We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Technology-Enabled Innovation for Democracy, Government and Governance
Leitold H., Kö A., Leitner C., Prosser A.
Springer, 2013
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Teufl P., Ferk M., Fitzek A., Hein D., Orthacker C., Kraxberger S.
Security and communication networks, Vol. 9, 2013
Group Signatures on Mobile Devices: Practical Experiences
Potzmader K., Winter J., Hein D., Hanser C., Teufl P., Chen L.
Trust and trustworthy computing
Secure Hardware-Based Public Cloud Storage
Zwattendorfer B., Suzic B., Teufl P., Derler A.
Open Identity Summit 2013
Towards a Certified Electronic Mail System
Tauber A., Draper-Gil G., Ferrer-Gomila J., Hinarejos M.
Architectures and Protocols for Secure Information Technology, IGI Global, 46-70, 2013
Cloud Computing in E-Government across Europe
Zwattendorfer B., Stranacher K., Tauber A., Reichstädter P.
Technology-Enabled Innovation for Democracy, Government and Governance
Towards a Federated Identity as a Service Model
Zwattendorfer B., Stranacher K., Tauber A.
Technology-Enabled Innovation for Democracy, Government and Governance
Linear Propagation of Information in Differential Collision Attacks
Eichlseder M.
Master's Thesis, 2013
Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies
Könighofer R., Hofferek G., Bloem R.
International Journal on Software Tools for Technology Transfer, Vol. 15(5-6), 2013
Towards Efficient Parameterized Synthesis
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation
PARTY: parameterized synthesis of token rings
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification
Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Electronic Journal of e-Government , Vol. 11(2), 2013
Towards a Modular Architecture for Adaptable Signature-Verification Tools
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies
Effizientes Testen von E-Government Komponenten in der Cloud
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security
Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 2013
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes
The Public Cloud for e-Government
Zwattendorfer B., Tauber A.
International Journal of Distributed Systems and Technologies , Vol. 4(4), 2013
Cross-border certified electronic mailing: A European perspective
Tauber A., Kustor P., Karning B.
Computer Law & Security Review , Vol. 29(1), 2013
Elektronische Identität und Stellvertretung in Österreich
Tauber A., Zwattendorfer B., Stranacher K.
D-A-CH Security 2013
