Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Axfjörð A., Jónsson G., Leitold H., Reynisdóttir H.
Koulolias V., Kountzeris A., Crespo A., Leitold H., Zwattendorfer B., Stern M.
Proceedings of 5th International Conference on Network and System Security (NSS 2011), International Conference on Network and System Security, 234-238
Leitold H.
Privacy and Identity Management for Life, 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 144-150, (IFIP Advances in Information and Communication Technology
Leitold H., Tauber A.
ISSE 2011 - Securing Electronic Business Processes, Information Security Solutions Europe Conference, 224-234
Tauber A.
Datenschutz und Datensicherheit, Vol. 35, 774-778
Tauber A.
Computers & Security, Vol. 30(6-7), 464-485
Tauber A., Rössler T.
Information Security, Lecture Notes in Computer Science, Information Security Conference, 152-158, (6531
Lipp P., Bratko H., Rath C.
Proceedings of the European Conference on e-Government ECEG 2011, European Conference on e-Government ECEG 2011, ?-?
Gammel B., Mangard S.
Journal of electronic testing, Vol. 26(4), 483-493
Standaert F., Veyrat-Charvillon N., Oswald E., Gierlichs B., Medwed M., Kasper M., Mangard S.
International Conference on the Theory and Application of Cryptology and Information Security, 112-129
Teufl P., Dietrich K.
Lackner G., Teufl P., Weinberger R.
CANS 2010 Proceedings, 0-0
Teufl P., Payer U., Fellner R.
IEEE, Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2010, Pisa, Italy, February 17-19, 2010, 631-640, (PDP
Lackner G., Teufl P.
DACH2010, DACH2010, 0-0
Teufl P., Lackner G., Payer U.
Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings, International Conference "Mathematical Methods, Models and Architectures for Computer Network Security", 256-269, (Lecture Notes in Computer Science