explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Tauber A., Zwattendorfer B., Zefferer T., Stranacher K.
eGovernment Review, Vol. 8, 8-9
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of 5th International Conference on Network and System Security (NSS 2011), 5th International Conference on Network and System Security, 295-299
Knall T., Tauber A., Zefferer T., Zwattendorfer B., Axfjord A., Bjarnason H.
Proceedings of the Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2011), 2nd International Conference on Electronic Government and the Information Systems Perspective, 94-106, (LNCS 6866)
Zwattendorfer B., Zefferer T., Tauber A.
Proceedings of the IADIS International Conference e-Health 2011, IADIS International Conference Interfaces and Human Computer Interaction 2011, Part of the IADIS Multi Conference on Computer Science and Information Systems 2011, 97-104
Zefferer T., Krnjic V., Zwattendorfer B.
D-A-CH Security 2011, Arbeitskonferenz DACH Security, 492-503
Zefferer T., Tauber A., Zwattendorfer B., Knall T.
Proceedings of the IADIS International Conference WWW/INTERNET 2011, IADIS International Conference on WWW/Internet, 269-276
Zefferer T., Teufl P.
Megatrends in eGovernment
Leitold H.
Privacy and Identity Management for Life, 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 144-150, (IFIP Advances in Information and Communication Technology)
Leitold H., Tauber A.
ISSE 2011 - Securing Electronic Business Processes, Information Security Solutions Europe Conference, 224-234
Tauber A.
Datenschutz und Datensicherheit, Vol. 35, 774-778
Hofferek G., Bloem R.
9th ACM/IEEE International Conference on Formal Methods and Models for Codesign, MEMOCODE 2011, 9th ACM/IEEE International Conference on Formal Methods and Models for Codesign, 31-42
Tauber A.
Computers & Security, Vol. 30(6-7), 464-485
Könighofer R., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing 6th International Haifa Verification Conference, HVC 2010, Haifa, Israel, October 4-7, 2010. Revised Selected Papers, Haifa Verification Conference 2010, 29-45, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6504 LNCS)
Tauber A., Rössler T.
Information Security, Lecture Notes in Computer Science, Information Security Conference, 152-158, (6531)
Könighofer R., Bloem R.
Proceedings of 11th International Conference 2011 Formal Methods in Computer Aided Design (FMCAD 2011), 11th International Conference 2011 Formal Methods in Computer Aided Design, 91-100
Orthacker C., Zefferer T.
Proceedings of the Forth International Conference on Internet Technologies and Applications (ITA 11), 4th International Conference on Internet Technologies & Applications, 221-228
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and the Information Systems Perspective, 2nd International Conference on Electronic Government and the Information Systems Perspective, 356-369, (Lecture Notes in Computer Science; vol. 6866)