Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

Filter
Article
2016

PRISMACLOUD – Privacy and Security Maintaining Services in the Cloud

Slamanig, D., Karyda, A. & Lorünser, T., 2016, In : ERCIM news. 104, p. 46-46

Research output: Contribution to journalArticleResearch

Secure and Privacy-Preserving Identity Management in the Cloud

Zwattendorfer, B., Krenn, S. & Lorünser, T., 2016, In : ERCIM news. 104, p. 44-45

Research output: Contribution to journalArticleResearch

The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality

Zwattendorfer, B. & Slamanig, D., 2016, In : Journal of information security and applications. 27-28

Research output: Contribution to journalArticleResearchpeer-review

The first reactive synthesis competition (SYNTCOMP 2014)

Jacobs, S., Bloem, R., Brenguier, R., Ehlers, R., Hell, T., Könighofer, R., Pérez, G. A., Raskin, J. F., Ryzhyk, L., Sankur, O., Seidl, M., Tentrup, L. & Walker, A., 9 Apr 2016, In : International journal on software tools for technology transfer. p. 1-24 24 p.

Research output: Contribution to journalArticleResearchpeer-review

The Next 700 Impossibility Results in Time-Varying Graphs

Braud-Santoni, N., Dubois, S., Kaaouachi, M-H. & Petit, F., Jan 2016, In : International Journal of Networking and Computing. p. 27-41 1.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

The second reactive synthesis competition (SYNTCOMP 2015)

Jacobs, S., Bloem, R., Brenguier, R., Pérez, G. A., Raskin, J. F., Ryzhyk, L., Sankur, O., Seidl, M., Tentrup, L., Walker, A. & Könighofer, R., 2 Feb 2016, In : Electronic Proceedings in Theoretical Computer Science. 202, p. 27-57 31 p.

Research output: Contribution to journalArticleResearchpeer-review

2015

Design Strategies for a Privacy-Friendly Austrian eID System in the Public Cloud

Zwattendorfer, B. & Slamanig, D., 1 Dec 2015, In : Computers & Security.

Research output: Contribution to journalArticleResearchpeer-review

Fortgeschrittene PDF Signaturen mit PAdES

Fitzek, A. G., Maierhofer, C., Tauber, A. & Zwattendorfer, B., 2015, In : eGovernment review. 15, p. 16-17

Research output: Contribution to journalArticleResearch

Open Access
File

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

Pulls, T. & Slamanig, D., 2015, In : Transactions on data privacy. 8, 2, p. 89-111

Research output: Contribution to journalArticleResearch

Open Access
File

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V. & Schläffer, M., 2015, In : Journal of cryptology. 28, 2, p. 257-296 40 p.

Research output: Contribution to journalArticleResearchpeer-review

2014

Agent-Based Cloud Resource Management for Secure Cloud Infrastructures

Balogh, Z., Gatial, E., Hluchý, L., Tögl, R., Pirker, M. & Hein, D., 2014, In : Computing and informatics. 33, 6, p. 1333-1355

Research output: Contribution to journalArticleResearchpeer-review

Design and Application of a Secure and Flexible Server-Based Mobile eID and e-Signature Solution

Rath, C., Roth, S., Schallar, M. & Zefferer, T., 30 Dec 2014, In : International Journal on Advances in Security . 7, 3&4, p. 50-61

Research output: Contribution to journalArticleResearch

Open Access
File

Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness

Martin, H., Korak, T., San Millan, E. & Hutter, M., 2014, In : IEEE transactions on information forensics and security. 10, 2, p. 266-277

Research output: Contribution to journalArticleResearchpeer-review

Identitätsmanagement in Österreich mit MOA-ID 2.0

Lenz, T., Zwattendorfer, B., Stranacher, K. & Tauber, A., 2014, In : eGovernment review. 13, p. 18-19

Research output: Contribution to journalArticleResearch

Open Access
File

Open Source für europäische Signaturen: Vertrauenswürdige Basis für die elektronische Signatur

Horsch, M., Derler, D., Rath, C., Haase, H-M. & Wich, T., 2014, In : Datenschutz und Datensicherheit. 38, 4, p. 237-241

Research output: Contribution to journalArticleResearch

Secure single sign-on authentication using eIDs across public clouds

Zwattendorfer, B. & Tauber, A., 2014, In : International journal of Internet technology and secured transactions. 5, 4, p. 291-306

Research output: Contribution to journalArticleResearchpeer-review

Synthesizing Robust Systems

Bloem, R. P., Chatterjee, K., Greimel, K., Henzinger, T., Hofferek, G., Jobstmann, B., Könighofer, B. & Könighofer, R., 2014, In : Acta informatica. 51, 3, p. 193-220

Research output: Contribution to journalArticleResearchpeer-review

Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2014, (Submitted) In : International journal on advances in software. 7 (2014), 1&2

Research output: Contribution to journalArticleResearch

Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA: Extended Version

De Mulder, E., Hutter, M., Marson, M. & Pearson, P., 2014, In : Journal of cryptographic engineering. 4, 1, p. 33-45

Research output: Contribution to journalArticleResearchpeer-review

2013

A hijacker’s guide to communication interfaces of the trusted platform module

Winter, J. & Dietrich, K., 2013, In : Computers & mathematics with applications. 65, 5, p. 748-761

Research output: Contribution to journalArticleResearchpeer-review

Authentische und integritätsgesicherte Verwaltungsdaten

Stranacher, K., Krnjic, V. & Zefferer, T., 2013, In : eGovernment review. 11, p. 30-31

Research output: Contribution to journalArticleResearch

Cross-border certified electronic mailing: A European perspective

Tauber, A., Kustor, P. & Karning, B., 2013, In : Computer law & security review. 29, 1, p. 28-39

Research output: Contribution to journalArticleResearchpeer-review

Debugging formal specifications: a practical approach using model-based diagnosis and counterstrategies

Könighofer, R., Hofferek, G. & Bloem, R. P., 2013, In : International journal on software tools for technology transfer. 15, 5-6, p. 563-583

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data

Stranacher, K., Krnjic, V., Zwattendorfer, B. & Zefferer, T., 2013, In : Electronic Journal of e-Government . 11, 2, p. 360-372

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Keeping Secrets on Low-Cost Chips

Mangard, S., 2013, In : IEEE security & privacy. 11, 4, p. 75-77

Research output: Contribution to journalArticleResearchpeer-review

Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

Teufl, P., Ferk, M., Fitzek, A. G., Hein, D., Orthacker, C. & Kraxberger, S., 2013, In : Security and communication networks. p. 0-0

Research output: Contribution to journalArticleResearchpeer-review

Memoryless Near-Collisions, Revisited

Lamberger, M. & Teufl, E., 2013, In : Information Processing Letters. 113, 3, p. 60-66

Research output: Contribution to journalArticleResearchpeer-review

Middleware Architecture for Cross-Border Identification and Authentication

Zwattendorfer, B., Sumelong, I. & Leitold, H., 2013, In : Journal of Information Assurance and Security . 8, 2, p. 107-118

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

On Measuring the Parasitic Backscatter of Sensor-enabled UHF RFID Tags

Plos, T. & Maierhofer, C., 2013, In : Information security technical report. p. 1-14

Research output: Contribution to journalArticleResearchpeer-review

PODC 2013 review

Braud-Santoni, N., 1 Dec 2013, ACM SIGACT News, p. 83-86.

Research output: Contribution to specialist publicationArticleResearch

Security-enabled NFC Tag with Flexible Architecture Supporting Asymmetric Cryptography

Plos, T., Hutter, M., Feldhofer, M., Stiglic, M. & Cavaliere, F., 2013, In : IEEE transactions on very large scale integration (VLSI) systems. p. 1-10

Research output: Contribution to journalArticleResearchpeer-review

The Public Cloud for e-Government

Zwattendorfer, B. & Tauber, A., 2013, In : International journal of distributed systems and technologies. 4, 4, p. 1-14

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2012

An Interoperability Standard for Certified Mail Systems

Tauber, A., Apitzsch, J. & Boldrin, L., 2012, In : Computer standards & interfaces. 34, 5, p. 452-466

Research output: Contribution to journalArticleResearchpeer-review

Approaching the Challenge of eID Interoperability: An Austrian Perspective

Tauber, A., Zefferer, T. & Zwattendorfer, B., 2012, In : European Journal of ePractice. 14, p. 22-39

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Die physikalische Sicherheit eingebetteter Systeme

Mangard, S., 2012, In : Datenschutz und Datensicherheit. p. 867-871

Research output: Contribution to journalArticleResearch

Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods

Moradi, A., Kirschbaum, M., Eisenbarth, T. & Paar, C., 2012, In : IEEE transactions on very large scale integration (VLSI) systems. 20, 9, p. 1578-1589

Research output: Contribution to journalArticleResearchpeer-review

Memoryless Near-Collisions via Coding Theory

Lamberger, M., Mendel, F., Rijmen, V. & Simoens, K., 2012, In : Designs, codes and cryptography. 62, 1, p. 1-18

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Online-Vollmachten

Tauber, A., 2012, In : eGovernment review. 9, p. 16-17

Research output: Contribution to journalArticleResearch

Preimage Attacks against PKC98-Hash and HAS-V

Sasaki, Y., Mendel, F. & Aoki, K., 2012, In : IEICE transactions on fundamentals of electronics, communications and computer sciences. E95-A, 1, p. 111-124

Research output: Contribution to journalArticleResearchpeer-review

Seamless Communication For Crisis Management

Wojciechowicz, W., Fournier, J., Konecny, M., Vanya, S., Stoodley, J., Entwisle, P., Hein, D., Machalek, A., Fournaris, A. P., Uriarte, M., Lopez, O., O'Neill, S., Brandl, H., Balogh, Z., Gatial, E., Hluchý, L., Miroslaw, T. & Zych, J., 2012, In : Technical sciences. p. 65-79

Research output: Contribution to journalArticleResearchpeer-review

Secure Docking Station and its protection against hardware attacks

Fournaris, A. P., Fournier, J., Hein, D. & Reymond, G., 2012, In : Technical sciences. p. 123-138

Research output: Contribution to journalArticleResearchpeer-review

Securing Agents Using Secure Docking Module

Gatial, E., Balogh, Z., Hein, D., Hluchý, L., Tögl, R. & Pirker, M., 2012, In : Technical sciences. p. 111-122

Research output: Contribution to journalArticleResearchpeer-review

Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags

Plos, T., Aigner, M., Baier, T., Feldhofer, M., Hutter, M., Korak, T. & Wenger, E., 2012, In : International Journal of RFID Security and Cryptography. 1, 1/2, p. 16-24

Research output: Contribution to journalArticleResearch

Specification and Standardization of a Java Trusted Computing API

Tögl, R., Winkler, T., Nauman, M. & Hong, T., 2012, In : Software : practice & experience. 42, 8, p. 945-965

Research output: Contribution to journalArticleResearchpeer-review

SPOCS: Interoperable eGovernment Services in the Context of the Services Directive

Tauber, A., Stranacher, K. & Medimorec, D., 2012, In : European Journal of ePractice. 14, p. 90-106

Research output: Contribution to journalArticleResearchpeer-review

Vollständigkeitsnachweis für Daten im Cloud Computing

Slamanig, D. & Stingl, C., 2012, In : Datenschutz und Datensicherheit. 36, 7, p. 510-514

Research output: Contribution to journalArticleResearch

2011

An Approach to Introducing Locality in Remote Attestation using Near Field Communications

Tögl, R. & Hutter, M., 2011, In : The journal of supercomputing. 55, 2, p. 207-227

Research output: Contribution to journalArticleResearchpeer-review

A survey of certified mail systems provided on the Internet

Tauber, A., 2011, In : Computers & Security. 30, 6-7, p. 464-485

Research output: Contribution to journalArticleResearchpeer-review

Elektronische Zustellung in Europa - Vision eines grenzüberschreitenden Einschreibens

Tauber, A., 2011, In : Datenschutz und Datensicherheit. 35, p. 774-778

Research output: Contribution to journalArticleResearch

Grenzüberschreitendes E-Government in Europa

Tauber, A., Zwattendorfer, B., Zefferer, T. & Stranacher, K., 2011, In : eGovernment review. 8, p. 8-9

Research output: Contribution to journalArticleResearch

Open Access
File