We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies
Könighofer R., Hofferek G., Bloem R.
International Journal on Software Tools for Technology Transfer, Vol. 15(5-6), 563-583
Towards Efficient Parameterized Synthesis
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation, International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 108-127, (Lecture Notes in Computer Science)
PARTY: parameterized synthesis of token rings
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification, International Conference on Computer Aided Verification, 928 - 933, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8044 LNCS)
Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Electronic Journal of e-Government , Vol. 11(2), 360-372
Towards a Modular Architecture for Adaptable Signature-Verification Tools
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies, 9th International Conference on Web Information Systems and Technologies, 325-334
Effizientes Testen von E-Government Komponenten in der Cloud
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security, Arbeitskonferenz DACH Security, 225-236
Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government, 13th European Conference on E-Government, 508-516
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 107-118
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes, 2013 Information Security Solutions Europe Conference, 45-57
The Public Cloud for e-Government
Zwattendorfer B., Tauber A.
International Journal of Distributed Systems and Technologies , Vol. 4(4)
Cross-border certified electronic mailing: A European perspective
Tauber A., Kustor P., Karning B.
Computer Law & Security Review , Vol. 29(1), 28-39
Elektronische Identität und Stellvertretung in Österreich
Tauber A., Zwattendorfer B., Stranacher K.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 1-9
A Secure and Confidential Javascript Crypto-Framework for Cloud Storage Applications
Lenz T., Zwattendorfer B., Tauber A.
IADIS International Conference WWW/INTERNET, IADIS International Conference WWW/INTERNET, 219-226
Linear Propagation in Efficient Guess-and-Determine Attacks
Eichlseder M., Mendel F., Nad T., Rijmen V., Schläffer M.
International Workshop on Coding and Cryptography, 2013 International Workshop on Coding and Cryptography, 193-202
Finding Collisions for Round-Reduced SM3
Mendel F., Nad T., Schläffer M.
Topics in Cryptology - CT-RSA 2013, Cryptographers' Track at the RSA Conference 2013, 174-188, (Lecture Notes in Computer Science; vol. 7779)
Improving Local Collisions: New Attacks on Reduced SHA-256
Mendel F., Nad T., Schläffer M.
Advances in Cryptology – EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques , 262-278
Differential Cryptanalysis of Keccak Variants
Kölbl S., Mendel F., Nad T., Schläffer M.
Cryptography and Coding, 14th IMA International Conference on Cryptography and Coding, 141-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
Android Market Analysis with Activation Patterns
Teufl P., Kraxberger S., Orthacker C., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers, 3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems, MobiSec 2011, 1-12, (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST)
Android Security Permissions - Can we trust them?
Orthacker C., Teufl P., Kraxberger S., Lackner G., Gissing M., Marsalek A., Leibetseder J., Prevenhueber O.
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers, 3rd ICST Conference on Security and Privacy for Mobile Information and Communication Systems, MobiSec 2011, 40-51, (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST)
Die physikalische Sicherheit eingebetteter Systeme
Mangard S.
Datenschutz und Datensicherheit, Vol. 36, 867-871