We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Generalized Reactivity(1) Synthesis without a Monolithic Strategy
Schlaipfer M., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing
FoREnSiC - An Automatic Debugging Environment for C Programs
Bloem R., Drechsler R., Fey G., Finder A., Hofferek G., Könighofer R., Raik J., Repinski U., Sülflow A.
Haifa Verification Conference
Repair with On-The-Fly Program Analysis
Könighofer R., Bloem R.
Hardware and Software: Verification and Testing
Approaching the Challenge of eID Interoperability: An Austrian Perspective
Tauber A., Zefferer T., Zwattendorfer B.
European Journal of ePractice, Vol. 2012(14), 2012
Qualified PDF signatures on mobile phones
Zefferer T., Tauber A., Zwattendorfer B., Stranacher K.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and IFIP ePart 2012
An Interoperability Standard for Certified Mail Systems
Tauber A., Apitzsch J., Boldrin L.
Computer Standards & Interfaces, Vol. 34(5), 2012
Specification-centered robustness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
2011 6th International Symposium on Industrial Embedded Systems
One for all - all for one: unifying standard differential power analysis attacks
Mangard S., Elisabeth O., Standaert F.
IET Information Security, 2011
Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks
Medwed M., Mangard S.
Design, Automation and Test in Europe
acTvSM Deliverable 6.1: Business Model and Product Roadmap
Tögl R., Pirker M., Bloem R., Lindsberger G., Posch S.
2011
Secure and Privacy-preserving eGovernment - Best Practice Austria
Posch K., Posch R., Tauber A., Zefferer T., Zwattendorfer B.
Rainbow of Computer Science, Springer, 259-269, 2011
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 2011
Technologiebeobachtung "Mobile Government - Stocktacking of Current Trends and Initiatives"
Zefferer T.
2011
Bedrohungsanalyse und Sicherheitsanforderungen für M-Government Applikationen
Zefferer T., Teufl P.
2011
Mobile Platform Information Flow Security
Hein D., Teufl P., Zefferer T.
2011
Grenzüberschreitendes E-Government in Europa
Tauber A., Zwattendorfer B., Zefferer T., Stranacher K.
eGovernment Review, Vol. 8, 2011
A Privacy-Preserving eID based Single Sign-On Solution
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011)
Secure and Privacy-preserving Cross-border Authentication: the STORK Pilot "SaferChat"
Knall T., Tauber A., Zefferer T., Zwattendorfer B., Axfjord A., Bjarnason H.
Proceedings of the Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2011)
E-ID Meets E-Health on a Pan-European Level
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the IADIS International Conference e-Health 2011
Secure and Reliable Online-Verification of Electronic Signatures in the Digital Age
Zefferer T., Tauber A., Zwattendorfer B., Knall T.
Proceedings of the IADIS International Conference WWW/INTERNET 2011
