We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Specification-centered robustness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
2011 6th International Symposium on Industrial Embedded Systems
One for all - all for one: unifying standard differential power analysis attacks
Mangard S., Elisabeth O., Standaert F.
IET Information Security, 2011
Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks
Medwed M., Mangard S.
Design, Automation and Test in Europe
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 2011
Knowledge Extraction from RDF Data with Activation Patterns
Teufl P., Lackner G.
Journal of Universal Computer Science , Vol. 17(7), 2011
Bedrohungsanalyse und Sicherheitsanforderungen für M-Government Applikationen
Zefferer T., Teufl P.
2011
Mobile Platform Information Flow Security
Hein D., Teufl P., Zefferer T.
2011
Extracting Semantic Knowledge from Twitter
Teufl P., Kraxberger S.
Third international conference on eParticipation (ePart 2011)
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics
Lackner G., Teufl P.
AISC
Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services
Zefferer T., Teufl P.
Megatrends in eGovernment, 2011
acTvSM Deliverable 6.1: Business Model and Product Roadmap
Tögl R., Pirker M., Bloem R., Lindsberger G., Posch S.
2011
Secure and Privacy-preserving eGovernment - Best Practice Austria
Posch K., Posch R., Tauber A., Zefferer T., Zwattendorfer B.
Rainbow of Computer Science, Springer, 259-269, 2011
Technologiebeobachtung "Mobile Government - Stocktacking of Current Trends and Initiatives"
Zefferer T.
2011
Grenzüberschreitendes E-Government in Europa
Tauber A., Zwattendorfer B., Zefferer T., Stranacher K.
eGovernment Review, Vol. 8, 2011
A Privacy-Preserving eID based Single Sign-On Solution
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011)
Secure and Privacy-preserving Cross-border Authentication: the STORK Pilot "SaferChat"
Knall T., Tauber A., Zefferer T., Zwattendorfer B., Axfjord A., Bjarnason H.
Proceedings of the Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2011)
E-ID Meets E-Health on a Pan-European Level
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the IADIS International Conference e-Health 2011
Secure and Reliable Online-Verification of Electronic Signatures in the Digital Age
Zefferer T., Tauber A., Zwattendorfer B., Knall T.
Proceedings of the IADIS International Conference WWW/INTERNET 2011
A Systematic Approach to Legal Identity Management - Best Practice Austria
Leitold H., Tauber A.
ISSE 2011 - Securing Electronic Business Processes
Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens
Tauber A.
Datenschutz und Datensicherheit, Vol. 35, 2011
