We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Towards Mobile Government: Verification of Electronic Signatures on Smartphones
Zefferer T., Golser F., Lenz T.
Technology-Enabled Innovation for Democracy, Government and Governance
A Survey and Analysis of NFC-based Payment Solutions for Smartphones
Zefferer T.
IADIS International Conference e-Society 2013
Synthesizing Multiple Boolean Functions using Interpolation on a Single Proof
Hofferek G., Gupta A., Könighofer B., Jiang J., Bloem R.
2013 Formal Methods in Computer-Aided Design, FMCAD 2013
Technology-Enabled Innovation for Democracy, Government and Governance
Leitold H., Kö A., Leitner C., Prosser A.
Springer, 2013
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Teufl P., Ferk M., Fitzek A., Hein D., Orthacker C., Kraxberger S.
Security and communication networks, Vol. 9, 2013
Group Signatures on Mobile Devices: Practical Experiences
Potzmader K., Winter J., Hein D., Hanser C., Teufl P., Chen L.
Trust and trustworthy computing
Secure Hardware-Based Public Cloud Storage
Zwattendorfer B., Suzic B., Teufl P., Derler A.
Open Identity Summit 2013
Towards a Certified Electronic Mail System
Tauber A., Draper-Gil G., Ferrer-Gomila J., Hinarejos M.
Architectures and Protocols for Secure Information Technology, IGI Global, 46-70, 2013
Cloud Computing in E-Government across Europe
Zwattendorfer B., Stranacher K., Tauber A., Reichstädter P.
Technology-Enabled Innovation for Democracy, Government and Governance
Towards a Federated Identity as a Service Model
Zwattendorfer B., Stranacher K., Tauber A.
Technology-Enabled Innovation for Democracy, Government and Governance
Linear Propagation of Information in Differential Collision Attacks
Eichlseder M.
Master's Thesis, 2013
Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies
Könighofer R., Hofferek G., Bloem R.
International Journal on Software Tools for Technology Transfer, Vol. 15(5-6), 2013
Towards Efficient Parameterized Synthesis
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation
PARTY: parameterized synthesis of token rings
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification
Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Electronic Journal of e-Government , Vol. 11(2), 2013
Towards a Modular Architecture for Adaptable Signature-Verification Tools
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies
Effizientes Testen von E-Government Komponenten in der Cloud
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security
Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 2013
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes
