Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Albertini A., Aumasson J., Eichlseder M., Mendel F., Schläffer M.
Selected Areas in Cryptography, International Workshop on Selected Areas in Cryptography, 1-19, (LNCS
Bogdanov A., Dobraunig C., Eichlseder M., Lauridsen M., Mendel F., Schläffer M., Tischhauser E.
Progress in Cryptology - LATINCRYPT 2014, International Conference on Cryptology and Information Security in Latin America, 274-287, (LNCS
Kamm F., Eichholz J., Summerer A., Rios J., Busold C., Rath C., Pirker M., Lipp P.
Schilling R., Jelinek M., Ortoff M., Unterluggauer T.
Microelectronics (Austrochip), 22nd Austrian Workshop on Microelectronics, Austrian Workshop on Microelectronics (Austrochip), 1-5
Mangard S.
IEEE security & privacy, Vol. 11(4), 75-77
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India, 215-226
Hofferek G., Gupta A., Könighofer B., Jiang J., Bloem R.
FMCAD 2013 - Formal Methods in Computer-Aided Design, International Conference on Formal Methods in Computer-Aided Design, 77-84
Teufl P., Ferk M., Fitzek A., Hein D., Orthacker C., Kraxberger S.
Security and communication networks, 0-0
Zefferer T., Teufl P., Derler D., Potzmader K., Oprisnik A., Gasparitz H., Höller A.
FUTURE COMPUTING 2013: The Fifth International Conference on Future Computational Technologies and Applications, The Fifth International Conference on Future Computational Technologies and Applications, 26-31
Zwattendorfer B., Suzic B., Teufl P., Derler A.
D-A-CH Security 2013, Arbeitskonferenz DACH Security, 120-132
Potzmader K., Winter J., Hein D., Hanser C., Teufl P., Chen L.
6th International Conference on Trust & Trustworthy Computing, 6th International Conference on Trust & Trustworthy Computing, 47-64
Zwattendorfer B., Suzic B., Teufl P., Derler A.
Open Identity Summit 2013, Open Identity Summit 2013, 43-54
Teufl P., Zefferer T., Stromberger C., Hechenblaikner C.
SECRYPT, International Joint Conference on e-Business and Telecommunications, 170-182
Zefferer T., Teufl P.
Proceedings of the 10th International Conference on Security and Cryptography, 10th International Conference on Security and Cryptography (SECRYPT 2013), 347-354
Zwattendorfer B., Hillebold C., Teufl P.
IEEE 10th International Conference on e-Business Engineering, Workshop on Cloud Computing for Mechatronic Systems, 472-477
Teufl P., Leitold H., Posch R.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, 0-0
Teufl P., Zefferer T., Stromberger C.
28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013), Auckland, New Zealand, 8-10 July 2013, 203-216
Zefferer T., Kreuzhuber S., Teufl P.
Technology-Enabled Innovation for Democracy, Government and Governance, International Conference on Electronic Government and the Information Systems Perspective, 125-139
Könighofer R., Hofferek G., Bloem R.
International journal on software tools for technology transfer, Vol. 15(5-6), 563-583
Bloem R., Greimel K., Könighofer R., Röck F.
VALID proceedings, International Conference on Advances in System Testing and Validation Lifecycle, 1-6