Research Output 2002 2019

Filter
Conference contribution
2014

An Overview of Cloud Identity Management-Models

Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2014, Proceedings of the 10th International Conference on Web Information Systems and Technologies. ., p. 82-92

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Secure and Flexible Server-Based Mobile eID and e-Signature Solution

Rath, C., Roth, S., Schallar, M. & Zefferer, T., 2014, The Eighth International Conference on Digital Society. ., p. 7-12

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Server-Based Signature Solution for Mobile Devices

Zefferer, T., 2014, The 12th International Conference on Advances in Mobile Computing and Multimedia. ., p. 175-184

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Do you think your passwords are secure?

Ziegler, D., Stromberger, C., Rauter, M., Teufl, P. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

STORK 2.0: Breaking New Grounds on eID and Mandates

Leitold, H., Lioy, A. & Ribeiro, C., 2014, Proceedings of ID World International Congress. ., p. 1-8

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Supporting Decision Making and Policy Through Large Scale Pilots

Leitold, H., 2014, Proceeedings of AHFE 2014. Graz: The Printing House Inc., p. 2669-2679

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2013

Assessing the Suitability of Current Smartphone Platforms for Mobile Government

Zefferer, T., Kreuzhuber, S. & Teufl, P., 2013, Technology-Enabled Innovation for Democracy, Government and Governance. ., p. 125-139

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data

Stranacher, K., Krnjic, V., Zwattendorfer, B. & Zefferer, T., 2013, Proceedings of the 13th European Conference on e-Government. ACPI, p. 508-516

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Survey and Analysis of NFC-based Payment Solutions for Smartphones

Zefferer, T., 2013, IADIS International Conference e-Society 2013. ., p. 275-282

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Group Signatures on Mobile Devices: Practical Experiences

Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P. & Chen, L., 2013, 6th International Conference on Trust & Trustworthy Computing. ., p. 47-64

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments

Teufl, P., Zefferer, T., Stromberger, C. & Hechenblaikner, C., 2013, SECRYPT. ., p. 170-182

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile Device Encryption Systems

Teufl, P., Zefferer, T. & Stromberger, C., 2013, 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference. ., p. 203-216

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Policy-based Security Assessment of Mobile End-User Devices

Zefferer, T. & Teufl, P., 2013, Proceedings of the 10th International Conference on Security and Cryptography. ., p. 347-354

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Power Consumption-based Application Classification and Malware Detection on Android Using Machine-Learning Techniques

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2013, FUTURE COMPUTING 2013: The Fifth International Conference on Future Computational Technologies and Applications. IARIA, p. 26-31

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure and Privacy-Preserving Proxy Voting System

Zwattendorfer, B., Hillebold, C. & Teufl, P., 2013, IEEE 10th International Conference on e-Business Engineering. ., p. 472-477

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure Hardware-Based Public Cloud Storage

Zwattendorfer, B., Suzic, B., Teufl, P. & Derler, A., 2013, Open Identity Summit 2013. Springer, p. 43-54

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Hardware
Data privacy
Smartphones
Security of data

Semantic Pattern Transformation

Teufl, P., Leitold, H. & Posch, R., 2013, Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies. New York: Association of Computing Machinery, p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Sicheres Speichern in der Public Cloud mittels Smart Cards

Zwattendorfer, B., Suzic, B., Teufl, P. & Derler, A., 2013, D-A-CH Security 2013. ., p. 120-132

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The INDI Ecosystem of privacy-aware, user-centric Identity

Leontaridis, L., Andersson, T., Leitold, H., Zwattendorfer, B., Yang, S. & Lindholm, P., 2013, ISSE 2013 - Securing Electronic Business Processes. ., p. 45-57

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Towards a Modular Architecture for Adaptable Signature-Verification Tools

Lenz, T., Stranacher, K. & Zefferer, T., 2013, Proceedings of the 9th International Conference on Web Information Systems and Technologies. ., p. 325-334

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Towards Mobile Government: Verification of Electronic Signatures on Smartphones

Zefferer, T., Golser, F. & Lenz, T., 2013, Technology-Enabled Innovation for Democracy, Government and Governance. ., p. 140-151

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Trust and Reliability for Public Sector Data

Stranacher, K., Krnjic, V. & Zefferer, T., 2013, Proceedings of International Conference on e-Business and e-Government. ., Vol. 73. p. 124-132

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2012

Android Market Analysis with Activation Patterns

Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 1-12 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Chemical activation
Metadata
Screening
Semantics

Android Security Permissions - Can we trust them?

Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 40-51 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Bürgerkarten-Authentifizierung zur Public Cloud

Zwattendorfer, B., Stranacher, K. & Tauber, A., 2012, D-A-CH Security 2012. ., p. 136-147

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Improving the Security of SMS-Based Services Using Electronic Signatures

Zefferer, T., Tauber, A. & Zwattendorfer, B., 2012, International Conference on Web Information Systems and Technologies. ., p. 743-752

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Middleware Architecture for Cross-Border eID

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2012, International Conference on Information Assurance and Security. Graz: ., p. 303-308

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Qualified PDF signatures on mobile phones

Zefferer, T., Tauber, A., Zwattendorfer, B. & Stranacher, K., 2012, Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and IFIP ePart 2012. ., Vol. 39. p. 115-123 (Informatik).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

The Prevalence of SAML within the European Union

Zwattendorfer, B., Zefferer, T. & Tauber, A., 2012, International Conference on Web Information Systems and Technologies. ., p. 571-576

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Trusted Location Based Services

Teufl, P., Zefferer, T., Kreuzhuber, S. & Lesjak, C., 2012, 7th International Conference for Internet Technology and Secured Transactions. ., p. 185-192

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Usability Evaluation of Electronic Signature Based E-Government Solutions

Zefferer, T. & Krnjic, V., 2012, Proceedings of the IADIS International Conference WWW/INTERNET 2012. ., p. 227-234

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Vertrauenswürdiges Open Government Data

Stranacher, K., Krnjic, V. & Zefferer, T., 2012, 1.OGD D-A-CH-LI Konferenz. ., p. 27-39

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2011

A Systematic Approach to Legal Identity Management - Best Practice Austria

Leitold, H. & Tauber, A., 2011, ISSE 2011 - Securing Electronic Business Processes. Graz: Wiesbaden, p. 224-234

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Challenges of eID Interoperability: The STORK Project

Leitold, H., 2011, Privacy and Identity Management for Life. Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R. & Zhang, G. (eds.). Graz: Springer, Vol. 352. p. 144-150 (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure and Reliable Online-Verification of Electronic Signatures in the Digital Age

Zefferer, T., Tauber, A., Zwattendorfer, B. & Knall, T., 2011, Proceedings of the IADIS International Conference WWW/INTERNET 2011. ., p. 269-276

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

STORK e-Privacy and Security

Koulolias, V., Kountzeris, A., Crespo, A., Leitold, H., Zwattendorfer, B. & Stern, M., 2011, Proceedings of 5th International Conference on Network and System Security (NSS 2011). Graz: IEEE digital library, p. 234-238

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2010

STORK: Architecture, Implementation and Pilots

Leitold, H. & Zwattendorfer, B., 2010, ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference. Graz: Vieweg+Teubner, p. 131-142

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Open Access
File
2009

Media-break resistant eSignatures in eGovernment – an Austrian experience

Leitold, H., Posch, R. & Rössler, T., 2009, Emerging Challenges for Security, Privacy, and Trust - 24th IFIP SEC. Gritzalis, D. & Lopez, J. (eds.). Graz: Springer, Vol. IFIP AICT 297. p. 109-118 (IFIP Advances in Information and Communication Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

STORK - Interoperable elektronische Identität in Europa

Ivkovic, M., Leitold, H. & Rössler, T., 2009, 7. Information Security Konferenz. Graz: Österreichische Computergesellschaft, p. 175-190

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

C(I)IP Aktivitäten in Österreich

Leitold, H. & Posch, R., 2005, Preprints of CIP Europe 2005. Graz: ., p. 50-60

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

E-Voting: A Scalable Approach using XML and Hardware Security Modules

Leitold, H., Posch, R. & Roessler, T. G., 2005, Proceedings of eee2005. ., p. 480-485

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Identifikationsmodell der österreichischen Bürgerkarte

Leitold, H. & Roessler, T. G., 2005, D-A-CH. Graz: ., p. 121-129

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Identifying Obstacles in moving towards an Interoperable Electronic Identity Management System

Leitold, H., Posch, R. & Hayat, A., 2005, (Submitted) Proceedings of eGOV INTEROP'05. Graz: .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2004

Identification in cross-border e-Government

Leitold, H., Posch, R. & Roessler, T. G., 2004, European Conference on E-Government. ., p. 481-491

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

What to Expect from Biometrics

Leitold, H. & Posch, R., 2004, (Submitted) Proceedings of BSI Biometrieworkshop. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2003

Austrian e-Government and Citizen Card Initiatives

Leitold, H. & Posch, R., 2003, Proceedings of the 2nd NATO scientific conference on Security and Protection of Information. ., p. 7-14

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2002

Identification and Confidentiality for e-Government

Leitold, H. & Posch, R., 2002, Certification and Security in E-Services: From E-Government to E-Business. ., p. 25-30

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review