explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and the Information Systems Perspective, 2nd International Conference on Electronic Government and the Information Systems Perspective, 356-369, (Lecture Notes in Computer Science; vol. 6866)
Lipp P., Bratko H., Rath C.
Proceedings of the European Conference on e-Government ECEG 2011, European Conference on e-Government ECEG 2011, ?-?
Ivkovic M., Zefferer T.
Proceedings of the 7th International Conference on Web Information Systems and Technologies, 7th International Conference on Web Information Systems and Technologies, 5-12
Tauber A., Zefferer T., Zwattendorfer B.
D-A-CH Security 2011, Arbeitskonferenz DACH Security, 510-521
Eisenbarth T., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
ECRYPT Workshop on Lightweight Cryptography 2011, Louvain-la-Neuve, Belgium, November 28-29, 2011, ECRYPT Workshop on Lightweight Cryptography 2011, 1-16
Zefferer T., Krnjic V., Zwattendorfer B.
D-A-CH Security 2011, Arbeitskonferenz DACH Security, 492-503
Tauber A., Zwattendorfer B., Zefferer T.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and ePart 2011, IFIP EGOV and ePart 2011 , 295-301, (Schriftenreihe Informatik; vol. 37)
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2011, 12th International Conference on Cryptology in India, 255-269, (Lecture Notes in Computer Science; vol. 7107)
Koulolias V., Kountzeris A., Leitold H., Zwattendorfer B., Crespo A., Stern M.
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 5th International Conference on Network and System Security, 234-238
Leitold H.
Privacy and Identity Management for Life, 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, 144-150, (IFIP Advances in Information and Communication Technology; vol. 352)
Mendel F., Nad T., Schläffer M.
Information Security and Cryptology - ICISC 2011, 10th International Conference on Information Security and Cryptology, 33-47, (Lecture Notes in Computer science; vol. 7259)
Mendel F., Nad T., Schläffer M.
Advances in Cryptology - ASIACRYPT 2011, 17th International Conference on the Theory and Application of Cryptology and Information Security, 288-307, (Lecture Notes in Computer Science; vol. 7073)
Gammel B., Mangard S.
Journal of Electronic Testing , Vol. 26(4), 483-493
Standaert F., Veyrat-Charvillon N., Oswald E., Gierlichs B., Medwed M., Kasper M., Mangard S.
International Conference on the Theory and Application of Cryptology and Information Security, 112-129
Robal T., Raik J., Hofferek G., Bloem R., Eisner C., Carlsson G.
Leitold H., Posch R., Rannenberg K., Krontiris I.
Handbook of eID Security: Concepts, Practical Experiences, Technologies, Publicis Publishing, 167-186
Leitold H., Posch R., Rössler T.
Computers & Security, Vol. 29(5), 523-532
Tauber A., Reichstädter P.
eGovernment Review, Vol. 5, 18-19
Tauber A.
International journal of e-adoption, Vol. 2(1), 44-56
Apitzsch J., Rohstock O., Thölken L., Boldrin L., Martin B., Rieger S., Seeger M., Tauber A., Worofka P.