We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Secure Hardware-Based Public Cloud Storage
Zwattendorfer B., Suzic B., Teufl P., Derler A.
Open Identity Summit 2013, Open Identity Summit 2013, 43-54
Towards a Certified Electronic Mail System
Tauber A., Draper-Gil G., Ferrer-Gomila J., Hinarejos M.
Architectures and Protocols for Secure Information Technology, IGI Global, 46-70, (Advances in Information Security, Privacy, and Ethics (AISPE))
Cloud Computing in E-Government across Europe
Zwattendorfer B., Stranacher K., Tauber A., Reichstädter P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 181-195, (Lecture notes in computer science)
Towards a Federated Identity as a Service Model
Zwattendorfer B., Stranacher K., Tauber A.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 43-57, (Lecture notes in computer science)
Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies
Könighofer R., Hofferek G., Bloem R.
International Journal on Software Tools for Technology Transfer, Vol. 15(5-6), 563-583
Towards Efficient Parameterized Synthesis
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation, International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2013, 108-127, (Lecture Notes in Computer Science)
PARTY: parameterized synthesis of token rings
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification, International Conference on Computer Aided Verification, 928 - 933, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8044 LNCS)
Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Electronic Journal of e-Government , Vol. 11(2), 360-372
Towards a Modular Architecture for Adaptable Signature-Verification Tools
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies, 9th International Conference on Web Information Systems and Technologies, 325-334
Effizientes Testen von E-Government Komponenten in der Cloud
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security, Arbeitskonferenz DACH Security, 225-236
Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government, 13th European Conference on E-Government, 508-516
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 107-118
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes, 2013 Information Security Solutions Europe Conference, 45-57
The Public Cloud for e-Government
Zwattendorfer B., Tauber A.
International Journal of Distributed Systems and Technologies , Vol. 4(4)
Cross-border certified electronic mailing: A European perspective
Tauber A., Kustor P., Karning B.
Computer Law & Security Review , Vol. 29(1), 28-39
Elektronische Identität und Stellvertretung in Österreich
Tauber A., Zwattendorfer B., Stranacher K.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 1-9
A Secure and Confidential Javascript Crypto-Framework for Cloud Storage Applications
Lenz T., Zwattendorfer B., Tauber A.
IADIS International Conference WWW/INTERNET, IADIS International Conference WWW/INTERNET, 219-226
Linear Propagation in Efficient Guess-and-Determine Attacks
Eichlseder M., Mendel F., Nad T., Rijmen V., Schläffer M.
International Workshop on Coding and Cryptography, 2013 International Workshop on Coding and Cryptography, 193-202
Finding Collisions for Round-Reduced SM3
Mendel F., Nad T., Schläffer M.
Topics in Cryptology - CT-RSA 2013, Cryptographers' Track at the RSA Conference 2013, 174-188, (Lecture Notes in Computer Science; vol. 7779)