We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Location Privacy in Kabellosen Netzwerken
Lackner G., Teufl P.
DACH2010, DACH2010, 0-0
DIAMOND Website (Deliverable D5.1)
Robal T., Raik J., Hofferek G., Bloem R., Eisner C., Carlsson G.
eID Interoperability (chapter 12)
Leitold H., Posch R., Rannenberg K., Krontiris I.
Handbook of eID Security: Concepts, Practical Experiences, Technologies, Publicis Publishing, 167-186
Reconstruction of electronic signatures from eDocument printouts
Leitold H., Posch R., Rössler T.
Computers & Security, Vol. 29(5), 523-532
Event correlation on the basis of Activation Patterns
Teufl P., Payer U., Fellner R.
2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, 631-640
Privatzustellung – Der elektronisch eingeschriebene Brief
Tauber A., Reichstädter P.
eGovernment Review, Vol. 5, 18-19
Requirements and Properties of Qualified Electronic Delivery Systems in eGovernment – an Austrian Experience
Tauber A.
International journal of e-adoption, Vol. 2(1), 44-56
SPOCS D3.2: Specifications for interoperable access to eDelivery and eSafe systems
Apitzsch J., Rohstock O., Thölken L., Boldrin L., Martin B., Rieger S., Seeger M., Tauber A., Worofka P.
From NLP (Natural Language Processing) to MLP (Machine Language Processing)
Teufl P., Lackner G., Payer U.
Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, 256-269, (Lecture Notes in Computer Science; vol. 6258)
RDF Data Analysis with Activation Patterns
Teufl P., Lackner G.
I-Know '10 and I-Semantics '10 , I-KNOW 2010, 18-18, ( J.UCS Conference Proceeding Series)
The SPOCS Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as Example
Rössler T., Tauber A.
ISSE 2010 Securing Electronic Business Processes, Information Security Solutions Europe Conference, 122-130
A Scalable Interoperability Architecture for Certified Mail Systems
Tauber A., Rössler T.
Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC 2010), IEEE Conference on Commerce and Enterprise Computing, 9-17
Interoperability Challenges for Pan-European Qualified Exchange of Electronic Documents
Tauber A., Rössler T.
The Proceedings of the 10th European Conference on eGovernment (ECEG 2010), European Conference on E-Government, 382-390
Side-Channel Leakage Across Borders
Schmidt J., Plos T., Kirschbaum M., Hutter M., Medwed M., Herbst C.
Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, International Conference on Smart Card Research and Advanced Applications, 36-48, (LNCS)
Robustness in the Presence of Liveness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 410-424, (Lecture Notes in Computer Science; vol. 6174)
RATSY - A new Requirements Analysis Tool with Synthesis
Bloem R., Cimatti A., Greimel K., Hofferek G., Könighofer R., Roveri M., Schuppan V., Seeber R.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 425-429, (Lecture Notes in Computer Science; vol. 6174)
An Electronic-signature Based Circular Resolution Database System
Zefferer T., Knall T.
Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010, 25th Annual ACM Symposium on Applied Computing, 1840-1845
Towards Interoperability: An Architecture for Pan-European eID-based Authentication Services
Tauber A., Zwattendorfer B., Zefferer T., Mazhari Y., Chamakiotis E.
Electronic Government and the Information Systems Perspective , 1st International Conference on Electronic Government and the Information Systems Perspective, 120-133, (Lecture Notes in Computer Science; vol. 6267)
STORK: Architecture, Implementation and Pilots
Leitold H., Zwattendorfer B.
ISSE 2010 Securing Electronic Business Processes, ISSE 2010 Security Conference, 131-142
Rebound Attacks on the Reduced Grøstl Hash Function
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010, 10th Cryptographers' Track at the RSA Conference, 350-365, (Lecture Notes in Computer Science; vol. 5985)