Faculty of Computer Science and Biomedical Engineering (7000)

  • 8010

    Inffeldgasse 10 Graz

    Austria

Research Output 1970 2019

Filter
Other report
2009

SECRICOM WP5 Functional specification of the Secure Docking Module

Hein, D., Danner, P., Fournaris, A. & Liebl, M., 2009, .

Research output: Book/ReportOther reportResearch

SMEPP D5.1.3 Design and Implementation of Symmetric and Asymmetric Algorithms

Chiang, T. H., Hess, E., Tillich, S. & Zhou, J., 2009, .

Research output: Book/ReportOther reportResearch

Technologiebeobachtung "Trusted Computing"

Zefferer, T., 2009, .

Research output: Book/ReportOther reportResearch

Open Access
File

Test setup for optical attacks

Schmidt, J-M., 2009, .

Research output: Book/ReportOther reportResearch

The Value of Information Security to European Banking Institutions

Posch, R., Georg, L., Frefel, C., Hämmerli, B., Liebenau, J. & Kärrberg, P., 2009, Zürich, Schweiz: Detecon.

Research output: Book/ReportOther reportResearch

TR.21 Technical Report Guide for Students: Towards the Thesis - Anleitung für Studierende: Auf zur Abschlussarbeit

Holzinger, A., 2009, . (Zweisprachig - Bilingual (English - Deutsch))

Research output: Book/ReportOther reportResearch

2008

Analysis of Modern Cryptographic Hash Functions (FWF P18138-N13 Final Report)

Mendel, F. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

A Roadmap towards e-Democracy

Rössler, T., 2008, .

Research output: Book/ReportOther reportResearch

Open Access
File

Component Infrastructure and Tool Implementation

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

D4.3 - Security Protocols for EP2P Networks

Payer, U., Rodrigo, R., Lopez, J., Kargl, A., Hess, E., Alcaraz Tello, M. C., Zhou, J. & Qiu, Y., 2008, .

Research output: Book/ReportOther reportResearch

Differential Fault Analysis - Final Report

Schmidt, J-M., 2008, .

Research output: Book/ReportOther reportResearch

Digitalisierte Papierstruktur. Endbericht 5. Forschungsjahr

Donoser, M., Hirn, U. & Kritzinger, J., 2008, .

Research output: Book/ReportOther reportResearch

ECRYPT D.VAM.15 Theoretical Models for Side-Channel Attacks

Standaert, F-X., Batina, L., Eisenbarth, T., Gierlichs, B., Kasper, T., Koeune, F., Lemke-Rust, K., Macé, F., Oswald, E., Christophe, P. & Tillich, S., 2008, .

Research output: Book/ReportOther reportResearch

ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

Evaluation of Specific Protocols

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Interactive globally optimal image segmentation

Unger, M., Pock, T. & Bischof, H., 2008, .

Research output: Book/ReportOther reportResearch

Java Virtual Machines as Small Trusted Computing Bases: A Case Study

Pirker, M., Tögl, R., Vejda, T. & Niederl, A., 2008, .

Research output: Book/ReportOther reportResearch

Network and device specific protocols design

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Ongoing Research Areas in Symmetric Cryptography (D.STVL.9)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

OpenTC WP3 Report: Java API and Library Implementation

Tögl, R. & Steurer, M., 2008, .

Research output: Book/ReportOther reportResearch

Robust and Unobtrusive Marker Tracking on Mobile Phones

Wagner, D., Langlotz, T. & Schmalstieg, D., 2008, .

Research output: Book/ReportOther reportResearch

Second Year Report, Bioinformatics Integration Network II

Thallinger, G., Eisenhaber, F., von Haeseler, A., Hofacker, I., Djinovic-Carugo, K., Tilg, B. & Trajanoski, Z., 2008, .

Research output: Book/ReportOther reportResearch

Security protocols for EP2P networks

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

SMEPP D4.4 Power Estimation Methodology for Secure Algorithms and Protocols in Embedded Networks

Baek, J., Kargl, A., Kirschbaum, M., Seuschek, H., Tan, H. C., Tillich, S., Wong, J. W. & Zhou, J., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Architecture, Simulation, and Synthesis Report of SCA-Secure AES Module

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Evaluation of Low Power SCA Countermeasures

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Test and Evaluation Report of AES Chips

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP6 Architecture specification of secure NFC prototype

Aigner, M. J., Feldhofer, M. & Hutter, M., 2008, .

Research output: Book/ReportOther reportResearch

Survey of Appearance-based Methods for Object Recognition

Roth, P. & Winter, M., 2008, .

Research output: Book/ReportOther reportResearch

2007

Conceptual architecture of secure EP2P middleware

Kraxberger, S. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Concrete architecture of secure EP2P middleware services

Kraxberger, S. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Current Status of SHA-1

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, .

Research output: Book/ReportOther reportResearch

Die TU Graz als Leuchtturm für Netzwerk- und Informationssicherheit

Leitold, H. & Posch, R., 2007, Graz: . (Forschungsjournal der Technischen Universität Graz)

Research output: Book/ReportOther reportResearch

First Year Report, Bioinformatics Integration Network II

Thallinger, G., Eisenhaber, F., von Haeseler, A., Schuster, P., Djinovic-Carugo, K., Tilg, B. & Trajanoski, Z., 2007, .

Research output: Book/ReportOther reportResearch

MARQ Endbericht

Wagner, D., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP05 - Design of Basic Public-Key Infrastructure for OpenTC

Pirker, M., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP05 - Prototype of Basic Public-Key Infrastructure for OpenTC

Pirker, M., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP3d Report - Java VM for TCP Implementations

Vejda, T., 2007, .

Research output: Book/ReportOther reportResearch

Removing Polar Rendering Artifacts in Subdivision Surfaces: Technical Report

Augsdörfer, U., Dodgson, N. A. & Sabin, M. A., 2007, University of Cambridge.

Research output: Book/ReportOther reportResearch

Requirements Analysis of Mobile Trusted Modules

Dietrich, K. & Winter, J., 2007, .

Research output: Book/ReportOther reportResearch

Security Requirements of EP2P Applications

Kraxberger, S., Payer, U. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

SMEPP D4.2 Security services and primitives for EP2P systems

Alcaraz, C., Foo, E., Georgiades, J., Hess, E., Kargl, A., Lopez, J., Qiu, Y., Roman, R., Serf, P., Tillich, S. & Zhou, J., 2007, .

Research output: Book/ReportOther reportResearch

SMEPP D5.1.1 Specification of Secure Instruction Sets for EP2P Devices

Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Threat Models for EP2P Networks

Kraxberger, S., Payer, U. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

TR.18 Technical Report Abschlußbericht Projekt GEBRESIN

Holzinger, A., Holzer, H., Zitta, S. & Wassertheurer, S., 2007, .

Research output: Book/ReportOther reportResearch

2006

Approximating boundary-triangulated objects with balls

Aurenhammer, F., Kornberger, B., Peternell, M., Pottmann, H., Aichholzer, O. & Hackl, T., 2006, Graz: .

Research output: Book/ReportOther reportResearch