We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 768-773
Knowledge Extraction from RDF Data with Activation Patterns
Teufl P., Lackner G.
Journal of Universal Computer Science , Vol. 17(7), 983-1004
Extracting Semantic Knowledge from Twitter
Teufl P., Kraxberger S.
Third international conference on eParticipation (ePart 2011), 48-59
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics
Lackner G., Teufl P.
AISC, AISC, 0-0
Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services
Zefferer T., Teufl P.
Megatrends in eGovernment
acTvSM Deliverable 6.1: Business Model and Product Roadmap
Tögl R., Pirker M., Bloem R., Lindsberger G., Posch S.
Secure and Privacy-preserving eGovernment - Best Practice Austria
Posch K., Posch R., Tauber A., Zefferer T., Zwattendorfer B.
Rainbow of Computer Science, Springer, 259-269, (Lecture Notes in Computer Science)
Grenzüberschreitendes E-Government in Europa
Tauber A., Zwattendorfer B., Zefferer T., Stranacher K.
eGovernment Review, Vol. 8, 8-9
A Privacy-Preserving eID based Single Sign-On Solution
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011), 5th International Conference on Network and System Security, 295-299
Secure and Privacy-preserving Cross-border Authentication: the STORK Pilot "SaferChat"
Knall T., Tauber A., Zefferer T., Zwattendorfer B., Axfjord A., Bjarnason H.
Proceedings of the Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2011), 2nd International Conference on Electronic Government and the Information Systems Perspective, 94-106, (LNCS 6866)
E-ID Meets E-Health on a Pan-European Level
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the IADIS International Conference e-Health 2011, IADIS International Conference Interfaces and Human Computer Interaction 2011, Part of the IADIS Multi Conference on Computer Science and Information Systems 2011, 97-104
Secure and Reliable Online-Verification of Electronic Signatures in the Digital Age
Zefferer T., Tauber A., Zwattendorfer B., Knall T.
Proceedings of the IADIS International Conference WWW/INTERNET 2011, IADIS International Conference on WWW/Internet, 269-276
A Systematic Approach to Legal Identity Management - Best Practice Austria
Leitold H., Tauber A.
ISSE 2011 - Securing Electronic Business Processes, Information Security Solutions Europe Conference, 224-234
Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens
Tauber A.
Datenschutz und Datensicherheit, Vol. 35, 774-778
A survey of certified mail systems provided on the Internet
Tauber A.
Computers & Security, Vol. 30(6-7), 464-485
Enhancing Security and Privacy in Certified Mail Systems using Trust Domain Separation
Tauber A., Rössler T.
Information Security, Lecture Notes in Computer Science, Information Security Conference, 152-158, (6531)
Avoiding Disasters – Ensuring PKI‐service availability
Lipp P., Bratko H., Rath C.
Proceedings of the European Conference on e-Government ECEG 2011, European Conference on e-Government ECEG 2011, ?-?