explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Leitold H.
Privacy and Identity Management for Life, 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 144-150, (IFIP Advances in Information and Communication Technology; vol. 352)
Mendel F., Nad T., Schläffer M.
Information Security and Cryptology - ICISC 2011, 10th International Conference on Information Security and Cryptology, 33-47, (Lecture Notes in Computer science; vol. 7259)
Mendel F., Nad T., Schläffer M.
Advances in Cryptology - ASIACRYPT 2011, 17th International Conference on the Theory and Application of Cryptology and Information Security, 288-307, (Lecture Notes in Computer Science; vol. 7073)
Gammel B., Mangard S.
Journal of Electronic Testing , Vol. 26(4), 483-493
Standaert F., Veyrat-Charvillon N., Oswald E., Gierlichs B., Medwed M., Kasper M., Mangard S.
International Conference on the Theory and Application of Cryptology and Information Security, 112-129
Robal T., Raik J., Hofferek G., Bloem R., Eisner C., Carlsson G.
Leitold H., Posch R., Rannenberg K., Krontiris I.
Handbook of eID Security: Concepts, Practical Experiences, Technologies, Publicis Publishing, 167-186
Leitold H., Posch R., Rössler T.
Computers & Security, Vol. 29(5), 523-532
Tauber A., Reichstädter P.
eGovernment Review, Vol. 5, 18-19
Tauber A.
International journal of e-adoption, Vol. 2(1), 44-56
Apitzsch J., Rohstock O., Thölken L., Boldrin L., Martin B., Rieger S., Seeger M., Tauber A., Worofka P.
Rössler T., Tauber A.
ISSE 2010 Securing Electronic Business Processes, Information Security Solutions Europe Conference, 122-130
Tauber A., Rössler T.
Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC 2010), IEEE Conference on Commerce and Enterprise Computing, 9-17
Tauber A., Rössler T.
The Proceedings of the 10th European Conference on eGovernment (ECEG 2010), European Conference on E-Government, 382-390
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 410-424, (Lecture Notes in Computer Science; vol. 6174)
Bloem R., Cimatti A., Greimel K., Hofferek G., Könighofer R., Roveri M., Schuppan V., Seeber R.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 425-429, (Lecture Notes in Computer Science; vol. 6174)
Schmidt J., Plos T., Kirschbaum M., Hutter M., Medwed M., Herbst C.
Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, International Conference on Smart Card Research and Advanced Applications, 36-48, (LNCS)
Zefferer T., Knall T.
Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010, 25th Annual ACM Symposium on Applied Computing, 1840-1845
Tauber A., Zwattendorfer B., Zefferer T., Mazhari Y., Chamakiotis E.
Electronic Government and the Information Systems Perspective , 1st International Conference on Electronic Government and the Information Systems Perspective, 120-133, (Lecture Notes in Computer Science; vol. 6267)
Leitold H., Zwattendorfer B.
ISSE 2010 Securing Electronic Business Processes, ISSE 2010 Security Conference, 131-142