We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
eID Interoperability (chapter 12)
Leitold H., Posch R., Rannenberg K., Krontiris I.
Handbook of eID Security: Concepts, Practical Experiences, Technologies, Publicis Publishing, 167-186, 2010
Reconstruction of electronic signatures from eDocument printouts
Leitold H., Posch R., Rössler T.
Computers & Security, Vol. 29(5), 2010
Privatzustellung – Der elektronisch eingeschriebene Brief
Tauber A., Reichstädter P.
eGovernment Review, Vol. 5, 2010
Requirements and Properties of Qualified Electronic Delivery Systems in eGovernment – an Austrian Experience
Tauber A.
International journal of e-adoption, Vol. 2(1), 2010
SPOCS D3.2: Specifications for interoperable access to eDelivery and eSafe systems
Apitzsch J., Rohstock O., Thölken L., Boldrin L., Martin B., Rieger S., Seeger M., Tauber A., Worofka P.
2010
The SPOCS Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as Example
Rössler T., Tauber A.
ISSE 2010 Securing Electronic Business Processes
A Scalable Interoperability Architecture for Certified Mail Systems
Tauber A., Rössler T.
Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC 2010)
Interoperability Challenges for Pan-European Qualified Exchange of Electronic Documents
Tauber A., Rössler T.
The Proceedings of the 10th European Conference on eGovernment (ECEG 2010)
Side-Channel Leakage Across Borders
Schmidt J., Plos T., Kirschbaum M., Hutter M., Medwed M., Herbst C.
Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010
Robustness in the Presence of Liveness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
Computer Aided Verification
RATSY - A new Requirements Analysis Tool with Synthesis
Bloem R., Cimatti A., Greimel K., Hofferek G., Könighofer R., Roveri M., Schuppan V., Seeber R.
Computer Aided Verification
An Electronic-signature Based Circular Resolution Database System
Zefferer T., Knall T.
Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010
Towards Interoperability: An Architecture for Pan-European eID-based Authentication Services
Tauber A., Zwattendorfer B., Zefferer T., Mazhari Y., Chamakiotis E.
Electronic Government and the Information Systems Perspective
STORK: Architecture, Implementation and Pilots
Leitold H., Zwattendorfer B.
ISSE 2010 Securing Electronic Business Processes
Rebound Attacks on the Reduced Grøstl Hash Function
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010
Randomizing the Montgomery Multiplication to Repel Template Attacks on Multiplicative Masking
Medwed M., Herbst C.
Workshop Proceedings COSADE 201
Practical Attacks on Masked Hardware
Popp T., Kirschbaum M., Mangard S.
Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009
Better Quality in Synthesis through Quantitative Objectives
Bloem R., Chatterjee K., Henziger T., Jobstmann B.
International Conference on Computer Aided Verification
STORK - Interoperable elektronische Identität in Europa
Ivkovic M., Leitold H., Rössler T.
7. Information Security Konferenz
