We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 460-468, (Proceedings of the International Conference on Security and Cryptography; vol. 1)
A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions
Zefferer T., Prünster B., Kollmann C., Corici A., Alber L., Czerny R., Podgorelec B.
DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research, 24th Annual International Conference on Digital Government Research, 536–543, (ACM International Conference Proceeding Series)
Towards a Mobile-First Cross-Border eID Framework
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
Proceedings of the 24th Annual International Conference on Digital Government Research - Together in the Unstable World, 24th Annual International Conference on Digital Government Research, 526–535, (ACM International Conference Proceeding Series)
Total Eclipse of the Heart – Disrupting the InterPlanetary File System
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium, 31st USENIX Security Symposium, 3735-3752
E-Government in the Public Cloud: Requirements and Opportunities
Abraham A., Hörandner F., Zefferer T., Zwattendorfer B.
Electronic Government, Vol. 16(3), 260-280
Evaluation in Pilot-Based Research Projects: A Hierarchical Approach
Zefferer T.
Web Information Systems and Technologies - 14th International Conference, WEBIST 2018, Revised Selected Papers, 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, 125-146, (Lecture Notes in Business Information Processing; vol. 372 LNBIP)
A Correctable Public Blockchain
Marsalek A., Zefferer T.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 554-561
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 626-633, (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019)
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency, 1st IEEE International Conference on Blockchain and Cryptocurrency, 394-402
Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten
Theuermann K., Zefferer T., Lenz T., Tauber A.
Handbuch E-Government, Springer Fachmedien Wiesbaden, 1-30
Privacy-preserving attribute aggregation in eID federations
Priesnitz Filho W., Ribeiro C., Zefferer T.
Future Generation Computer Systems, Vol. 92(Volume 92), 1-16
Best of two worlds: Secure cloud federations meet eIDAS
Zefferer T., Ziegler D., Reiter A.
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 396-401
A Federation of Federations: Secure Cloud Federations meet European Identity Federations
Zefferer T., Ziegler D., Reiter A.
International Journal for Information Security Research, Vol. Volume 8(Issue 1)
A Hierarchical Evaluation Scheme for Pilot-based Research Projects
Zefferer T.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, 356-363
A Security Analysis of FirstCoin
Marsalek A., Kollmann C., Zefferer T.
ICT Systems Security and Privacy Protection, <br/>33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection , 127-140, (IFIP Advances in Information and Communication Technology; vol. 529)
SeDiCom
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings, 14th International Conference on Information Systems Security, 345-363, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11281 LNCS)
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
Reimair F., Feichtner J., Ziegler D., Kreuzhuber S., Zefferer T.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, SciTePress, 367-374
Leveraging the adoption of electronic identities and electronic-signature solutions in Europe
Marsalek A., Zefferer T., Reimair F., Karabat Ã., Soykan E.
32nd Annual ACM Symposium on Applied Computing, SAC 2017, 32nd Annual ACM Symposium on Applied Computing, 69-71
A Sustainable Architecture for Secure and Usable Mobile Signature Solutions
Zefferer T.
WEBIST 2015 - Selected and Revised Papers, Springer, 343
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, IEEE Press, 935-944