Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

Filter
Chapter
2019

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 15 Aug 2019, (Accepted/In press) ASIACRYPT 2019.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Polynomials
Hash functions

Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten

Theuermann, K., Zefferer, T., Lenz, T. & Tauber, A., 11 Mar 2019, Handbuch E-Government: Technikinduzierte Verwaltungsentwicklung. Wiesbaden: Springer Fachmedien Wiesbaden, p. 1-30

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

2018

Graph Games and Reactive Synthesis

Bloem, R., Chatterjee, K. & Jobstmann, B., 2018, Handbook of Model Checking. Clark, E. M., Henzinger, T. A., Veith, H. & Bloem, R. (eds.). Cham: Springer, p. 921-962 42 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

2017

A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Zefferer, T., 2017, WEBIST 2015 - Selected and Revised Papers. 1 ed. Springer, p. 343 364 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC

Dobraunig, C. E. & List, E., 2017, Topics in Cryptology -- CT-RSA 2017. Handschuh, H. (ed.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science; vol. 10159).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

2016

CrySIL: Bringing Crypto to the Modern User

Reimair, F., Teufl, P. & Zefferer, T., 22 Mar 2016, Web Information Systems and Technologies: 11th International Conference, WEBIST 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers. Monfort, V., Krempels, K-H., Majchrzak, T. A. & Ẑ. T. (eds.). 1 ed. Springer, p. 70-90 20 p. (Lecture Notes in Business Information Processing; vol. 246).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Cryptography
Interoperability
Authentication
Computer hardware

Enhancing the Modularity and Flexibility of Identity Management Architectures for National and Cross-border eID Applications

Lenz, T. & Zwattendorfer, B., Apr 2016, Lecture Notes in Business Information Processing. Springer, Vol. 246. p. 123-143

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Authentication
Information management
Identification (control systems)

FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution

Schiavo, F. P., Sassone, V., Nicoletti, L., Reiter, A. & Suzic, B., 14 Dec 2016, FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution.

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE

Grassi, L. & Rechberger, C., 2016, Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Dunkelman, O. & Sanadhya, S. K. (eds.). Cham: Springer International Publishing AG , p. 322-342 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

2014

A Comparative Survey of Cloud Identity Management-Models

Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2014, Web Information Systems and Technologies 2014. 1 ed. Springer, p. 128-144

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Measuring Usability to Improve the Efficiency of Electronic Signature-based E-Government Solutions

Zefferer, T., Krnjic, V., Stranacher, K. & Zwattendorfer, B., 2014, Measuring E-government efficiency. The opinions of Public Administrators and other Stakeholders. ., p. 45-74

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2013

Enhancing the Modularity and Applicability of Web-Based Signature-Verication Tools

Lenz, T., Stranacher, K. & Zefferer, T., 2013, Webist 2013 Selected and revised papers. Lecture Notes in Business Information Processing ed. ., p. 173-188

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Hardware and VLSI Designs

Kirschbaum, M. & Plos, T., 2013, (Accepted/In press) Secure Smart Embedded Devices: Platforms and Applications. 1 ed. .

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Harnessing Electronic Signatures to Improve the Security of SMS-based Services

Zefferer, T., Tauber, A. & Zwattendorfer, B., 2013, Web Information Systems and Technologies. 1 ed. ., p. 331-346 (Lecture Notes in Business Information Processing).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

The Austrian Identity Ecosystem – An e-Government Experience

Stranacher, K., Tauber, A., Zefferer, T. & Zwattendorfer, B., 2013, Architectures and Protocols for Secure Information Technology. IGI Global, p. 288-309 (Advances in Information Security, Privacy, and Ethics (AISPE)).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

Towards a Certified Electronic Mail System

Tauber, A., Draper-Gil, G., Ferrer-Gomila, J-L. & Hinarejos, M. F., 2013, Architectures and Protocols for Secure Information Technology. 1 ed. IGI Global, p. 46-70 (Advances in Information Security, Privacy, and Ethics (AISPE)).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2012

Countermeasures for Symmetric Key Ciphers

Schmidt, J-M. & Medwed, M., 2012, Fault Analysis in Cryptography. 1 ed. Heidelberg: Springer, p. 73-88

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Elliptic Curve Cryptography on WISPs

Hutter, M., Wenger, E., Pelnar, M. & Pendl, C., 2012, (Accepted/In press) Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID. 1 ed. .

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Source Bausteine als Kooperationsgrundlage

Posch, R., Orthacker, C., Stranacher, K., Tauber, A., Zefferer, T. & Zwattendorfer, B., 2012, E-Government - Zwischen Partizipation und Kooperation. 1 ed. Vienna: Springer, p. 185-209

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Security Enhanced WISPs: Implementation Challenges

Szekely, A., Höfler, M., Stögbuchner, R. & Aigner, M. J., 2012, (Accepted/In press) Wirelessly Powered Sensor Networks and Computational RFID. 1 ed. Springer

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

STORK - Technical Approach and Privacy

Austria, A-SIT. Z. F. S. I. & Posch, R., 2012, Digital Enlightenment Yearbook 2012. 1 ed. Graz: IOS Press, p. 289-306

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File
2011

A Software Architecture for Introducing Trust in Java-Based Clouds

Podesser, S. & Tögl, R., 2011, Secure and Trust Computing, Data Management, and Applications. Berlin Heidelberg: Springer Verlag, Vol. 186. p. 45-53 (Communications in Computer and Information Science).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Secure and Privacy-preserving eGovernment - Best Practice Austria

Posch, K-C., Posch, R., Tauber, A., Zefferer, T. & Zwattendorfer, B., 2011, Rainbow of Computer Science. Springer, p. 259-269 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

Trust Management Through Hardware Means: Design Concerns and Optimizations

Fournaris, A. P. & Hein, D., 2011, VLSI 2010 Annual Symposium. 1 ed. Niederlande: Springer Netherlands, Vol. 105. p. 31-45 (Lecture Notes in Electrical Engineering).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2010

eID Interoperability (chapter 12)

Leitold, H., Posch, R., Rannenberg, K. & Krontiris, I., 2010, Handbook of eID Security: Concepts, Practical Experiences, Technologies. 1 ed. Graz: Publicis Publishing, p. 167-186

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Privacy Enhancing Technologies in Electronic Health Records

Stingl, C. & Slamanig, D., 2010, Ubiquitous Health and Medical Informatics: The Ubiquity 2.0 Trend and Beyond. 1 ed. Hershey, PA, USA: IGI Global Publisher, p. 275-295

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2009

Codes and provable security of ciphers

Daemen, J. & Rijmen, V., 2009, Enhancing cryptographic primitives with techniques from error correcting codes. Preneel, B., Dodunekov, S. & Rijmen, V. (eds.). 1 ed. IOS Press, Vol. 23. p. 69-80 (NATO Science for Peace and Security Series, Sub-series D: Information and Communication Security).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2008

Hardware Implementation of Symmetric Algorithms for RFID Security

Feldhofer, M. & Wolkerstorfer, J., 2008, RFID Security: Techniques, Protocols and System-On-Chip Design. 1 ed. New York, NY: Springer, p. 373-415

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Smart Cards and Tokens

Posch, K-C. & Aigner, M. J., 2008, Securing Information and Communications Systems: Principles, Technologies, and Applications. 1 ed. Boston [u.a.]: Artech House Publishers, p. 193-210 (Artech House information security and privacy series ; Artech House computer security series).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Symmetric Primitives

Aigner, M. J., Feldhofer, M. & Tillich, S., 2008, Wireless Sensor Network Security. Amsterdam: IOS Press, Vol. 1. p. 44-76 (Cryptology and Information Security Series).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2007

Cryptographic Algorithms in Constrained Environments

Rijmen, V. & Pramstaller, N., 2007, Wireless Security and Cryptography: Specifications and Implementations. 1 ed. CRC Press Taylor & Francis Group, p. 177-211

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Strategische Technologien für das E-Government

Posch, R., 2007, Menschenrechte in der Informationsgesellschaft. 1 ed. Stuttgart: Boorberg, Vol. 14. p. 233-256 (Recht und neue Medien).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Zukunftsperspektive Sichere Verwaltung

Posch, R., 2007, Verwaltung im Umbruch. Neuer Wissenschaftlicher Verlag GmbH Nfg KG, Vol. 3. p. 91-100

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2006

Identification in E-Government: An Overview of Approaches

Leitold, H. & Posch, R., 2006, Encyclopedia of Digital Government. 1 ed. IDEA Group, p. 984-987

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Realtime Intrusion-Forensics: A First Prototype Implementation

Payer, U., 2006, Cyber Forensics: Tools and Practices. 1 ed. CHOWDHRY EXPORT HOUSE, p. ---

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2005

Side-Channel Analysis

Oswald, M. E., 2005, Advances in Elliptic Curve Cryptography. Cambridge University Press, Vol. 317. p. 69-86 (London Mathematical Society Lecture Notes Series).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2004

Basic Security Services and Cryptography

Oswald, M. E., 2004, Security and Privacy in Advanced Networking Technologies. IOS Press, Vol. 193. p. 3-11 (Series III: Computer and Systems Sciences).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

The Austrian Citizen Card: A Bottom-Up View

Leitold, H. & Posch, K-C., 2004, Security and Privacy in Advanced Networking Technologies. NATO Science Series, Series III: Computer and Systems Sciences ed. IOS Press, Vol. 193. p. 231-236

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2003

Technical Trust - An Introduction

Lipp, P., 2003, Trust in the Network Economy. Evolaris, Vol. 2 ed. Springer Verlag; (November 2003), Vol. 2. p. 148-155 (Evolaris).

Research output: Chapter in Book/Report/Conference proceedingChapterResearch