Peter Teufl

According to our database1, Peter Teufl authored at least 35 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2016
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play).
Secur. Commun. Networks, 2016

2015
CrySIL: Bringing Crypto to the Modern User.
Proceedings of the Web Information Systems and Technologies, 2015

WebCrySIL - Web Cryptographic Service Interoperability Layer.
Proceedings of the WEBIST 2015, 2015

In Certificates We Trust - Revisited.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

MoCrySIL - Carry Your Cryptographic Keys in Your Pocket.
Proceedings of the SECRYPT 2015, 2015

Attribute-Based Encryption Goes X.509.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015

2014
Identifying Cryptographic Functionality in Android Applications.
Proceedings of the SECRYPT 2014, 2014

Do you think your passwords are secure?
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

Android - On-device detection of SMS catchers and sniffers.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

Android encryption systems.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

2013
Group Signatures on Mobile Devices: Practical Experiences.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones.
Proceedings of the SECRYPT 2013, 2013

iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments.
Proceedings of the SECRYPT 2013, 2013

Mobile Device Encryption Systems.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Secure Hardware-Based Public Cloud Storage.
Proceedings of the Open Identity Summit 2013, September 9th, 2013

Semantic Pattern Transformation: Applying Knowledge Discovery Processes in Heterogeneous Domains.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, 2013

Secure and Privacy-Preserving Proxy Voting System.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Assessing the Suitability of Current Smartphone Platforms for Mobile Government.
Proceedings of the Technology-Enabled Innovation for Democracy, Government and Governance, 2013

2012
Trusted Location Based Services.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Knowledge Extraction from RDF Data with Activation Patterns.
J. Univers. Comput. Sci., 2011

Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung elektronischer Signaturen durch die Verwendung mobiler Endgeräte.
Datenschutz und Datensicherheit, 2011

Android Market Analysis with Activation Patterns.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Android Security Permissions - Can We Trust Them?
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Extracting Semantic Knowledge from Twitter.
Proceedings of the Electronic Participation - Third IFIP WG 8.5 International Conference, 2011

IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Event Correlation on the Basis of Activation Patterns.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

From NLP (Natural Language Processing) to MLP (Machine Language Processing).
Proceedings of the Computer Network Security, 2010

User Tracking Based on Behavioral Fingerprints.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods.
Int. J. Netw. Secur., 2009

Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning.
Proceedings of the Electronic Participation, First International Conference, 2009

2008
InFeCT - Network Traffic Classification.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2005
Massive Data Mining for Polymorphic Code Detection.
Proceedings of the Computer Network Security, 2005

Hybrid Engine for Polymorphic Shellcode Detection.
Proceedings of the Detection of Intrusions and Malware, 2005


  Loading...