We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Vertrauenswürdiges Open Government Data
Stranacher K., Krnjic V., Zefferer T.
1.OGD D-A-CH-LI Konferenz, OGD D-A-CH-LI Konferenz, 27-39
Trusted Location Based Services
Teufl P., Zefferer T., Kreuzhuber S., Lesjak C.
7th International Conference for Internet Technology and Secured Transactions, 7th International Conference for Internet Technology and Secured Transactions, 185-192
Usability-Evaluierung der österreichischen Handy-Signatur
Zefferer T., Krnjic V.
D-A-CH Security 2012, D-A-CH Security 2012, 365-376
Towards User-friendly E-Government Solutions: Usability Evaluation of Austrian Smart-Card Integration Techniques
Zefferer T., Krnjic V.
Advancing Democracy, Government and Governance, Springer, 88-102, (Lecture Notes in Computer Science)
The Prevalence of SAML within the European Union
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the 8th International Conference on Web Information Systems and Technologies, 8th International Conference on Web Information Systems and Technologies, 571-576, (WEBIST)
Synthesizing Robust Systems with RATSY
Bloem R., Gamauf H., Hofferek G., Könighofer B., Könighofer R.
Proceedings First Workshop on Synthesis (SYNT 2012), Workshop on Synthesis (SYNT 2012), 47-53, (Electronic Proceedings in Theoretical Computer Science; vol. 84)
Improving the Security of SMS-Based Services Using Electronic Signatures
Zefferer T., Tauber A., Zwattendorfer B.
International Conference on Web Information Systems and Technologies, 8th International Conference on Web Information Systems and Technologies, 743-752
Usability Evaluation of Electronic Signature Based E-Government Solutions
Zefferer T., Krnjic V.
Proceedings of the IADIS International Conference WWW/INTERNET 2012, IADIS WWW/Internet 2012 (ICWI 2012), 227-234
STORK - Technical Approach and Privacy
Leitold H., Posch R.
Digital Enlightenment Yearbook 2012, IOS Press, 289-306
Middleware Architecture for Cross-Border eID
Zwattendorfer B., Sumelong I., Leitold H.
International Conference on Information Assurance and Security, International Conference on Information Assurance and Security, 303-308
Advancing Democracy, Government and Governance
Kö A., Leitner C., Leitold H., Prosser A.
, Springer, (LNCS)
Online-Vollmachten
Tauber A.
eGovernment Review, Vol. 9, 16-17
Cross-border Certified Electronic Mailing: A Scalable Interoperability Framework for Certified Mail Systems
Tauber A.
, Doctoral Thesis
SPOCS: Interoperable eGovernment Services in the Context of the Services Directive
Tauber A., Stranacher K., Medimorec D.
European Journal of ePractice, Vol. 14, 90-106
Cross-Border Legal Identity Management
Zwattendorfer B., Tauber A., Stranacher K., Reichstädter P.
Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012, EGOV - IFIP e-Government Conference, 149-161
Secure Cloud Authentication using eIDs
Zwattendorfer B., Tauber A.
Proceedings of IEEE CCIS2012, IEEE International Conference on Cloud Computing and Intelligence Systems, 515-519
Secure Cross-Cloud Single Sign-On (SSO) using eIDs
Zwattendorfer B., Tauber A.
ICITST-2012 Proceedings, International Conference for Internet Technology and Secured Transactions, 150-155
Bürgerkarten-Authentifizierung zur Public Cloud
Zwattendorfer B., Stranacher K., Tauber A.
D-A-CH Security 2012, Arbeitskonferenz D-A-CH Security 2012, 136-147
The Public Cloud for E-Government
Zwattendorfer B., Tauber A.
IADIS International Conferences Web Based Communities and Social Media and Collaborative Technologies 2012, IADIS International Conference Collaborative Technologies 2012, 129-136