We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Mobile qualifizierte Signaturen in Europa
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 2011
Technologiebeobachtung "Mobile Government - Stocktacking of Current Trends and Initiatives"
Zefferer T.
2011
Bedrohungsanalyse und Sicherheitsanforderungen für M-Government Applikationen
Zefferer T., Teufl P.
2011
Mobile Platform Information Flow Security
Hein D., Teufl P., Zefferer T.
2011
Grenzüberschreitendes E-Government in Europa
Tauber A., Zwattendorfer B., Zefferer T., Stranacher K.
eGovernment Review, Vol. 8, 2011
A Privacy-Preserving eID based Single Sign-On Solution
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011)
Secure and Privacy-preserving Cross-border Authentication: the STORK Pilot "SaferChat"
Knall T., Tauber A., Zefferer T., Zwattendorfer B., Axfjord A., Bjarnason H.
Proceedings of the Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2011)
E-ID Meets E-Health on a Pan-European Level
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the IADIS International Conference e-Health 2011
Secure and Reliable Online-Verification of Electronic Signatures in the Digital Age
Zefferer T., Tauber A., Zwattendorfer B., Knall T.
Proceedings of the IADIS International Conference WWW/INTERNET 2011
Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services
Zefferer T., Teufl P.
Megatrends in eGovernment, 2011
A Systematic Approach to Legal Identity Management - Best Practice Austria
Leitold H., Tauber A.
ISSE 2011 - Securing Electronic Business Processes
Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens
Tauber A.
Datenschutz und Datensicherheit, Vol. 35, 2011
A survey of certified mail systems provided on the Internet
Tauber A.
Computers & Security, Vol. 30(6-7), 2011
Enhancing Security and Privacy in Certified Mail Systems using Trust Domain Separation
Tauber A., Rössler T.
Information Security, Lecture Notes in Computer Science
Avoiding Disasters – Ensuring PKI‐service availability
Lipp P., Bratko H., Rath C.
Proceedings of the European Conference on e-Government ECEG 2011
Controller Synthesis for Pipelined Circuits Using Uninterpreted Functions
Hofferek G., Bloem R.
9th ACM/IEEE International Conference on Formal Methods and Models for Codesign, MEMOCODE 2011
Debugging Unrealizable Specifications with Model-Based Diagnosis
Könighofer R., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing 6th International Haifa Verification Conference, HVC 2010, Haifa, Israel, October 4-7, 2010. Revised Selected Papers
Automated Error Localization and Correction for Imperative Programs
Könighofer R., Bloem R.
Proceedings of 11th International Conference 2011 Formal Methods in Computer Aided Design (FMCAD 2011)
Accessibility Challenges in e-Government: an Austrian Experience
Orthacker C., Zefferer T.
Proceedings of the Forth International Conference on Internet Technologies and Applications (ITA 11)
A Shared Certified Mail System for the Austrian Public and Private Sectors
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and the Information Systems Perspective
