If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

Filter
Conference contribution
2019

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Zefferer, T., Kollmann, C. P. & Teufl, P., 2019, (Accepted/In press) IEEE International Conference on Blockchain and Cryptocurrency. IEEE Xplore

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2015

In Certificates We Trust - Revisited

Reimair, F., Teufl, P. & Prünster, B., 2015, Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. ., p. 702-709

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe

Zefferer, T. & Teufl, P., 2015, Electronic Government and the Information Systems Perspective. Springer, p. 86-100

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

MoCrySIL - Carry Your Cryptographic Keys in Your Pocket

Reimair, F., Teufl, P., Kollmann, C. & Thaller, C., 2015, 12th International Conference on Security and Cryptography. ., p. 285-292

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

WebCrySIL - Web Cryptographic Service Interoperability Layer

Reimair, F., Teufl, P. & Zefferer, T., 2015, 11th International Conference on Web Information Systems and Technologies. ., p. 35-44

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2014

Android Encryption Systems

Teufl, P., Fitzek, A. G., Hein, D., Marsalek, A., Oprisnik, A. & Zefferer, T., 2014, International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Android - On-Device Detection of SMS Catchers and Sniffers

Teufl, P., Zefferer, T., Wörgötter, C., Oprisnik, A. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Do you think your passwords are secure?

Ziegler, D., Stromberger, C., Rauter, M., Teufl, P. & Hein, D., 2014, (Accepted/In press) International Conference on Privacy & Security in Mobile Systems. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2013

Assessing the Suitability of Current Smartphone Platforms for Mobile Government

Zefferer, T., Kreuzhuber, S. & Teufl, P., 2013, Technology-Enabled Innovation for Democracy, Government and Governance. ., p. 125-139

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Group Signatures on Mobile Devices: Practical Experiences

Potzmader, K., Winter, J., Hein, D., Hanser, C., Teufl, P. & Chen, L., 2013, 6th International Conference on Trust & Trustworthy Computing. ., p. 47-64

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

iOS Encryption Systems - Deploying iOS Devices in Security-Critical Environments

Teufl, P., Zefferer, T., Stromberger, C. & Hechenblaikner, C., 2013, SECRYPT. ., p. 170-182

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile Device Encryption Systems

Teufl, P., Zefferer, T. & Stromberger, C., 2013, 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference. ., p. 203-216

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Policy-based Security Assessment of Mobile End-User Devices

Zefferer, T. & Teufl, P., 2013, Proceedings of the 10th International Conference on Security and Cryptography. ., p. 347-354

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Power Consumption-based Application Classification and Malware Detection on Android Using Machine-Learning Techniques

Zefferer, T., Teufl, P., Derler, D., Potzmader, K., Oprisnik, A., Gasparitz, H. & Höller, A., 2013, FUTURE COMPUTING 2013: The Fifth International Conference on Future Computational Technologies and Applications. IARIA, p. 26-31

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure and Privacy-Preserving Proxy Voting System

Zwattendorfer, B., Hillebold, C. & Teufl, P., 2013, IEEE 10th International Conference on e-Business Engineering. ., p. 472-477

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure Hardware-Based Public Cloud Storage

Zwattendorfer, B., Suzic, B., Teufl, P. & Derler, A., 2013, Open Identity Summit 2013. Springer, p. 43-54

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Hardware
Data privacy
Smartphones
Security of data

Semantic Pattern Transformation

Teufl, P., Leitold, H. & Posch, R., 2013, Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies. New York: Association of Computing Machinery, p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Sicheres Speichern in der Public Cloud mittels Smart Cards

Zwattendorfer, B., Suzic, B., Teufl, P. & Derler, A., 2013, D-A-CH Security 2013. ., p. 120-132

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2012

Trusted Location Based Services

Teufl, P., Zefferer, T., Kreuzhuber, S. & Lesjak, C., 2012, 7th International Conference for Internet Technology and Secured Transactions. ., p. 185-192

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2011

Android Market Analysis with Activation Patterns

Teufl, P., Kraxberger, S., Orthacker, C., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 2011, MOBISEC. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Android Security Permissions - Can we trust them?

Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., Gissing, M., Marsalek, A., Leibetseder, J. & Prevenhueber, O., 2011, MOBISEC. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Extracting Semantic Knowledge from Twitter

Teufl, P. & Kraxberger, S., 2011, Third international conference on eParticipation (ePart 2011). ., p. 48-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics

Lackner, G. & Teufl, P., 2011, AISC. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2010

Event correlation on the basis of Activation Patterns

Teufl, P., Payer, U. & Fellner, R., 2010, IEEE. IEEE Computer Society, p. 631-640 (PDP).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

From NLP (Natural Language Processing) to MLP (Machine Language Processing)

Teufl, P., Lackner, G. & Payer, U., 2010, Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings. Springer, Vol. 6258. p. 256-269 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Location Privacy in Kabellosen Netzwerken

Lackner, G. & Teufl, P., 2010, DACH2010. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

RDF Data Analysis with Activation Patterns

Teufl, P. & Lackner, G., 2010, 10th International Conference on Knowledge Management and Knowledge Technologies 1–3 September 2010, Messe Congress Graz, Austria. ., p. 18-18 (Journal of Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

User Tracking based on Behavioral Fingerprints

Lackner, G., Teufl, P. & Weinberger, R., 2010, CANS 2010 Proceedings. ., p. 0-0

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2009

Automated Analysis of e-participation Data by utilizing Associative Networks, Spreading Activation and Unsupervised Learning

Teufl, P., Payer, U. & Parycek, P., 2009, ePart '09: Proceedings of the 1st International Conference on Electronic Participation. Macintosh, A. & Tambouris, E. (eds.). Springer, Vol. 5694. p. 139-150 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Unterschätzes Risiko durch ultramobile Geräte

Lackner, G., Teufl, P. & Weinberger, R., 2009, 7. Information Security Konferenz. Wien: Österreichische Computer Gesellschaft, p. 43-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2008

InFeCT - Network Traffic Classification

Payer, U. & Teufl, P., 2008, International Conference on Networking. ., p. ...-...

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2006

WiFi Chipset Fingerprinting

Lackner, G., Lamberger, M., Teufl, P. & Payer, U., 2006, D.A.CH Mobility. ., p. 41-53

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

Hybrid Engine for Polymorphic Code Detection

Payer, U., Teufl, P. & Lamberger, M., 2005, Detection of intrusions and malware, and vulnerability assessment. Berlin [u.a.]: Springer, Vol. 3548. p. 19-31 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Massive Data Mining for Polymorphic Code Detection

Payer, U., Teufl, P., Kraxberger, S. & Lamberger, M., 2005, Computer Network Security. Gorodeckij, V. (ed.). Berlin [u.a.]: Springer, Vol. 3685. p. 448-453 (Lecture notes im computer science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Traffic Classification using Self-Organizing Maps

Payer, U., Lamberger, M. & Teufl, P., 2005, Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops. ., p. 11-18

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review