No photo of Peter Teufl

Peter Teufl

Dipl.-Ing. Dr.techn.

19992019
If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

Filter
Conference contribution
2019

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Kollmann, C., Zefferer, T. & Teufl, P., 1 May 2019, ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency. Institute of Electrical and Electronics Engineers, p. 394-402 9 p. 8751444

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Industry
Data privacy
Security of data
Middleware
Privacy
2015

In Certificates We Trust - Revisited

Reimair, F., Teufl, P. & Prünster, B., 2015, Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. ., p. 702-709

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe

Zefferer, T. & Teufl, P., 2015, Electronic Government and the Information Systems Perspective. Springer, p. 86-100

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

MoCrySIL - Carry Your Cryptographic Keys in Your Pocket

Reimair, F., Teufl, P., Kollmann, C. & Thaller, C., 2015, 12th International Conference on Security and Cryptography. ., p. 285-292

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

WebCrySIL - Web Cryptographic Service Interoperability Layer

Reimair, F., Teufl, P. & Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., p. 35-44

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2014

Android Encryption Systems

Teufl, P., Fitzek, A. G., Hein, D., Marsalek, A., Oprisnik, A. & Zefferer, T., 2014, International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android - On-Device Detection of SMS Catchers and Sniffers

Teufl, P., Zefferer, T., Wörgötter, C., Oprisnik, A. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Do you think your passwords are secure?

Ziegler, D., Stromberger, C., Rauter, M., Teufl, P. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2013

Assessing the Suitability of Current Smartphone Platforms for Mobile Government

Zefferer, T., Kreuzhuber, S. & Teufl, P., 2013, Technology-Enabled Innovation for Democracy, Government and Governance. ., p. 125-139

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Group Signatures on Mobile Devices: Practical Experiences

Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P. & Chen, L., 2013, 6th International Conference on Trust & Trustworthy Computing. ., p. 47-64

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments

Teufl, P., Zefferer, T., Stromberger, C. & Hechenblaikner, C., 2013, SECRYPT. ., p. 170-182

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile Device Encryption Systems

Teufl, P., Zefferer, T. & Stromberger, C., 2013, 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference. ., p. 203-216

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Policy-based Security Assessment of Mobile End-User Devices

Zefferer, T. & Teufl, P., 2013, Proceedings of the 10th International Conference on Security and Cryptography. ., p. 347-354

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Power Consumption-based Application Classification and Malware Detection on Android Using Machine-Learning Techniques

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2013, FUTURE COMPUTING 2013: The Fifth International Conference on Future Computational Technologies and Applications. IARIA, p. 26-31

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure and Privacy-Preserving Proxy Voting System

Zwattendorfer, B., Hillebold, C. & Teufl, P., 2013, IEEE 10th International Conference on e-Business Engineering. ., p. 472-477

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure Hardware-Based Public Cloud Storage

Zwattendorfer, B., Suzic, B., Teufl, P. & Derler, A., 2013, Open Identity Summit 2013. Springer, p. 43-54

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Hardware
Data privacy
Smartphones
Security of data

Semantic Pattern Transformation

Teufl, P., Leitold, H. & Posch, R., 2013, Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies. New York: Association of Computing Machinery, p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Sicheres Speichern in der Public Cloud mittels Smart Cards

Zwattendorfer, B., Suzic, B., Teufl, P. & Derler, A., 2013, D-A-CH Security 2013. ., p. 120-132

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2012

Android Market Analysis with Activation Patterns

Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 1-12 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Chemical activation
Metadata
Screening
Semantics

Android Security Permissions - Can we trust them?

Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 9 Jul 2012, Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Revised Selected Papers. p. 40-51 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 94 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Trusted Location Based Services

Teufl, P., Zefferer, T., Kreuzhuber, S. & Lesjak, C., 2012, 7th International Conference for Internet Technology and Secured Transactions. ., p. 185-192

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2011

Extracting Semantic Knowledge from Twitter

Teufl, P. & Kraxberger, S., 2011, Third international conference on eParticipation (ePart 2011). ., p. 48-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics

Lackner, G. & Teufl, P., 2011, AISC. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2010

Event correlation on the basis of Activation Patterns

Teufl, P., Payer, U. & Fellner, R., 2010, IEEE. IEEE Computer Society, p. 631-640 (PDP).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

From NLP (Natural Language Processing) to MLP (Machine Language Processing)

Teufl, P., Lackner, G. & Payer, U., 2010, Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings. Springer, Vol. 6258. p. 256-269 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Location Privacy in Kabellosen Netzwerken

Lackner, G. & Teufl, P., 2010, DACH2010. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

RDF Data Analysis with Activation Patterns

Teufl, P. & Lackner, G., 2010, 10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria. ., p. 18-18 (Journal of Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

User Tracking based on Behavioral Fingerprints

Lackner, G., Teufl, P. & Weinberger, R., 2010, CANS 2010 Proceedings. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2009

Automated Analysis of e-participation Data by utilizing Associative Networks, Spreading Activation and Unsupervised Learning

Teufl, P., Payer, U. & Parycek, P., 2009, ePart '09: Proceedings of the 1st International Conference on Electronic Participation. Macintosh, A. & Tambouris, E. (eds.). Springer, Vol. 5694. p. 139-150 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Unterschätzes Risiko durch ultramobile Geräte

Lackner, G., Teufl, P. & Weinberger, R., 2009, 7. Information Security Konferenz. Wien: Österreichische Computer Gesellschaft, p. 43-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2008

InFeCT - Network Traffic Classification

Payer, U. & Teufl, P., 2008, International Conference on Networking. ., p. ...-...

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2006

WiFi Chipset Fingerprinting

Lackner, G., Lamberger, M., Teufl, P. & Payer, U., 2006, D.A.CH Mobility. ., p. 41-53

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

Hybrid Engine for Polymorphic Code Detection

Payer, U., Teufl, P. & Lamberger, M., 2005, Detection of intrusions and malware, and vulnerability assessment. Berlin [u.a.]: Springer, Vol. 3548. p. 19-31 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Massive Data Mining for Polymorphic Code Detection

Payer, U., Teufl, P., Kraxberger, S. & Lamberger, M., 2005, Computer Network Security. Gorodeckij, V. (ed.). Berlin [u.a.]: Springer, Vol. 3685. p. 448-453 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Traffic Classification using Self-Organizing Maps

Payer, U., Lamberger, M. & Teufl, P., 2005, Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops. ., p. 11-18

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review