Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2020

Filter
Other report

SMEPP D4.4 Power Estimation Methodology for Secure Algorithms and Protocols in Embedded Networks

Baek, J., Kargl, A., Kirschbaum, M., Seuschek, H., Tan, H. C., Tillich, S., Wong, J. W. & Zhou, J., 2008, .

Research output: Book/ReportOther reportResearch

SMEPP D5.1.1 Specification of Secure Instruction Sets for EP2P Devices

Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

SMEPP D5.1.3 Design and Implementation of Symmetric and Asymmetric Algorithms

Chiang, T. H., Hess, E., Tillich, S. & Zhou, J., 2009, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Architecture, Simulation, and Synthesis Report of SCA-Secure AES Module

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Evaluation of Low Power SCA Countermeasures

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP4 Test and Evaluation Report of AES Chips

Feldhofer, M., Aigner, M. J. & Popp, T., 2008, .

Research output: Book/ReportOther reportResearch

SNAP WP6 Architecture specification of secure NFC prototype

Aigner, M. J., Feldhofer, M. & Hutter, M., 2008, .

Research output: Book/ReportOther reportResearch

SPOCS D2.1 Inventory of standard documents and relations to open specifications

Stranacher, K., Rössler, T., Boldrin, L., Esposito, A., Marzola, G., Paoletti, S., Kawecki, T., Fragkou, P., Sarafidou, D. & Petkus, P., 2010, .

Research output: Book/ReportOther reportResearch

SPOCS D2.2 Standard Document and Validation Common Specifications

Stranacher, K., Rössler, T., Marzola, G., Esposito, A., Kawecki, T., Paoletti, S., Petkus, P., Katsikogiannis, Y., Routzouni, N., Stasis, A., Milani, P. & Degani, G., 2010, .

Research output: Book/ReportOther reportResearch

SPOCS D2.3 Open Source Standard Document Processing Module

Stranacher, K., Kawecki, T., Petkus, P., Buso, N., Constantinescu, R. & Ilie-Nemedi, I., 2011, .

Research output: Book/ReportOther reportResearch

SPOCS D2.4 Open Source Authentication Module

Stranacher, K., Buso, N., Constantinescu, R., Ilie-Nemedi, I. & Petkus, P., 2011, .

Research output: Book/ReportOther reportResearch

SPOCS D2.5 Final Report Work Package 2, eDocuments

Stranacher, K., 2012, .

Research output: Book/ReportOther reportResearch

SPOCS D2.7 Extended eDocument Common Specification

Stranacher, K., Kawecki, T. & Petkus, P., 2011, .

Research output: Book/ReportOther reportResearch

SPOCS D2.8 Extended eDocument Common Software Modules

Stranacher, K., Boncea, R., Buso, N. & Petkus, P., 2012, .

Research output: Book/ReportOther reportResearch

SPOCS D3.2: Specifications for interoperable access to eDelivery and eSafe systems

Apitzsch, J., Rohstock, O., Thölken, L., Boldrin, L., Martin, B., Rieger, S., Seeger, M., Tauber, A. & Worofka, P., 2010, .

Research output: Book/ReportOther reportResearch

STANCE D5.2.1 Description of the Embedded TPM use case

Tögl, R., Winter, J., Pirker, M., Gissing, M., Weiser, S., Junk, M. & Schmölzer, D., 2013, .

Research output: Book/ReportOther reportResearch

Status on Implementation-Level Correction

Hofferek, G., Könighofer, R., Schmidt, J-M., Fey, G., Finder, A., Sülflow, A., Ingelsson, U., Repinski, U., Raik, J., Karputkin, A. & Scholefield, S., 2011, .

Research output: Book/ReportOther reportResearch

Status on Implementation-Level Diagnosis

Fey, G., Finder, A., Hofferek, G., Könighofer, R., Larsson, E., Ingelsson, U., Raik, J., Arbel, E., Jutman, A., Carlsson, G. & Scholefield, S., 2010, .

Research output: Book/ReportOther reportResearch

Status on Post-Silicon and In-Situ Repair

Larsson, E., Ingelsson, U., Carlsson, G., Jutman, A. & Hofferek, G., 2011, .

Research output: Book/ReportOther reportResearch

Status on Reasoning Engines and Dynamic Techniques

Drechsler, R., Fey, G., Finder, A., Hofferek, G., Könighofer, R., Raik, J., Rokhlenko, O. & Scholefield, S., 2010, .

Research output: Book/ReportOther reportResearch

STORK D5.8.3e: Software Design for MW architecture

Sumelong, I., Lunkeit, A., Zwattendorfer, B. & Schneider, T., 2011, .

Research output: Book/ReportOther reportResearch

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

Fuchsbauer, G., Hanser, C. & Slamanig, D., 16 Nov 2014, IACR .

Research output: Book/ReportOther reportResearch

Studie Sicherheitsanalyse BlackBerry OS 5

Teufl, P. & Dietrich, K., 2010, .

Research output: Book/ReportOther reportResearch

Studie Sicherheitsanalyse iPhone

Teufl, P., 2010, .

Research output: Book/ReportOther reportResearch

Technologiebeobachtung "Konzepte und Umsetzungen NFC-basierter Zahlungssysteme"

Zefferer, T., 2012, .

Research output: Book/ReportOther reportResearch

Technologiebeobachtung "Secure Elements am Beispiel Google Wallet"

Zefferer, T., 2012, .

Research output: Book/ReportOther reportResearch

Technologiebeobachtung "Trusted Computing"

Zefferer, T., 2009, .

Research output: Book/ReportOther reportResearch

Open Access
File

Test setup for optical attacks

Schmidt, J-M., 2009, .

Research output: Book/ReportOther reportResearch

The Value of Information Security to European Banking Institutions

Posch, R., Georg, L., Frefel, C., Hämmerli, B., Liebenau, J. & Kärrberg, P., 2009, Zürich, Schweiz: Detecon.

Research output: Book/ReportOther reportResearch

Threat Models for EP2P Networks

Kraxberger, S., Payer, U. & Tillich, S., 2007, .

Research output: Book/ReportOther reportResearch

Transaction-Level Diagnosis

Hofferek, G., Könighofer, R., Fey, G., Finder, A., Larsson, E., Repinski, U. & Raik, J., 2011, .

Research output: Book/ReportOther reportResearch

Zwischenbericht Projekt Langzeitsignaturen

Lipp, P., 2004, .

Research output: Book/ReportOther reportResearch