Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2020

Filter
Other report
2010

DIAMOND Website (Deliverable D5.1)

Robal, T., Raik, J., Hofferek, G., Bloem, R. P., Eisner, C. & Carlsson, G., 2010, .

Research output: Book/ReportOther reportResearch

Open Access
File

Final report

Pravadelli, G., Fummi, F., Letombe, F., Hofferek, G., Perbellini, G., Roveri, M., Hui-Bon-Hoa, C., Müller, W. & Dellacherie, S., 2010, .

Research output: Book/ReportOther reportResearch

Final validation of the COCONUT flow and Tools Integration

Dellacherie, S., Hofferek, G., Pravadelli, G., Bresolin, D., Bombieri, N., Di Guglielmo, L., Geretti, L., Villa, T., Perbellini, G., Roveri, M., Narasamdya, I., Quigley, R., Marques-Silva, J., Letombe, F., Müller, W., Becker, M. & Hui-Bon-Hoa, C., 2010, .

Research output: Book/ReportOther reportResearch

Future plan on use and dissemination

Letombe, F., Hofferek, G., Pravadelli, G., Perbellini, G., Roveri, M., Narasamdya, I., Hui-Bon-Hoa, C., Quigley, R., Becker, M., Müller, W., Dellacherie, S. & Fummi, F., 2010, .

Research output: Book/ReportOther reportResearch

Requirements & Concept of the Diagnostic Model

Fey, G., Finder, A., Hofferek, G., Könighofer, R., Larsson, E., Raik, J. & Rokhlenko, O., 2010, .

Research output: Book/ReportOther reportResearch

Open Access
File

SPOCS D2.1 Inventory of standard documents and relations to open specifications

Stranacher, K., Rössler, T., Boldrin, L., Esposito, A., Marzola, G., Paoletti, S., Kawecki, T., Fragkou, P., Sarafidou, D. & Petkus, P., 2010, .

Research output: Book/ReportOther reportResearch

SPOCS D2.2 Standard Document and Validation Common Specifications

Stranacher, K., Rössler, T., Marzola, G., Esposito, A., Kawecki, T., Paoletti, S., Petkus, P., Katsikogiannis, Y., Routzouni, N., Stasis, A., Milani, P. & Degani, G., 2010, .

Research output: Book/ReportOther reportResearch

SPOCS D3.2: Specifications for interoperable access to eDelivery and eSafe systems

Apitzsch, J., Rohstock, O., Thölken, L., Boldrin, L., Martin, B., Rieger, S., Seeger, M., Tauber, A. & Worofka, P., 2010, .

Research output: Book/ReportOther reportResearch

Status on Implementation-Level Diagnosis

Fey, G., Finder, A., Hofferek, G., Könighofer, R., Larsson, E., Ingelsson, U., Raik, J., Arbel, E., Jutman, A., Carlsson, G. & Scholefield, S., 2010, .

Research output: Book/ReportOther reportResearch

Status on Reasoning Engines and Dynamic Techniques

Drechsler, R., Fey, G., Finder, A., Hofferek, G., Könighofer, R., Raik, J., Rokhlenko, O. & Scholefield, S., 2010, .

Research output: Book/ReportOther reportResearch

Studie Sicherheitsanalyse BlackBerry OS 5

Teufl, P. & Dietrich, K., 2010, .

Research output: Book/ReportOther reportResearch

Studie Sicherheitsanalyse iPhone

Teufl, P., 2010, .

Research output: Book/ReportOther reportResearch

2009

Active Implementation Attacks - Final Report

Schmidt, J-M. & Medwed, M., 2009, .

Research output: Book/ReportOther reportResearch

ARTEUS Interim Report

Schmidt, J-M., Medwed, M., Szekely, A. & Aigner, M. J., 2009, .

Research output: Book/ReportOther reportResearch

Coding Theoretical Countermeasures

Medwed, M. & Schmidt, J-M., 2009, .

Research output: Book/ReportOther reportResearch

Ereignis Korrelation

Teufl, P., 2009, .

Research output: Book/ReportOther reportResearch

Open Access
File

Implementation of Security Protocols

Kraxberger, S. & Roman, R., 2009, .

Research output: Book/ReportOther reportResearch

JSR 321 Trusted Computing API for Java - Community Process Specification for Early Draft Review

Tögl, R., 2009, San Francisco: .

Research output: Book/ReportOther reportResearch

OpenTC WP3 Report: Java-API Standardization

Tögl, R., 2009, .

Research output: Book/ReportOther reportResearch

Secricom WP 2 Analysis of external and internal system requirements

Kočiš, I., Aldabbagh, A., Lázaro, O., López, O., Uriarte, M., Hein, D., Danner, P., Miroslaw, T., Świech, M., Dymowski, W., Hluchý, L., Šimo, B., Balogh, Z., Hudek, V., Machalek, A., Fournaris, A. & Fournier, J., 2009, .

Research output: Book/ReportOther reportResearch

SECRICOM WP4 Security requirements and specification for docking station module

Šimo, B., Balogh, Z., Hein, D., Danner, P., López, O., Uriarte, M. & Hudek, V., 2009, .

Research output: Book/ReportOther reportResearch

SECRICOM WP5 Functional specification of the Secure Docking Module

Hein, D., Danner, P., Fournaris, A. & Liebl, M., 2009, .

Research output: Book/ReportOther reportResearch

SMEPP D5.1.3 Design and Implementation of Symmetric and Asymmetric Algorithms

Chiang, T. H., Hess, E., Tillich, S. & Zhou, J., 2009, .

Research output: Book/ReportOther reportResearch

Technologiebeobachtung "Trusted Computing"

Zefferer, T., 2009, .

Research output: Book/ReportOther reportResearch

Open Access
File

Test setup for optical attacks

Schmidt, J-M., 2009, .

Research output: Book/ReportOther reportResearch

The Value of Information Security to European Banking Institutions

Posch, R., Georg, L., Frefel, C., Hämmerli, B., Liebenau, J. & Kärrberg, P., 2009, Zürich, Schweiz: Detecon.

Research output: Book/ReportOther reportResearch

2008

Analysis of Modern Cryptographic Hash Functions (FWF P18138-N13 Final Report)

Mendel, F. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

A Roadmap towards e-Democracy

Rössler, T., 2008, .

Research output: Book/ReportOther reportResearch

Open Access
File

Component Infrastructure and Tool Implementation

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

D4.3 - Security Protocols for EP2P Networks

Payer, U., Rodrigo, R., Lopez, J., Kargl, A., Hess, E., Alcaraz Tello, M. C., Zhou, J. & Qiu, Y., 2008, .

Research output: Book/ReportOther reportResearch

Differential Fault Analysis - Final Report

Schmidt, J-M., 2008, .

Research output: Book/ReportOther reportResearch

ECRYPT D.VAM.15 Theoretical Models for Side-Channel Attacks

Standaert, F-X., Batina, L., Eisenbarth, T., Gierlichs, B., Kasper, T., Koeune, F., Lemke-Rust, K., Macé, F., Oswald, E., Christophe, P. & Tillich, S., 2008, .

Research output: Book/ReportOther reportResearch

ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

Evaluation of Specific Protocols

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Java Virtual Machines as Small Trusted Computing Bases: A Case Study

Pirker, M., Tögl, R., Vejda, T. & Niederl, A., 2008, .

Research output: Book/ReportOther reportResearch

Network and device specific protocols design

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Ongoing Research Areas in Symmetric Cryptography (D.STVL.9)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

OpenTC WP3 Report: Java API and Library Implementation

Tögl, R. & Steurer, M., 2008, .

Research output: Book/ReportOther reportResearch

Security protocols for EP2P networks

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

SMEPP D4.4 Power Estimation Methodology for Secure Algorithms and Protocols in Embedded Networks

Baek, J., Kargl, A., Kirschbaum, M., Seuschek, H., Tan, H. C., Tillich, S., Wong, J. W. & Zhou, J., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Architecture, Simulation, and Synthesis Report of SCA-Secure AES Module

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Evaluation of Low Power SCA Countermeasures

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Test and Evaluation Report of AES Chips

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP6 Architecture specification of secure NFC prototype

Aigner, M. J., Feldhofer, M. & Hutter, M., 2008, .

Research output: Book/ReportOther reportResearch

2007

Conceptual architecture of secure EP2P middleware

Kraxberger, S. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Concrete architecture of secure EP2P middleware services

Kraxberger, S. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Current Status of SHA-1

Mendel, F., Pramstaller, N., Rechberger, C. & Rijmen, V., 2007, .

Research output: Book/ReportOther reportResearch

Die TU Graz als Leuchtturm für Netzwerk- und Informationssicherheit

Leitold, H. & Posch, R., 2007, Graz: . (Forschungsjournal der Technischen Universität Graz)

Research output: Book/ReportOther reportResearch

OpenTC WP05 - Design of Basic Public-Key Infrastructure for OpenTC

Pirker, M., 2007, .

Research output: Book/ReportOther reportResearch