We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
STORK: Pilot 4 Towards Cross-border Electronic Delivery
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and ePart 2011, IFIP EGOV and ePart 2011 , 295-301, (Schriftenreihe Informatik; vol. 37)
STORK e-Privacy and Security
Koulolias V., Kountzeris A., Leitold H., Zwattendorfer B., Crespo A., Stern M.
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 5th International Conference on Network and System Security, 234-238
Challenges of eID Interoperability: The STORK Project
Leitold H.
Privacy and Identity Management for Life, 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 144-150, (IFIP Advances in Information and Communication Technology; vol. 352)
Cryptanalysis of Round-Reduced HAS-160
Mendel F., Nad T., Schläffer M.
Information Security and Cryptology - ICISC 2011, 10th International Conference on Information Security and Cryptology, 33-47, (Lecture Notes in Computer science; vol. 7259)
Finding SHA-2 Characteristics: Searching Through a Minefield of Contradictions
Mendel F., Nad T., Schläffer M.
Advances in Cryptology - ASIACRYPT 2011, 17th International Conference on the Theory and Application of Cryptology and Information Security, 288-307, (Lecture Notes in Computer Science; vol. 7073)
On the Duality of Probing and Fault Attacks
Gammel B., Mangard S.
Journal of Electronic Testing , Vol. 26(4), 483-493
The World Is Not Enough: Another Look on Second-Order DPA
Standaert F., Veyrat-Charvillon N., Oswald E., Gierlichs B., Medwed M., Kasper M., Mangard S.
International Conference on the Theory and Application of Cryptology and Information Security, 112-129
DIAMOND Website (Deliverable D5.1)
Robal T., Raik J., Hofferek G., Bloem R., Eisner C., Carlsson G.
eID Interoperability (chapter 12)
Leitold H., Posch R., Rannenberg K., Krontiris I.
Handbook of eID Security: Concepts, Practical Experiences, Technologies, Publicis Publishing, 167-186
Reconstruction of electronic signatures from eDocument printouts
Leitold H., Posch R., Rössler T.
Computers & Security, Vol. 29(5), 523-532
Privatzustellung – Der elektronisch eingeschriebene Brief
Tauber A., Reichstädter P.
eGovernment Review, Vol. 5, 18-19
Requirements and Properties of Qualified Electronic Delivery Systems in eGovernment – an Austrian Experience
Tauber A.
International journal of e-adoption, Vol. 2(1), 44-56
SPOCS D3.2: Specifications for interoperable access to eDelivery and eSafe systems
Apitzsch J., Rohstock O., Thölken L., Boldrin L., Martin B., Rieger S., Seeger M., Tauber A., Worofka P.
The SPOCS Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as Example
Rössler T., Tauber A.
ISSE 2010 Securing Electronic Business Processes, Information Security Solutions Europe Conference, 122-130
A Scalable Interoperability Architecture for Certified Mail Systems
Tauber A., Rössler T.
Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC 2010), IEEE Conference on Commerce and Enterprise Computing, 9-17
Interoperability Challenges for Pan-European Qualified Exchange of Electronic Documents
Tauber A., Rössler T.
The Proceedings of the 10th European Conference on eGovernment (ECEG 2010), European Conference on E-Government, 382-390
Robustness in the Presence of Liveness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 410-424, (Lecture Notes in Computer Science; vol. 6174)
RATSY - A new Requirements Analysis Tool with Synthesis
Bloem R., Cimatti A., Greimel K., Hofferek G., Könighofer R., Roveri M., Schuppan V., Seeber R.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 425-429, (Lecture Notes in Computer Science; vol. 6174)
Side-Channel Leakage Across Borders
Schmidt J., Plos T., Kirschbaum M., Hutter M., Medwed M., Herbst C.
Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, International Conference on Smart Card Research and Advanced Applications, 36-48, (LNCS)
An Electronic-signature Based Circular Resolution Database System
Zefferer T., Knall T.
Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010, 25th Annual ACM Symposium on Applied Computing, 1840-1845