We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
E-ID Meets E-Health on a Pan-European Level
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the IADIS International Conference e-Health 2011
Secure and Reliable Online-Verification of Electronic Signatures in the Digital Age
Zefferer T., Tauber A., Zwattendorfer B., Knall T.
Proceedings of the IADIS International Conference WWW/INTERNET 2011
A Systematic Approach to Legal Identity Management - Best Practice Austria
Leitold H., Tauber A.
ISSE 2011 - Securing Electronic Business Processes
Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens
Tauber A.
Datenschutz und Datensicherheit, Vol. 35, 2011
A survey of certified mail systems provided on the Internet
Tauber A.
Computers & Security, Vol. 30(6-7), 2011
Enhancing Security and Privacy in Certified Mail Systems using Trust Domain Separation
Tauber A., Rössler T.
Information Security, Lecture Notes in Computer Science
Avoiding Disasters – Ensuring PKI‐service availability
Lipp P., Bratko H., Rath C.
Proceedings of the European Conference on e-Government ECEG 2011
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Eisenbarth T., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
ECRYPT Workshop on Lightweight Cryptography 2011, Louvain-la-Neuve, Belgium, November 28-29, 2011
Boomerang Distinguisher for the SIMD-512 Compression Function
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2011
Controller Synthesis for Pipelined Circuits Using Uninterpreted Functions
Hofferek G., Bloem R.
9th ACM/IEEE International Conference on Formal Methods and Models for Codesign, MEMOCODE 2011
Debugging Unrealizable Specifications with Model-Based Diagnosis
Könighofer R., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing 6th International Haifa Verification Conference, HVC 2010, Haifa, Israel, October 4-7, 2010. Revised Selected Papers
Automated Error Localization and Correction for Imperative Programs
Könighofer R., Bloem R.
Proceedings of 11th International Conference 2011 Formal Methods in Computer Aided Design (FMCAD 2011)
Accessibility Challenges in e-Government: an Austrian Experience
Orthacker C., Zefferer T.
Proceedings of the Forth International Conference on Internet Technologies and Applications (ITA 11)
A Shared Certified Mail System for the Austrian Public and Private Sectors
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and the Information Systems Perspective
Employing Multi-Core Processor Architectures to Accelerate Java Cryptography Extensions
Ivkovic M., Zefferer T.
Proceedings of the 7th International Conference on Web Information Systems and Technologies
Elektronisches Einschreiben im D-A-CH Raum
Tauber A., Zefferer T., Zwattendorfer B.
D-A-CH Security 2011
Ein virtuelles Testframework für E-Government Komponenten
Zefferer T., Krnjic V., Zwattendorfer B.
D-A-CH Security 2011
STORK: Pilot 4 Towards Cross-border Electronic Delivery
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and ePart 2011
STORK e-Privacy and Security
Koulolias V., Kountzeris A., Leitold H., Zwattendorfer B., Crespo A., Stern M.
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011
Challenges of eID Interoperability: The STORK Project
Leitold H.
Privacy and Identity Management for Life
