We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Cryptanalysis of Round-Reduced HAS-160
Mendel F., Nad T., Schläffer M.
Information Security and Cryptology - ICISC 2011
Finding SHA-2 Characteristics: Searching Through a Minefield of Contradictions
Mendel F., Nad T., Schläffer M.
Advances in Cryptology - ASIACRYPT 2011
On the Duality of Probing and Fault Attacks
Gammel B., Mangard S.
Journal of Electronic Testing , Vol. 26(4), 2010
The World Is Not Enough: Another Look on Second-Order DPA
Standaert F., Veyrat-Charvillon N., Oswald E., Gierlichs B., Medwed M., Kasper M., Mangard S.
International Conference on the Theory and Application of Cryptology and Information Security
Studie Sicherheitsanalyse BlackBerry OS 5
Teufl P., Dietrich K.
2010
User Tracking based on Behavioral Fingerprints
Lackner G., Teufl P., Weinberger R.
CANS 2010 Proceedings
Location Privacy in Kabellosen Netzwerken
Lackner G., Teufl P.
DACH2010
DIAMOND Website (Deliverable D5.1)
Robal T., Raik J., Hofferek G., Bloem R., Eisner C., Carlsson G.
2010
eID Interoperability (chapter 12)
Leitold H., Posch R., Rannenberg K., Krontiris I.
Handbook of eID Security: Concepts, Practical Experiences, Technologies, Publicis Publishing, 167-186, 2010
Reconstruction of electronic signatures from eDocument printouts
Leitold H., Posch R., Rössler T.
Computers & Security, Vol. 29(5), 2010
Event correlation on the basis of Activation Patterns
Teufl P., Payer U., Fellner R.
2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing
Privatzustellung – Der elektronisch eingeschriebene Brief
Tauber A., Reichstädter P.
eGovernment Review, Vol. 5, 2010
Requirements and Properties of Qualified Electronic Delivery Systems in eGovernment – an Austrian Experience
Tauber A.
International journal of e-adoption, Vol. 2(1), 2010
SPOCS D3.2: Specifications for interoperable access to eDelivery and eSafe systems
Apitzsch J., Rohstock O., Thölken L., Boldrin L., Martin B., Rieger S., Seeger M., Tauber A., Worofka P.
2010
From NLP (Natural Language Processing) to MLP (Machine Language Processing)
Teufl P., Lackner G., Payer U.
Computer Network Security
RDF Data Analysis with Activation Patterns
Teufl P., Lackner G.
I-Know '10 and I-Semantics '10
The SPOCS Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as Example
Rössler T., Tauber A.
ISSE 2010 Securing Electronic Business Processes
A Scalable Interoperability Architecture for Certified Mail Systems
Tauber A., Rössler T.
Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC 2010)
Interoperability Challenges for Pan-European Qualified Exchange of Electronic Documents
Tauber A., Rössler T.
The Proceedings of the 10th European Conference on eGovernment (ECEG 2010)
