We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Bürgerkarten-Authentifizierung zur Public Cloud
Zwattendorfer B., Stranacher K., Tauber A.
D-A-CH Security 2012
The Public Cloud for E-Government
Zwattendorfer B., Tauber A.
IADIS International Conferences Web Based Communities and Social Media and Collaborative Technologies 2012
Generalized Reactivity(1) Synthesis without a Monolithic Strategy
Schlaipfer M., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing
FoREnSiC - An Automatic Debugging Environment for C Programs
Bloem R., Drechsler R., Fey G., Finder A., Hofferek G., Könighofer R., Raik J., Repinski U., Sülflow A.
Haifa Verification Conference
Repair with On-The-Fly Program Analysis
Könighofer R., Bloem R.
Hardware and Software: Verification and Testing
Approaching the Challenge of eID Interoperability: An Austrian Perspective
Tauber A., Zefferer T., Zwattendorfer B.
European Journal of ePractice, Vol. 2012(14), 2012
Qualified PDF signatures on mobile phones
Zefferer T., Tauber A., Zwattendorfer B., Stranacher K.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and IFIP ePart 2012
An Interoperability Standard for Certified Mail Systems
Tauber A., Apitzsch J., Boldrin L.
Computer Standards & Interfaces, Vol. 34(5), 2012
Specification-centered robustness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
2011 6th International Symposium on Industrial Embedded Systems
One for all - all for one: unifying standard differential power analysis attacks
Mangard S., Elisabeth O., Standaert F.
IET Information Security, 2011
Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks
Medwed M., Mangard S.
Design, Automation and Test in Europe
acTvSM Deliverable 6.1: Business Model and Product Roadmap
Tögl R., Pirker M., Bloem R., Lindsberger G., Posch S.
2011
Secure and Privacy-preserving eGovernment - Best Practice Austria
Posch K., Posch R., Tauber A., Zefferer T., Zwattendorfer B.
Rainbow of Computer Science, Springer, 259-269, 2011
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 2011
Technologiebeobachtung "Mobile Government - Stocktacking of Current Trends and Initiatives"
Zefferer T.
2011
Bedrohungsanalyse und Sicherheitsanforderungen für M-Government Applikationen
Zefferer T., Teufl P.
2011
Mobile Platform Information Flow Security
Hein D., Teufl P., Zefferer T.
2011
Grenzüberschreitendes E-Government in Europa
Tauber A., Zwattendorfer B., Zefferer T., Stranacher K.
eGovernment Review, Vol. 8, 2011
A Privacy-Preserving eID based Single Sign-On Solution
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011)
Secure and Privacy-preserving Cross-border Authentication: the STORK Pilot "SaferChat"
Knall T., Tauber A., Zefferer T., Zwattendorfer B., Axfjord A., Bjarnason H.
Proceedings of the Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2011)
