e-Government Experience
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, IGI Global, 288-309, 2013
Authentische und integritätsgesicherte Verwaltungsdaten
Stranacher K., Krnjic V., Zefferer T.
eGovernment Review, Vol. 11, 2013
Enhancing the Modularity and Applicability of Web-Based Signature-Verication Tools
Lenz T., Stranacher K., Zefferer T.
Webist 2013 Selected and revised papers, 173-188, 2013
Trust and Reliability for Public Sector Data
Stranacher K., Krnjic V., Zefferer T.
Proceedings of International Conference on e-Business and e-Government
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography
Towards Mobile Government: Verification of Electronic Signatures on Smartphones
Zefferer T., Golser F., Lenz T.
Technology-Enabled Innovation for Democracy, Government and Governance
Mobile Device Encryption Systems
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference
A Survey and Analysis of NFC-based Payment Solutions for Smartphones
Zefferer T.
IADIS International Conference e-Society 2013
Assessing the Suitability of Current Smartphone Platforms for Mobile Government
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies
Technology-Enabled Innovation for Democracy, Government and Governance
Leitold H., Kö A., Leitner C., Prosser A.
Springer, 2013
Synthesizing Multiple Boolean Functions using Interpolation on a Single Proof
Hofferek G., Gupta A., Könighofer B., Jiang J., Bloem R.
2013 Formal Methods in Computer-Aided Design, FMCAD 2013
Towards a Certified Electronic Mail System
Tauber A., Draper-Gil G., Ferrer-Gomila J., Hinarejos M.
Architectures and Protocols for Secure Information Technology, IGI Global, 46-70, 2013
Cloud Computing in E-Government across Europe
Zwattendorfer B., Stranacher K., Tauber A., Reichstädter P.
Technology-Enabled Innovation for Democracy, Government and Governance
Towards a Federated Identity as a Service Model
Zwattendorfer B., Stranacher K., Tauber A.
Technology-Enabled Innovation for Democracy, Government and Governance
Linear Propagation of Information in Differential Collision Attacks
Eichlseder M.
Master's Thesis, 2013
Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies
Könighofer R., Hofferek G., Bloem R.
International Journal on Software Tools for Technology Transfer, Vol. 15(5-6), 2013
