We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
A Privacy-Preserving eID based Single Sign-On Solution
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011), 5th International Conference on Network and System Security, 295-299
Secure and Privacy-preserving Cross-border Authentication: the STORK Pilot "SaferChat"
Knall T., Tauber A., Zefferer T., Zwattendorfer B., Axfjord A., Bjarnason H.
Proceedings of the Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2011), 2nd International Conference on Electronic Government and the Information Systems Perspective, 94-106, (LNCS 6866)
E-ID Meets E-Health on a Pan-European Level
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the IADIS International Conference e-Health 2011, IADIS International Conference Interfaces and Human Computer Interaction 2011, Part of the IADIS Multi Conference on Computer Science and Information Systems 2011, 97-104
Secure and Reliable Online-Verification of Electronic Signatures in the Digital Age
Zefferer T., Tauber A., Zwattendorfer B., Knall T.
Proceedings of the IADIS International Conference WWW/INTERNET 2011, IADIS International Conference on WWW/Internet, 269-276
Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services
Zefferer T., Teufl P.
Megatrends in eGovernment
A Systematic Approach to Legal Identity Management - Best Practice Austria
Leitold H., Tauber A.
ISSE 2011 - Securing Electronic Business Processes, Information Security Solutions Europe Conference, 224-234
Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens
Tauber A.
Datenschutz und Datensicherheit, Vol. 35, 774-778
A survey of certified mail systems provided on the Internet
Tauber A.
Computers & Security, Vol. 30(6-7), 464-485
Enhancing Security and Privacy in Certified Mail Systems using Trust Domain Separation
Tauber A., Rössler T.
Information Security, Lecture Notes in Computer Science, Information Security Conference, 152-158, (6531)
Controller Synthesis for Pipelined Circuits Using Uninterpreted Functions
Hofferek G., Bloem R.
9th ACM/IEEE International Conference on Formal Methods and Models for Codesign, MEMOCODE 2011, 9th ACM/IEEE International Conference on Formal Methods and Models for Codesign, 31-42
Debugging Unrealizable Specifications with Model-Based Diagnosis
Könighofer R., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing 6th International Haifa Verification Conference, HVC 2010, Haifa, Israel, October 4-7, 2010. Revised Selected Papers, Haifa Verification Conference 2010, 29-45, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6504 LNCS)
Automated Error Localization and Correction for Imperative Programs
Könighofer R., Bloem R.
Proceedings of 11th International Conference 2011 Formal Methods in Computer Aided Design (FMCAD 2011), 11th International Conference 2011 Formal Methods in Computer Aided Design, 91-100
Avoiding Disasters – Ensuring PKI‐service availability
Lipp P., Bratko H., Rath C.
Proceedings of the European Conference on e-Government ECEG 2011, European Conference on e-Government ECEG 2011, ?-?
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Eisenbarth T., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
ECRYPT Workshop on Lightweight Cryptography 2011, Louvain-la-Neuve, Belgium, November 28-29, 2011, ECRYPT Workshop on Lightweight Cryptography 2011, 1-16
Boomerang Distinguisher for the SIMD-512 Compression Function
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2011, 12th International Conference on Cryptology in India, 255-269, (Lecture Notes in Computer Science; vol. 7107)
Accessibility Challenges in e-Government: an Austrian Experience
Orthacker C., Zefferer T.
Proceedings of the Forth International Conference on Internet Technologies and Applications (ITA 11), 4th International Conference on Internet Technologies & Applications, 221-228
A Shared Certified Mail System for the Austrian Public and Private Sectors
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and the Information Systems Perspective, 2nd International Conference on Electronic Government and the Information Systems Perspective, 356-369, (Lecture Notes in Computer Science; vol. 6866)
Employing Multi-Core Processor Architectures to Accelerate Java Cryptography Extensions
Ivkovic M., Zefferer T.
Proceedings of the 7th International Conference on Web Information Systems and Technologies, 7th International Conference on Web Information Systems and Technologies, 5-12
Elektronisches Einschreiben im D-A-CH Raum
Tauber A., Zefferer T., Zwattendorfer B.
D-A-CH Security 2011, Arbeitskonferenz DACH Security, 510-521
Ein virtuelles Testframework für E-Government Komponenten
Zefferer T., Krnjic V., Zwattendorfer B.
D-A-CH Security 2011, Arbeitskonferenz DACH Security, 492-503