We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Approaching the Challenge of eID Interoperability: An Austrian Perspective
Tauber A., Zefferer T., Zwattendorfer B.
European Journal of ePractice, Vol. 2012(14), 22-39
Qualified PDF signatures on mobile phones
Zefferer T., Tauber A., Zwattendorfer B., Stranacher K.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and IFIP ePart 2012, EGOV - IFIP e-Government Conference, 115-123, (Informatik)
An Interoperability Standard for Certified Mail Systems
Tauber A., Apitzsch J., Boldrin L.
Computer Standards & Interfaces, Vol. 34(5), 452-466
Differential Attacks on Reduced RIPEMD-160
Mendel F., Nad T., Scherz S., Schläffer M.
Information Security, 15th International Conference Information Security , 23-38, (Lecture Notes in Computer Science; vol. 7483)
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Mendel F., Nad T., Schläffer M.
Fast Software Encryption, 19th Fast Software Encryption Workshop, 226-243, (Lecture Notes in Computer Science; vol. 7549)
Specification-centered robustness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
2011 6th International Symposium on Industrial Embedded Systems, IEEE International Symposium on Industrial Embedded Systems, 176-185
One for all - all for one: unifying standard differential power analysis attacks
Mangard S., Elisabeth O., Standaert F.
IET Information Security, 100-110
Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks
Medwed M., Mangard S.
Design, Automation and Test in Europe, Design, Automation and Test in Europe Conference and Exhibition
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 768-773
Knowledge Extraction from RDF Data with Activation Patterns
Teufl P., Lackner G.
Journal of Universal Computer Science , Vol. 17(7), 983-1004
Extracting Semantic Knowledge from Twitter
Teufl P., Kraxberger S.
Third international conference on eParticipation (ePart 2011), 48-59
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics
Lackner G., Teufl P.
AISC, AISC, 0-0
Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services
Zefferer T., Teufl P.
Megatrends in eGovernment
acTvSM Deliverable 6.1: Business Model and Product Roadmap
Tögl R., Pirker M., Bloem R., Lindsberger G., Posch S.
Secure and Privacy-preserving eGovernment - Best Practice Austria
Posch K., Posch R., Tauber A., Zefferer T., Zwattendorfer B.
Rainbow of Computer Science, Springer, 259-269, (Lecture Notes in Computer Science)
Grenzüberschreitendes E-Government in Europa
Tauber A., Zwattendorfer B., Zefferer T., Stranacher K.
eGovernment Review, Vol. 8, 8-9
A Privacy-Preserving eID based Single Sign-On Solution
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011), 5th International Conference on Network and System Security, 295-299