explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Bloem R., Drechsler R., Fey G., Finder A., Hofferek G., Könighofer R., Raik J., Repinski U., Sülflow A.
Haifa Verification Conference, Haifa Verification Conference, 260-265, (Lecture Notes in Computer Science; vol. 7857)
Könighofer R., Bloem R.
Hardware and Software: Verification and Testing, Haifa Verification Conference, 56-71, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7857 LNCS)
Zwattendorfer B., Tauber A., Stranacher K., Reichstädter P.
Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012, EGOV - IFIP e-Government Conference, 149-161
Zwattendorfer B., Tauber A.
Proceedings of IEEE CCIS2012, IEEE International Conference on Cloud Computing and Intelligence Systems, 515-519
Zwattendorfer B., Tauber A.
ICITST-2012 Proceedings, International Conference for Internet Technology and Secured Transactions, 150-155
Zwattendorfer B., Stranacher K., Tauber A.
D-A-CH Security 2012, Arbeitskonferenz D-A-CH Security 2012, 136-147
Zwattendorfer B., Tauber A.
IADIS International Conferences Web Based Communities and Social Media and Collaborative Technologies 2012, IADIS International Conference Collaborative Technologies 2012, 129-136
Tauber A., Zefferer T., Zwattendorfer B.
European Journal of ePractice, Vol. 2012(14), 22-39
Zefferer T., Tauber A., Zwattendorfer B., Stranacher K.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and IFIP ePart 2012, EGOV - IFIP e-Government Conference, 115-123, (Informatik)
Nad T.
, Doctoral Thesis
Eisenbarth T., Gong Z., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
Progress in Cryptology – AFRICACRYPT 2012 Fifth International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings, African International Conference on Cryptology, 172-187, (Lecture Notes in Computer Science)
Tauber A., Apitzsch J., Boldrin L.
Computer Standards & Interfaces, Vol. 34(5), 452-466
Mendel F., Nad T., Scherz S., Schläffer M.
Information Security, 15th International Conference Information Security , 23-38, (Lecture Notes in Computer Science; vol. 7483)
Mendel F., Nad T., Schläffer M.
Fast Software Encryption, 19th Fast Software Encryption Workshop, 226-243, (Lecture Notes in Computer Science; vol. 7549)
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
2011 6th International Symposium on Industrial Embedded Systems, IEEE International Symposium on Industrial Embedded Systems, 176-185
Mangard S., Elisabeth O., Standaert F.
IET Information Security, 100-110
Medwed M., Mangard S.
Design, Automation and Test in Europe, Design, Automation and Test in Europe Conference and Exhibition
Tögl R., Pirker M., Bloem R., Lindsberger G., Posch S.
Posch K., Posch R., Tauber A., Zefferer T., Zwattendorfer B.
Rainbow of Computer Science, Springer, 259-269, (Lecture Notes in Computer Science)
Zefferer T., Teufl P., Leitold H.
Datenschutz und Datensicherheit, 768-773