Research Output 2002 2019

Filter
Conference contribution
Conference contribution

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, p. 554-561 8 p. 8887342

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments
Decentralized decision making
Security analysis
Currency

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

Android Encryption Systems

Teufl, P., Fitzek, A. G., Hein, D., Marsalek, A., Oprisnik, A. & Zefferer, T., 2014, International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android Market Analysis with Activation Patterns

Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 1-12 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Chemical activation
Metadata
Screening
Semantics

Android - On-Device Detection of SMS Catchers and Sniffers

Teufl, P., Zefferer, T., Wörgötter, C., Oprisnik, A. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android Security Permissions - Can we trust them?

Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 40-51 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Implementation-Independent Evaluation Model for Server-Based Signature Solutions

Zefferer, T. & Zwattendorfer, B., 2014, 10th International Conference on Web Information Systems and Technologies. ., p. 302-309

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

An Ontology-based Interoperability Solution for Electronic-Identity Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, IEEE International Conference on Services Computing (SCC 2016). p. 17-24

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Overview of Cloud Identity Management-Models

Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2014, Proceedings of the 10th International Conference on Web Information Systems and Technologies. ., p. 82-92

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Applied Dynamic Policy Selection

Reimair, F., Prünster, B., Reiter, A. & Ertler, C., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Security systems
Information systems
Costs
Industry

A Secure and Flexible Server-Based Mobile eID and e-Signature Solution

Rath, C., Roth, S., Schallar, M. & Zefferer, T., 2014, The Eighth International Conference on Digital Society. ., p. 7-12

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

A Server-Based Signature Solution for Mobile Devices

Zefferer, T., 2014, The 12th International Conference on Advances in Mobile Computing and Multimedia. ., p. 175-184

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Assessing the Suitability of Current Smartphone Platforms for Mobile Government

Zefferer, T., Kreuzhuber, S. & Teufl, P., 2013, Technology-Enabled Innovation for Democracy, Government and Governance. ., p. 125-139

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data

Stranacher, K., Krnjic, V., Zwattendorfer, B. & Zefferer, T., 2013, Proceedings of the 13th European Conference on e-Government. ACPI, p. 508-516

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Survey and Analysis of NFC-based Payment Solutions for Smartphones

Zefferer, T., 2013, IADIS International Conference e-Society 2013. ., p. 275-282

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Systematic Approach to Legal Identity Management - Best Practice Austria

Leitold, H. & Tauber, A., 2011, ISSE 2011 - Securing Electronic Business Processes. Graz: Wiesbaden, p. 224-234

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Attribute-based Encryption goes X.509

Reimair, F. & Feichtner, J., 2015, Proceedings of the International Conference on e-Business Engineering (ICEBE). ., p. 393-400

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Austrian e-Government and Citizen Card Initiatives

Leitold, H. & Posch, R., 2003, Proceedings of the 2nd NATO scientific conference on Security and Protection of Information. ., p. 7-14

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Suzic, B., Prünster, B., Ziegler, D., Marsalek, A. & Reiter, A., 2016, OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer International Publishing AG , p. 943 - 961 18 p. (Lecture Notes in Computer Science (LNCS); no. 10033).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Data privacy
Security of data
Scalability
Processing

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 May 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Bürgerkarten-Authentifizierung zur Public Cloud

Zwattendorfer, B., Stranacher, K. & Tauber, A., 2012, D-A-CH Security 2012. ., p. 136-147

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

C(I)IP Aktivitäten in Österreich

Leitold, H. & Posch, R., 2005, Preprints of CIP Europe 2005. Graz: ., p. 50-60

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Challenges emerging from future cloud application scenarios

Jeferry, K., Kousiouris, G., Kyriazis, D., Altmann, J., Ciuffoletti, A., Maglogiannis, I., Nesi, P., Suzic, B. & Zhao, Z., 2015, Procedia Computer Science: 1st International Conference on Cloud Forward: From Distributed to Complete Computing. Elsevier B.V., Vol. 68. p. 227 - 237

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cloud computing
Interoperability

Challenges of eID Interoperability: The STORK Project

Leitold, H., 2011, Privacy and Identity Management for Life. Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R. & Zhang, G. (eds.). Graz: Springer, Vol. 352. p. 144-150 (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Vol. 4. p. 367-374 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data privacy
Security of data
Risk assessment
Hardware

Do you think your passwords are secure?

Ziegler, D., Stromberger, C., Rauter, M., Teufl, P. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Emulating U2F authenticator devices

Reimair, F., Kollmann, C. & Marsalek, A., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authentication
Smartphones
Smart cards
Hardware

Enabling Secure Communication Over Existing Peer-to-Peer Frameworks

Reiter, A., 2015, (Accepted/In press) 23rd Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP2015). .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation

Rath, C., Roth, S., Bratko, H. & Zefferer, T., 2015, Electronic Government and the Information Systems Perspective. Springer, Vol. 9265. p. 71-85 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

E-Voting: A Scalable Approach using XML and Hardware Security Modules

Leitold, H., Posch, R. & Roessler, T. G., 2005, Proceedings of eee2005. ., p. 480-485

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Flexible and Secure Resource Sharing for Mobile Augmentation Systems

Reiter, A. & Zefferer, T., Apr 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Tar
Ubiquitous computing
Mobile devices
Computer programming languages
Electric power utilization

FutureTrust - Future Trust Services for Trustworthy Global Transactions

Hühnlein, D., Frosch, T., Schwenk, J., Piswanger, C-M., Sel, M., Hühnlein, T., Wich, T., Nemmert, D., Lottes, R., Baszanowski, S., Zeuner, V., Rauh, M., Somorovsky, J., Mladenov, V., Condovici, C., Leitold, H., Stalla-Bourdillon, S., Tsakalakis, N., Eichholz, J., Kamm, F-M. & 20 othersUrmann, J., Kühne, A., Wabisch, D., Dean, R., Shamah, J., Kapanadze, M., Ponte, N., Martins, J., Portela, R., Karabat, Ç., Stojičić, S., Nedeljkovic, S., Bouckaert, V., Defays, A., Anderson, B., Jonas, M., Hermanns, C., Schubert, T., Wegener, D. & Sazonov, A., 2016, Open Identity Summit 2016. Bonn: Gesellschaft für Informatik , p. 27 41 p. (Lecture Notes in Informatics; vol. P-264).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Group Signatures on Mobile Devices: Practical Experiences

Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P. & Chen, L., 2013, 6th International Conference on Trust & Trustworthy Computing. ., p. 47-64

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529. p. 278-292 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Inspection

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, p. 935-944

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

Identification and Confidentiality for e-Government

Leitold, H. & Posch, R., 2002, Certification and Security in E-Services: From E-Government to E-Business. ., p. 25-30

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Identification in cross-border e-Government

Leitold, H., Posch, R. & Roessler, T. G., 2004, European Conference on E-Government. ., p. 481-491

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Identifikationsmodell der österreichischen Bürgerkarte

Leitold, H. & Roessler, T. G., 2005, D-A-CH. Graz: ., p. 121-129

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Identifying Obstacles in moving towards an Interoperable Electronic Identity Management System

Leitold, H., Posch, R. & Hayat, A., 2005, (Submitted) Proceedings of eGOV INTEROP'05. Graz: .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Improving the Security of SMS-Based Services Using Electronic Signatures

Zefferer, T., Tauber, A. & Zwattendorfer, B., 2012, International Conference on Web Information Systems and Technologies. ., p. 743-752

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

In Certificates We Trust - Revisited

Reimair, F., Teufl, P. & Prünster, B., 2015, Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. ., p. 702-709

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments

Teufl, P., Zefferer, T., Stromberger, C. & Hechenblaikner, C., 2013, SECRYPT. ., p. 170-182

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association of Computing Machinery, Vol. Part F128005. p. 69-71 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Concretes

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe

Zefferer, T. & Teufl, P., 2015, Electronic Government and the Information Systems Perspective. Springer, p. 86-100

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Media-break resistant eSignatures in eGovernment – an Austrian experience

Leitold, H., Posch, R. & Rössler, T., 2009, Emerging Challenges for Security, Privacy, and Trust - 24th IFIP SEC. Gritzalis, D. & Lopez, J. (eds.). Graz: Springer, Vol. IFIP AICT 297. p. 109-118 (IFIP Advances in Information and Communication Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Middleware Architecture for Cross-Border eID

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2012, International Conference on Information Assurance and Security. Graz: ., p. 303-308

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 306-313 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)