We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency
CrySIL: Bringing Crypto to the Modern User
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, Springer International Publishing, 70-90, 2016
In Certificates We Trust - Revisited
Reimair F., Teufl P., Prünster B.
Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective
Attribute-based Encryption goes X.509
Reimair F., Feichtner J., Teufl P.
IEEE International Conference on e-Business Engineering (ICEBE)
WebCrySIL - Web Cryptographic Service Interoperability Layer
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies
MoCrySIL - Carry Your Cryptographic Keys in Your Pocket
Reimair F., Teufl P., Kollmann C., Thaller C.
12th International Conference on Security and Cryptography
Do you think your passwords are secure?
Ziegler D., Stromberger C., Rauter M., Teufl P., Hein D.
International Conference on Privacy & Security in Mobile Systems
Android - On-Device Detection of SMS Catchers and Sniffers
Teufl P., Zefferer T., Wörgötter C., Oprisnik A., Hein D.
International Conference on Privacy & Security in Mobile Systems
Android Encryption Systems
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Teufl P., Ferk M., Fitzek A., Hein D., Orthacker C., Kraxberger S.
Security and communication networks, Vol. 9, 2013
Sicheres Speichern in der Public Cloud mittels Smart Cards
Zwattendorfer B., Suzic B., Teufl P., Derler A.
D-A-CH Security 2013
Group Signatures on Mobile Devices: Practical Experiences
Potzmader K., Winter J., Hein D., Hanser C., Teufl P., Chen L.
Trust and trustworthy computing
Secure Hardware-Based Public Cloud Storage
Zwattendorfer B., Suzic B., Teufl P., Derler A.
Open Identity Summit 2013
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography
Secure and Privacy-Preserving Proxy Voting System
Zwattendorfer B., Hillebold C., Teufl P.
IEEE 10th International Conference on e-Business Engineering
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies
Mobile Device Encryption Systems
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference
Assessing the Suitability of Current Smartphone Platforms for Mobile Government
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance
