We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India, 215-226
Sicheres Speichern in der Public Cloud mittels Smart Cards
Zwattendorfer B., Suzic B., Teufl P., Derler A.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 120-132
iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT, 10th International Joint Conference on e-Business and Telecommunications, 170-182
Policy-based Security Assessment of Mobile End-User Devices
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography, 10th International Conference on Security and Cryptography, 347-354
Secure and Privacy-Preserving Proxy Voting System
Zwattendorfer B., Hillebold C., Teufl P.
IEEE 10th International Conference on e-Business Engineering, Workshop on Cloud Computing for Mechatronic Systems, 472-477
Semantic Pattern Transformation
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, Association for Computing Machinery (ACM), 0-0
Mobile Device Encryption Systems
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013), Auckland, New Zealand, 8-10 July 2013, 203-216
Assessing the Suitability of Current Smartphone Platforms for Mobile Government
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 125-139
Model-Based MCDC Testing of Complex Decisions for the Java Card Applet Firewall
Bloem R., Greimel K., Könighofer R., Röck F.
VALID Proceedings, International Conference on Advances in System Testing and Validation Lifecycle, 1-6
Harnessing Electronic Signatures to Improve the Security of SMS-based Services
Zefferer T., Tauber A., Zwattendorfer B.
Web Information Systems and Technologies, 331-346, (Lecture Notes in Business Information Processing)
The Austrian Identity Ecosystem – An e-Government Experience
Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
Architectures and Protocols for Secure Information Technology, IGI Global, 288-309, (Advances in Information Security, Privacy, and Ethics (AISPE))
Authentische und integritätsgesicherte Verwaltungsdaten
Stranacher K., Krnjic V., Zefferer T.
eGovernment Review, Vol. 11, 30-31
Enhancing the Modularity and Applicability of Web-Based Signature-Verication Tools
Lenz T., Stranacher K., Zefferer T.
Webist 2013 Selected and revised papers, 173-188
Trust and Reliability for Public Sector Data
Stranacher K., Krnjic V., Zefferer T.
Proceedings of International Conference on e-Business and e-Government, International Conference on e-Business and e-Government, 124-132
Towards Mobile Government: Verification of Electronic Signatures on Smartphones
Zefferer T., Golser F., Lenz T.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 140-151
A Survey and Analysis of NFC-based Payment Solutions for Smartphones
Zefferer T.
IADIS International Conference e-Society 2013, 2013 IADIS International Conference e-Society, 275-282
Technology-Enabled Innovation for Democracy, Government and Governance
Leitold H., Kö A., Leitner C., Prosser A.
, Springer, (LNCS)
Synthesizing Multiple Boolean Functions using Interpolation on a Single Proof
Hofferek G., Gupta A., Könighofer B., Jiang J., Bloem R.
2013 Formal Methods in Computer-Aided Design, FMCAD 2013, 13th International Conference on Formal Methods in Computer-Aided Design, 77-84
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Teufl P., Ferk M., Fitzek A., Hein D., Orthacker C., Kraxberger S.
Security and communication networks, Vol. 9, 389-419
Group Signatures on Mobile Devices: Practical Experiences
Potzmader K., Winter J., Hein D., Hanser C., Teufl P., Chen L.
Trust and trustworthy computing, 6th International Conference on Trust & Trustworthy Computing, 47-64, (Lecture Notes in Computer Science; vol. 7904)