We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation
Rath C., Roth S., Bratko H., Zefferer T.
Electronic Government and the Information Systems Perspective. EGOVIS 2015
Avoiding Disasters – Ensuring PKI‐service availability
Lipp P., Bratko H., Rath C.
Proceedings of the European Conference on e-Government ECEG 2011
