A-sit - Secure Information Technology Centre Austria

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 2002 2020

Filter
Article

Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2014, (Submitted) In : International journal on advances in software. 7 (2014), 1&2

Research output: Contribution to journalArticleResearch

Technische Aspekte des E-Voting

Leitold, H., 2004, In : Journal für Rechtspolitik. 12, 2, p. 77-84

Research output: Contribution to journalArticleResearchpeer-review

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet

Reconstruction of electronic signatures from eDocument printouts

Leitold, H., Posch, R. & Rössler, T., 2010, In : Computers & Security. 29, 5, p. 523-532

Research output: Contribution to journalArticleResearchpeer-review

Practical Key Recovery Attack on MANTIS-5

Dobraunig, C. E., Eichlseder, M., Kales, D. & Mendel, F., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

Opportunities and Forthcoming Challenges of Smartphone-Based m-Government Services

Zefferer, T. & Teufl, P., 2011, (Submitted) In : Megatrends in eGovernment.

Research output: Contribution to journalArticleResearch

Mobile qualifizierte Signaturen in Europa

Zefferer, T., Teufl, P. & Leitold, H., 2011, In : Datenschutz und Datensicherheit. p. 768-773

Research output: Contribution to journalArticleResearch

Open Access
File

Middleware Architecture for Cross-Border Identification and Authentication

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2013, In : Journal of Information Assurance and Security . 8, 2, p. 107-118

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

Teufl, P., Ferk, M., Fitzek, A. G., Hein, D., Orthacker, C. & Kraxberger, S., 2013, In : Security and communication networks. p. 0-0

Research output: Contribution to journalArticleResearchpeer-review

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

Approaching the Challenge of eID Interoperability: An Austrian Perspective

Tauber, A., Zefferer, T. & Zwattendorfer, B., 2012, In : European Journal of ePractice. 14, p. 22-39

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review