Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2020

Filter
Other report

FutureID, WP 35: Trustworthy Client Platform, D35.1 - Requirements Report

Kamm, F-M., Houdeau, D., Lipp, P., Rath, C., Wagner, C., Sepehrdad, P. & Neven, G., 2013, .

Research output: Book/ReportOther reportResearch

FutureID, WP 35: Trustworthy Client Platform, D35.2 - Interface and Module Specification and Documentation

Kamm, F-M., Eichholz, J., Summerer, A., Rios, J., Busold, C., Rath, C., Pirker, M. & Lipp, P., 2014, .

Research output: Book/ReportOther reportResearch

FutureID, WP 43: Trust Services, D43.3 - Interface and Module Specification

Özmü, E., Derler, D., Rath, C. & Ituarte, N., 2014, .

Research output: Book/ReportOther reportResearch

FutureID, WP 43: Trust Services, D43.4 - Reference Implementation

Rath, C., Derler, D. & Özmü, E., 2014, .

Research output: Book/ReportOther reportResearch

Future plan on use and dissemination

Letombe, F., Hofferek, G., Pravadelli, G., Perbellini, G., Roveri, M., Narasamdya, I., Hui-Bon-Hoa, C., Quigley, R., Becker, M., Müller, W., Dellacherie, S. & Fummi, F., 2010, .

Research output: Book/ReportOther reportResearch

Hardware Crackers

Oswald, M. E. (ed.), Batina, L. (ed.), Pelzl, J. (ed.), Priplata, C. (ed.), Stahlke, C. (ed.) & Francois-Xavier, S. (ed.), 2005, .

Research output: Book/ReportOther reportResearch

Implementation of Security Protocols

Kraxberger, S. & Roman, R., 2009, .

Research output: Book/ReportOther reportResearch

Java Virtual Machines as Small Trusted Computing Bases: A Case Study

Pirker, M., Tögl, R., Vejda, T. & Niederl, A., 2008, .

Research output: Book/ReportOther reportResearch

JSR 321 Trusted Computing API for Java - Community Process Specification - Final Release

Tögl, R., 2011, San Francisco: .

Research output: Book/ReportOther reportResearch

JSR 321 Trusted Computing API for Java - Community Process Specification for Early Draft Review

Tögl, R., 2009, San Francisco: .

Research output: Book/ReportOther reportResearch

MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

Hanser, C. & Deutschmann, M., 2016, . 49 p.

Research output: Book/ReportOther reportResearch

MATTHEW D7.2 Updated Plan and Initial Report on Dissemination and Exploitation

Bock, H., Deutschmann, M., Dietrich, C., Hanser, C., Havlik, J., Moschitz, S. & Wenger, E., 2015, .

Research output: Book/ReportOther reportResearch

MATTHEW D7.3 Final report on Dissemination and Exploitation

Hanser, C., Bock, H., Dietrich, C., Deutschmann, M., Havlik, J., Moschitz, S., Manzi, G. & Paillier, P., 2016, (Submitted) .

Research output: Book/ReportOther reportResearch

MATTHEW D7.7 Final Project Report

Hanser, C., Bock, H., Dietrich, C., Manzi, G., Paillier, P., Deutschmann, M. & Havlik, J., 2016, (Submitted) .

Research output: Book/ReportOther reportResearch

Mistral Security Document

Schläffer, M., 2005, .

Research output: Book/ReportOther reportResearch

Mobile Platform Information Flow Security

Hein, D., Teufl, P. & Zefferer, T., 2011, .

Research output: Book/ReportOther reportResearch

Network and device specific protocols design

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Ongoing Research Areas in Symmetric Cryptography (D.STVL.9)

Rechberger, C. & Rijmen, V., 2008, .

Research output: Book/ReportOther reportResearch

OpenTC PET Scenario - Bank and Client Proxy Architectural Design

Dietrich, K., Winkler, T. & Pirker, M., 2006, .

Research output: Book/ReportOther reportResearch

OpenTC PET Scenario Specification - Description of the Client Proxy / Server Proxy Approach

Dietrich, K., Pirker, M. & Winkler, T., 2006, .

Research output: Book/ReportOther reportResearch

OpenTC WP05 - Design of Basic Public-Key Infrastructure for OpenTC

Pirker, M., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP05d Requirements Analysis - Key management infrastructure and public key enablement

Dietrich, K., Pirker, M. & Winkler, T., 2006, .

Research output: Book/ReportOther reportResearch

OpenTC WP05 - Prototype of Basic Public-Key Infrastructure for OpenTC

Pirker, M., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP3d Report - Java VM for TCP Implementations

Vejda, T., 2007, .

Research output: Book/ReportOther reportResearch

OpenTC WP3 Report: Java API and Library Implementation

Tögl, R. & Steurer, M., 2008, .

Research output: Book/ReportOther reportResearch

OpenTC WP3 Report: Java-API Standardization

Tögl, R., 2009, .

Research output: Book/ReportOther reportResearch

OpenTC WP3 Report - Integrating Trusted Computing into the Java Programming Language

Dietrich, K., Demuth, M., Malin, J., Lipp, P., Pirker, M. & Winkler, T., 2006, .

Research output: Book/ReportOther reportResearch

POSITIF D5.1: STM specification, design and implementation

Payer, U., Kraxberger, S. & Lamberger, M., 2006, .

Research output: Book/ReportOther reportResearch

POSITIF D5.2: BSM definition

Payer, U., Kraxberger, S. & Lamberger, M., 2005, .

Research output: Book/ReportOther reportResearch

POSITIF D7.2: SEM specification, design and implementation

Payer, U., Kraxberger, S. & Lackner, G., 2006, .

Research output: Book/ReportOther reportResearch

PRISMACLOUD D4.4: Overview of Functional and Malleable Signature Schemes

Demirel, D., Derler, D., Hanser, C., Pöhls, H., Slamanig, D. & Traverso, G., 2015, .

Research output: Book/ReportOther reportResearch

Open Access
File

PRISMACLOUD D5.8 Overview of Verifiable Computing Techniques Providing Private and Public Verification

Buchmann, J., Demirel, D., Derler, D., Schabhüser, L. & Slamanig, D., 1 Feb 2016, .

Research output: Book/ReportOther reportResearch

Open Access
File

Report on Reasoning Engines and Dynamic Techniques

Drechsler, R., Fey, G., Finder, A., Hofferek, G., Könighofer, R., Arbel, E., Raik, J., Repinski, U., Jutman, A. & Scholefield, S., 2011, .

Research output: Book/ReportOther reportResearch

Report on the First XAdES Interop-Event

Lipp, P. & Centner, M., 2003, .

Research output: Book/ReportOther reportResearch

Requirements & Concept of the Diagnostic Model

Fey, G., Finder, A., Hofferek, G., Könighofer, R., Larsson, E., Raik, J. & Rokhlenko, O., 2010, .

Research output: Book/ReportOther reportResearch

Open Access
File

Requirements Analysis of Mobile Trusted Modules

Dietrich, K. & Winter, J., 2007, .

Research output: Book/ReportOther reportResearch

Revisiting Privacy-aware Blockchain Public Key Infrastructure

Omolola, O. & Plessing, P., 2019, Cryptology ePrint Archive.

Research output: Book/ReportOther reportResearch

SCARD D1.2 Requirement Specification Report

Aigner, M. J., Mangard, S. & Popp, T., 2004, .

Research output: Book/ReportOther reportResearch

SCARD D2.3 DPA Proof Logic Styles - Technical Report

Popp, T., Mangard, S. & Aigner, M. J., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D2.4 Final Report Logic & Cell Library Development

Aigner, M. J., Popp, T. & Mangard, S., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D5.5 Final Report EDA Framework Development

Valentini, E. & Popp, T., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D6.1 Final Report Modeling & Simulation of SCA Effects

Trifiletti, A., Popp, T., Aigner, M. J., Mangard, S. & Batina, L., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D7.1 Specification SCARD Chip

Roth, M., Tillich, S., Aigner, M. J., Popp, T. & Mangard, S., 2005, .

Research output: Book/ReportOther reportResearch

Secricom WP 2 Analysis of external and internal system requirements

Kočiš, I., Aldabbagh, A., Lázaro, O., López, O., Uriarte, M., Hein, D., Danner, P., Miroslaw, T., Świech, M., Dymowski, W., Hluchý, L., Šimo, B., Balogh, Z., Hudek, V., Machalek, A., Fournaris, A. & Fournier, J., 2009, .

Research output: Book/ReportOther reportResearch

SECRICOM WP4 Security requirements and specification for docking station module

Šimo, B., Balogh, Z., Hein, D., Danner, P., López, O., Uriarte, M. & Hudek, V., 2009, .

Research output: Book/ReportOther reportResearch

SECRICOM WP5 Design of the Chip and Emulator

Scheibe, M., Hein, D., Reymond, G., Fournier, J., Fournaris, A. P., Hudek, V. & Slovak, L., 2011, .

Research output: Book/ReportOther reportResearch

SECRICOM WP5 Functional specification of the Secure Docking Module

Hein, D., Danner, P., Fournaris, A. & Liebl, M., 2009, .

Research output: Book/ReportOther reportResearch

Security protocols for EP2P networks

Kraxberger, S., 2008, .

Research output: Book/ReportOther reportResearch

Security Requirements of EP2P Applications

Kraxberger, S., Payer, U. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

SMEPP D4.2 Security services and primitives for EP2P systems

Alcaraz, C., Foo, E., Georgiades, J., Hess, E., Kargl, A., Lopez, J., Qiu, Y., Roman, R., Serf, P., Tillich, S. & Zhou, J., 2007, .

Research output: Book/ReportOther reportResearch