We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Future Directions in Mobile Government
Zefferer T.
IADIS International Journal on WWW/Internet, Vol. 13(2), 17-33
Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation
Rath C., Roth S., Bratko H., Zefferer T.
Electronic Government and the Information Systems Perspective. EGOVIS 2015, 4th International Conference on Electronic Government and the Information Systems Perspective , 71-85, (Lecture Notes in Computer Science; vol. 9265)
POWER: A Cloud-based Mobile Augmentation Approach for Web- and Cross-Platform Applications
Reiter A., Zefferer T.
2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 4th International Conference on Cloud Networking, 226-231
Paving the Way for Security in Cloud-Based Mobile Augmentation Systems
Reiter A., Zefferer T.
3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015), 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 89-98
WebCrySIL - Web Cryptographic Service Interoperability Layer
Reimair F., Teufl P., Zefferer T.
11th International Conference on Web Information Systems and Technologies, 11th International Conference on Web Information Systems and Technologies, 35-44
Secure single sign-on authentication using eIDs across public clouds
Zwattendorfer B., Tauber A.
International Journal of Internet Technology and Secured Transactions, Vol. 5(4), 291-306
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 490-509, ( Lecture Notes in Computer Science; vol. 9453)
Forgery Attacks on round-reduced ICEPOLE-128
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015, 22nd International Workshop on Selected Areas in Cryptography, 479-492, (Lecture Notes in Computer Science; vol. 9566)
Cryptanalysis of Ascon
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015, Cryptographers´ Track at the RSA Conference, 371-387, (Lecture Notes in Computer Science; vol. 9048)
Related-Key Forgeries for Proest-OTR
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015, 2015 Fast Software Encryption Workshop, 282-296, (Lecture Notes in Computer Science(; vol. 9054)
On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014, 2014 International Conference on Smart Card Research and Advanced Applications, 233-244, ( Lecture Notes in Computer Science; vol. 8968)
How to Handle Assumptions in Synthesis
Bloem R., Ehlers R., Jacobs S., Könighofer R.
Proceedings 3rd Workshop on Synthesis (SYNT 2014), Workshop on Synthesis (SYNT 2014), 34-50, (EPTCS; vol. 157)
Parameterized Synthesis Case Study: AMBA AHB
Khalimov A., Bloem R., Jacobs S.
SYNT 2014, 68-83
Automating Test-Suite Augmentation
Bloem R., Könighofer R., Röck F., Tautschnig M.
International Conference on Quality Software, International Conference on Quality Software, 67-72
Security Concepts for a Distributed Architecture for Activity Logging and Analysis
Pammer-Schindler V., Stern H., Edler S., Hein D., Pirker M., Bloem R., Wertner A.
Proceeding i-KNOW '14 Proceedings of the 14th International Conference on Knowledge Technologies and Data-driven Business, 14th International Conference on Knowledge Technologies and Data-driven Business (i-KNOW 2014), ?-?
Measuring Usability to Improve the Efficiency of Electronic Signature-based E-Government Solutions
Zefferer T., Krnjic V., Stranacher K., Zwattendorfer B.
Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders, 45-74
A Comparative Survey of Cloud Identity Management-Models
Zwattendorfer B., Zefferer T., Stranacher K.
Web Information Systems and Technologies 2014, Springer, 128-144
Android - On-Device Detection of SMS Catchers and Sniffers
Teufl P., Zefferer T., Wörgötter C., Oprisnik A., Hein D.
International Conference on Privacy & Security in Mobile Systems, International Conference on Privacy & Security in Mobile Systems
An Implementation-Independent Evaluation Model for Server-Based Signature Solutions
Zefferer T., Zwattendorfer B.
10th International Conference on Web Information Systems and Technologies, 10th International Conference on Web Information Systems and Technologies, 302-309
Synthesizing Robust Systems
Bloem R., Chatterjee K., Greimel K., Henzinger T., Hofferek G., Jobstmann B., Könighofer B., Könighofer R.
Acta informatica, Vol. 51(3), 193-220