Peter Teufl
According to our database1,
Peter Teufl
authored at least 35 papers
between 2005 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
2016
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play).
Secur. Commun. Networks, 2016
2015
Proceedings of the Web Information Systems and Technologies, 2015
Proceedings of the WEBIST 2015, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015
Proceedings of the Electronic Government and the Information Systems Perspective, 2015
2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014
2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Open Identity Summit 2013, September 9th, 2013
Semantic Pattern Transformation: Applying Knowledge Discovery Processes in Heterogeneous Domains.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, 2013
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
Proceedings of the Technology-Enabled Innovation for Democracy, Government and Governance, 2013
2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
J. Univers. Comput. Sci., 2011
Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung elektronischer Signaturen durch die Verwendung mobiler Endgeräte.
Datenschutz und Datensicherheit, 2011
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011
Proceedings of the Electronic Participation - Third IFIP WG 8.5 International Conference, 2011
Proceedings of the Ninth Australasian Information Security Conference, 2011
2010
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Int. J. Netw. Secur., 2009
Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning.
Proceedings of the Electronic Participation, First International Conference, 2009
2008
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
2005
Proceedings of the Computer Network Security, 2005
Proceedings of the Detection of Intrusions and Malware, 2005