Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Teufl P., Lackner G.
10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria, I-KNOW 2010, 18-18, (Journal of Computer Science
Robal T., Raik J., Hofferek G., Bloem R., Eisner C., Carlsson G.
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 410-424, (Lecture Notes in Computer Science
Bloem R., Cimatti A., Greimel K., Hofferek G., Könighofer R., Roveri M., Schuppan V., Seeber R.
Computer Aided Verification, 22nd International Conference on Computer Aided Verification (CAV 2010), 425-429, (Lecture Notes in Computer Science; vol. 6174)
Zefferer T., Ivkovic M., Haid J., Leitold H., Keskel U., Martens T., Knall T.
Zefferer T., Knall T.
Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010, Annual ACM Symposium on Applied Computing, 1840-1845
Tauber A., Zwattendorfer B., Zefferer T., Mazhari Y., Chamakiotis E.
Proceedings of the International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), International Conference on Electronic Government and the Information Systems Perspective, 120-133, (Lecture Notes in Computer Science
Eichholz J., Johnston A., Leitold H., Stern M., Heppe J., Schneider T., Zwattendorfer B.
Leitold H., Posch R., Rannenberg K., Krontiris I.
Handbook of eID Security: Concepts, Practical Experiences, Technologies, 167-186
Leitold H., Posch R., Rössler T.
Computers & Security, Vol. 29(5), 523-532
Campari F., Leitold H., Pregartbauer M., Rössler T., Zuffada R., Zwattendorfer B.
Leitold H., Zwattendorfer B.
ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference, ISSE 2010, 131-142
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Topics in Cryptology - CT-RSA 2010, Cryptographers´ Track at the RSA Conference, 350-365, (LNCS
Rössler T., Tauber A.
Tauber A., Reichstädter P.
eGovernment review, Vol. 5, 18-19
Tauber A.
International journal of e-adoption, Vol. 2(1), 44-56
Apitzsch J., Rohstock O., Thölken L., Boldrin L., Martin B., Rieger S., Seeger M., Tauber A., Worofka P.
Rössler T., Tauber A.
ISSE 2010 Securing Electronic Business Processes, Information Security Solutions Europe Conference, 122-130
Tauber A., Rössler T.
Proceedings of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC 2010), IEEE Conference on Commerce and Enterprise Computing, 9-17
Tauber A., Rössler T.
The Proceedings of the 10th European Conference on eGovernment (ECEG 2010), European Conference on E-Government, 382-390