Forschungsoutput 2002 2019

Filter
Beitrag in einem Konferenzband
2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, S. 96-108 12 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, S. 554-561 8 S. 8887342

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Decision making
Experiments
Decentralized decision making
Security analysis
Currency

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, S. 306-313 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Android (operating system)

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Android (operating system)

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (Hrsg.). S. 219-231

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschung

Datei
2018

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (Hrsg.). Cham: Springer International, S. 122-138 16 S. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; Band 255).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Peer to peer networks
Communication

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (Hrsg.). Cham: Springer International Publishing AG , S. 127-140 14 S. (IFIP Advances in Information and Communication Technology; Band 529).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Electronic money

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, S. 236-247 12 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 Mai 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). S. 396-401 6 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (Hrsg.). Cham: Springer International Publishing AG , Band 529. S. 278-292 14 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Inspection

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D., 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing. Association of Computing Machinery

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform

Marsalek, A., Prünster, B., Suzic, B. & Zefferer, T., 2018, Information Systems Security - 14th International Conference, ICISS 2018, Proceedings. Springer Verlag Heidelberg, S. 345-363 19 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 11281 LNCS).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Privacy Preserving
Instant
Communication
Electronics
Business Process

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C., 28 Jul 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Band 1: SECRYPT. S. 380-387 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Smartphones
Program processors
Electronic money
Android (operating system)
2017

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Band 4. S. 367-374 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Data privacy
Security of data
Risk assessment
Hardware

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, S. 935-944

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association of Computing Machinery, Band Part F128005. S. 69-71 3 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Concretes

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Secure Policy-based Device-to-Device Offloading for Mobile Applications

Reiter, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, S. 516-521

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Mobile devices
Security of data
Servers
Virtual machine

Side-Channel Analysis of Keymill

Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F., 2017, Constructive Side-Channel Analysis and Secure Design: COSADE 2017. S. 138-152 (Lecture Notes in Computer Science; Band 10348).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Suzic, B., Reiter, A. & Marsalek, A., Okt 2017, 2017 IEEE Conference on Communications and Network Security (CNS). Las Vegas: IEEE Press, S. 522-530 9 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Specifications
Web services
Automation
Semantics

The Net Rat: Rethinking Connected Services for Increased Security

Prünster, B., Reimair, F. & Reiter, A., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. SciTePress, Band 4: SECRYPT. S. 375-383 9 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Rats
Data privacy
Mobile devices
Personal computers

WebRTC: Your Privacy is at Risk

Reiter, A. & Marsalek, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, S. 664-669

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Communication
Application programming interfaces (API)
Mobile devices
Specifications
Secure communication
2016

An Ontology-based Interoperability Solution for Electronic-Identity Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, IEEE International Conference on Services Computing (SCC 2016). S. 17-24

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Applied Dynamic Policy Selection

Reimair, F., Prünster, B., Reiter, A. & Ertler, C., 19 Okt 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Security systems
Information systems
Costs
Industry

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Suzic, B., Prünster, B., Ziegler, D., Marsalek, A. & Reiter, A., 2016, OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer International Publishing AG , S. 943 - 961 18 S. (Lecture Notes in Computer Science (LNCS); Nr. 10033).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Public administration
Data privacy
Security of data
Scalability
Processing

Emulating U2F authenticator devices

Reimair, F., Kollmann, C. & Marsalek, A., 19 Okt 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Authentication
Smartphones
Smart cards
Hardware

Flexible and Secure Resource Sharing for Mobile Augmentation Systems

Reiter, A. & Zefferer, T., Apr 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Tar
Ubiquitous computing
Mobile devices
Computer programming languages
Electric power utilization

FutureTrust - Future Trust Services for Trustworthy Global Transactions

Hühnlein, D., Frosch, T., Schwenk, J., Piswanger, C-M., Sel, M., Hühnlein, T., Wich, T., Nemmert, D., Lottes, R., Baszanowski, S., Zeuner, V., Rauh, M., Somorovsky, J., Mladenov, V., Condovici, C., Leitold, H., Stalla-Bourdillon, S., Tsakalakis, N., Eichholz, J., Kamm, F-M. &20 mehrUrmann, J., Kühne, A., Wabisch, D., Dean, R., Shamah, J., Kapanadze, M., Ponte, N., Martins, J., Portela, R., Karabat, Ç., Stojičić, S., Nedeljkovic, S., Bouckaert, V., Defays, A., Anderson, B., Jonas, M., Hermanns, C., Schubert, T., Wegener, D. & Sazonov, A., 2016, Open Identity Summit 2016. Bonn: Gesellschaft für Informatik , S. 27 41 S. (Lecture Notes in Informatics; Band P-264).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Securing Integration of Cloud Services in Cross-Domain Distributed Environments

Suzic, B., 2016, Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York, NY, USA: Association of Computing Machinery, S. 398-405 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Industry
Chemical analysis

Square Attack on 7-Round Kiasu-BC

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2016, ACNS 2016. Manulis, M. & Sadeghi, A-R. (Hrsg.). Springer, (LNCS; Band 9696).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Towards Privacy-preserving Attribute Aggregation in Federated eID Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, CAiSE Forum 2016: Proceedings of the CAiSE'16 Forum, at the 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016). CEUR-WS.org, S. 97-104 (CEUR Workshop Proceedings; Band 1612).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Towards Secure Collaboration in Federated Cloud Environments

Suzic, B. & Reiter, A., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES). Institute of Electrical and Electronics Engineers, S. 750-759 10 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Public administration
Security of data
Data privacy
Electronic data interchange
Cloud computing

User-centered Security Management of API-based Data Integration Workflows

Suzic, B., 2016, 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS). Institute of Electrical and Electronics Engineers, S. 1233-1238 6 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Data integration
Application programming interfaces (API)
Outsourcing
Industry
Network protocols
2015

Attribute-based Encryption goes X.509

Reimair, F. & Feichtner, J., 2015, Proceedings of the International Conference on e-Business Engineering (ICEBE). ., S. 393-400

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Challenges emerging from future cloud application scenarios

Jeferry, K., Kousiouris, G., Kyriazis, D., Altmann, J., Ciuffoletti, A., Maglogiannis, I., Nesi, P., Suzic, B. & Zhao, Z., 2015, Procedia Computer Science: 1st International Conference on Cloud Forward: From Distributed to Complete Computing. Elsevier B.V., Band 68. S. 227 - 237

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Cloud computing
Interoperability

Enabling Secure Communication Over Existing Peer-to-Peer Frameworks

Reiter, A., 2015, (Angenommen/In Druck) 23rd Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP2015). .

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation

Rath, C., Roth, S., Bratko, H. & Zefferer, T., 2015, Electronic Government and the Information Systems Perspective. Springer, Band 9265. S. 71-85 (Lecture Notes in Computer Science).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

In Certificates We Trust - Revisited

Reimair, F., Teufl, P. & Prünster, B., 2015, Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. ., S. 702-709

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe

Zefferer, T. & Teufl, P., 2015, Electronic Government and the Information Systems Perspective. Springer, S. 86-100

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

MoCrySIL - Carry Your Cryptographic Keys in Your Pocket

Reimair, F., Teufl, P., Kollmann, C. & Thaller, C., 2015, 12th International Conference on Security and Cryptography. ., S. 285-292

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

PaaSPort – A unified PaaS-Cloud Management Application avoiding Vendor Lock-In

Zwattendorfer, B., Suzic, B. & Schanner, G., 2015, Proceedings of the 13th International Conference e-Society 2015. IADIS Press, S. 223-230

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Paving the Way for Security in Cloud-Based Mobile Augmentation Systems

Reiter, A. & Zefferer, T., 2015, 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015). Institute of Electrical and Electronics Engineers, S. 89-98

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

POWER: A Cloud-based Mobile Augmentation Approach for Web- and Cross-Platform Applications

Reiter, A. & Zefferer, T., 2015, (Angenommen/In Druck) Cloud Networking. .

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Secure Data Sharing and Processing in Heterogeneous Clouds

Suzic, B., Reiter, A., Reimair, F., Venturi, D. & Kubo, B., 2015, Procedia Computer Science: 1st International Conference on Cloud Forward: From Distributed to Complete Computing Secure Data Sharing and Processing in Heterogeneous Clouds. Elsevier B.V., Band 68.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Cloud computing
Processing
Access control
Interoperability
Transparency

Towards a New Generation of Mobile Government

Zefferer, T., 2015, 13th International Conference on e-Society 2015. ., S. 191-198

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Towards Transactional Electronic Services on Mobile End-User Devices - A Sustainable Architecture for Mobile Signature Solutions

Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., S. 586-597

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

WebCrySIL - Web Cryptographic Service Interoperability Layer

Reimair, F., Teufl, P. & Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., S. 35-44

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
2014

Android Encryption Systems

Teufl, P., Fitzek, A. G., Hein, D., Marsalek, A., Oprisnik, A. & Zefferer, T., 2014, International Conference on Privacy & Security in Mobile Systems. .

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Android - On-Device Detection of SMS Catchers and Sniffers

Teufl, P., Zefferer, T., Wörgötter, C., Oprisnik, A. & Hein, D., 2014, (Angenommen/In Druck) International Conference on Privacy & Security in Mobile Systems. .

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

An Implementation-Independent Evaluation Model for Server-Based Signature Solutions

Zefferer, T. & Zwattendorfer, B., 2014, 10th International Conference on Web Information Systems and Technologies. ., S. 302-309

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei