A-sit - Secure Information Technology Centre Austria

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 2002 2019

Filter
Article
2004

Technische Aspekte des E-Voting

Leitold, H., 2004, In : Journal für Rechtspolitik. 12, 2, p. 77-84

Research output: Contribution to journalArticleResearchpeer-review

2010

Reconstruction of electronic signatures from eDocument printouts

Leitold, H., Posch, R. & Rössler, T., 2010, In : Computers & Security. 29, 5, p. 523-532

Research output: Contribution to journalArticleResearchpeer-review

2011

Mobile qualifizierte Signaturen in Europa

Zefferer, T., Teufl, P. & Leitold, H., 2011, In : Datenschutz und Datensicherheit. p. 768-773

Research output: Contribution to journalArticleResearch

Open Access
File

Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services

Zefferer, T. & Teufl, P., 2011, (Submitted) In : Megatrends in eGovernment.

Research output: Contribution to journalArticleResearch

2012

Approaching the Challenge of eID Interoperability: An Austrian Perspective

Tauber, A., Zefferer, T. & Zwattendorfer, B., 2012, In : European Journal of ePractice. 14, p. 22-39

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2013

Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

Teufl, P., Ferk, M., Fitzek, A. G., Hein, D., Orthacker, C. & Kraxberger, S., 2013, In : Security and communication networks. p. 0-0

Research output: Contribution to journalArticleResearchpeer-review

Middleware Architecture for Cross-Border Identification and Authentication

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2013, In : Journal of Information Assurance and Security . 8, 2, p. 107-118

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2014

Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2014, (Submitted) In : International journal on advances in software. 7 (2014), 1&2

Research output: Contribution to journalArticleResearch

2016

Practical Key Recovery Attack on MANTIS-5

Dobraunig, C. E., Eichlseder, M., Kales, D. & Mendel, F., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

2017

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet
2018

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review