We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Improving the Security of SMS-Based Services Using Electronic Signatures
Zefferer T., Tauber A., Zwattendorfer B.
International Conference on Web Information Systems and Technologies
Usability Evaluation of Electronic Signature Based E-Government Solutions
Zefferer T., Krnjic V.
Proceedings of the IADIS International Conference WWW/INTERNET 2012
STORK - Technical Approach and Privacy
Leitold H., Posch R.
Digital Enlightenment Yearbook 2012, IOS Press, 289-306, 2012
Middleware Architecture for Cross-Border eID
Zwattendorfer B., Sumelong I., Leitold H.
International Conference on Information Assurance and Security
Synthesizing Robust Systems with RATSY
Bloem R., Gamauf H., Hofferek G., Könighofer B., Könighofer R.
Proceedings First Workshop on Synthesis (SYNT 2012)
Advancing Democracy, Government and Governance
Kö A., Leitner C., Leitold H., Prosser A.
Springer, 2012
Online-Vollmachten
Tauber A.
eGovernment Review, Vol. 9, 2012
Cross-border Certified Electronic Mailing: A Scalable Interoperability Framework for Certified Mail Systems
Tauber A.
Doctoral Thesis, 2012
SPOCS: Interoperable eGovernment Services in the Context of the Services Directive
Tauber A., Stranacher K., Medimorec D.
European Journal of ePractice, Vol. 14, 2012
Cross-Border Legal Identity Management
Zwattendorfer B., Tauber A., Stranacher K., Reichstädter P.
Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012
Secure Cloud Authentication using eIDs
Zwattendorfer B., Tauber A.
Proceedings of IEEE CCIS2012
Secure Cross-Cloud Single Sign-On (SSO) using eIDs
Zwattendorfer B., Tauber A.
ICITST-2012 Proceedings
Bürgerkarten-Authentifizierung zur Public Cloud
Zwattendorfer B., Stranacher K., Tauber A.
D-A-CH Security 2012
The Public Cloud for E-Government
Zwattendorfer B., Tauber A.
IADIS International Conferences Web Based Communities and Social Media and Collaborative Technologies 2012
Tools in the Cryptanalysis of Symmetric Primitives
Nad T.
Doctoral Thesis, 2012
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Eisenbarth T., Gong Z., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
Progress in Cryptology – AFRICACRYPT 2012 Fifth International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings
Generalized Reactivity(1) Synthesis without a Monolithic Strategy
Schlaipfer M., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing
FoREnSiC - An Automatic Debugging Environment for C Programs
Bloem R., Drechsler R., Fey G., Finder A., Hofferek G., Könighofer R., Raik J., Repinski U., Sülflow A.
Haifa Verification Conference
Repair with On-The-Fly Program Analysis
Könighofer R., Bloem R.
Hardware and Software: Verification and Testing
Approaching the Challenge of eID Interoperability: An Austrian Perspective
Tauber A., Zefferer T., Zwattendorfer B.
European Journal of ePractice, Vol. 2012(14), 2012
