explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government, 13th European Conference on E-Government, 508-516
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 107-118
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes, 2013 Information Security Solutions Europe Conference, 45-57
Zwattendorfer B., Tauber A.
International Journal of Distributed Systems and Technologies , Vol. 4(4)
Tauber A., Kustor P., Karning B.
Computer Law & Security Review , Vol. 29(1), 28-39
Tauber A., Zwattendorfer B., Stranacher K.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 1-9
Lenz T., Zwattendorfer B., Tauber A.
IADIS International Conference WWW/INTERNET, IADIS International Conference WWW/INTERNET, 219-226
Eichlseder M., Mendel F., Nad T., Rijmen V., Schläffer M.
International Workshop on Coding and Cryptography, 2013 International Workshop on Coding and Cryptography, 193-202
Mendel F., Nad T., Schläffer M.
Topics in Cryptology - CT-RSA 2013, Cryptographers' Track at the RSA Conference 2013, 174-188, (Lecture Notes in Computer Science; vol. 7779)
Mendel F., Nad T., Schläffer M.
Advances in Cryptology – EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques , 262-278
Kölbl S., Mendel F., Nad T., Schläffer M.
Cryptography and Coding, 14th IMA International Conference on Cryptography and Coding, 141-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
Mangard S.
Datenschutz und Datensicherheit, Vol. 36, 867-871
Hutter M., Kirschbaum M., Plos T., Schmidt J., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings., International Workshop on Constructive Side-Channel Analysis and Secure Design, 1-16, (Lecture Notes in Computer Science)
Heyszl J., Mangard S., Heinz B., Stumpf F., Sigl G.
Cryptographers´ Track at the RSA Conference, 231-244
Bloem R., Jacobs S.
Tools and Algorithms for the Construction and Analysis of Systems, International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 362-376, (Lecture notes in computer science)
Posch R., Orthacker C., Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
E-Government - Zwischen Partizipation und Kooperation, Springer, 185-209
Stranacher K., Krnjic V., Zefferer T.
1.OGD D-A-CH-LI Konferenz, OGD D-A-CH-LI Konferenz, 27-39