Thomas Zefferer

According to our database1, Thomas Zefferer authored at least 54 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
E-government in the public cloud: requirements and opportunities.
Electron. Gov. an Int. J., 2020

Total Eclipse of the Heart - Disrupting the InterPlanetary File System.
CoRR, 2020

2019
Privacy-preserving attribute aggregation in eID federations.
Future Gener. Comput. Syst., 2019

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Correctable Public Blockchain.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2018
Evaluation in Pilot-Based Research Projects: A Hierarchical Approach.
Proceedings of the Web Information Systems and Technologies, 2018

A Hierarchical Evaluation Scheme for Pilot-based Research Projects.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018

A Security Analysis of FirstCoin.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe.
Proceedings of the Symposium on Applied Computing, 2017

Best of two worlds: Secure cloud federations meet eIDAS.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems.
Complex Syst. Informatics Model. Q., 2016

Towards a Personal Security Device.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Flexible and Secure Resource Sharing for Mobile Augmentation Systems.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

Towards Privacy-preserving Attribute Aggregation in Federated eID Systems.
Proceedings of the CAiSE'16 Forum, 2016

An Ontology-Based Interoperability Solution for Electronic-Identity Systems.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
A Sustainable Architecture for Secure and Usable Mobile Signature Solutions.
Proceedings of the Web Information Systems and Technologies, 2015

Towards Transactional Electronic Services on Mobile End-user Devices - A Sustainable Architecture for Mobile Signature Solutions.
Proceedings of the WEBIST 2015, 2015

CrySIL: Bringing Crypto to the Modern User.
Proceedings of the Web Information Systems and Technologies, 2015

WebCrySIL - Web Cryptographic Service Interoperability Layer.
Proceedings of the WEBIST 2015, 2015

Paving the Way for Security in Cloud-Based Mobile Augmentation Systems.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015

Encryption-Based Second Authentication Factor Solutions for Qualified Server-Side Signature Creation.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015

POWER: A cloud-based mobile augmentation approach for web- and cross-platform applications.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

2014
A Comparative Survey of Cloud Identity Management-Models.
Proceedings of the Web Information Systems and Technologies, 2014

An Overview of Cloud Identity Management-Models.
Proceedings of the WEBIST 2014, 2014

An Implementation-independent Evaluation Model for Server-based Signature Solutions.
Proceedings of the WEBIST 2014, 2014

Android - On-device detection of SMS catchers and sniffers.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

Android encryption systems.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

A Server-Based Signature Solution for Mobile Devices.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

2013
Enhancing the Modularity and Applicability of Web-Based Signature-Verification Tools.
Proceedings of the Web Information Systems and Technologies - 9th International Conference, 2013

Towards a Modular Architecture for Adaptable Signature-verification Tools.
Proceedings of the WEBIST 2013, 2013

Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones.
Proceedings of the SECRYPT 2013, 2013

iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments.
Proceedings of the SECRYPT 2013, 2013

Mobile Device Encryption Systems.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Assessing the Suitability of Current Smartphone Platforms for Mobile Government.
Proceedings of the Technology-Enabled Innovation for Democracy, Government and Governance, 2013

Towards Mobile Government: Verification of Electronic Signatures on Smartphones.
Proceedings of the Technology-Enabled Innovation for Democracy, Government and Governance, 2013

2012
The Prevalence of SAML within the European Union - An Empirical Study.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Harnessing Electronic Signatures to Improve the Security of SMS-Based Services.
Proceedings of the Web Information Systems and Technologies - 8th International Conference, 2012

Improving the Security of SMS-based Services using Electronic Signatures - Towards SMS-based Processing of Transactional m-Government Services.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Trusted Location Based Services.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Towards User-Friendly e-Government Solutions: Usability Evaluation of Austrian Smart-Card Integration Techniques.
Proceedings of the Advancing Democracy, Government and Governance, 2012

2011
Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung elektronischer Signaturen durch die Verwendung mobiler Endgeräte.
Datenschutz und Datensicherheit, 2011

Employing Multi-core Processor Architectures to Accelerate Java Cryptography Extensions.
Proceedings of the WEBIST 2011, 2011

A privacy-preserving eID based Single Sign-On solution.
Proceedings of the 5th International Conference on Network and System Security, 2011

A Shared Certified Mail System for the Austrian Public and Private Sectors.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

Secure and Privacy-Preserving Cross-Border Authentication: The STORK Pilot 'SaferChat'.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

Secure and Privacy-Preserving eGovernment - Best Practice Austria.
Proceedings of the Rainbow of Computer Science, 2011

2010
An electronic-signature based circular resolution database system.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Towards Interoperability: An Architecture for Pan-European eID-Based Authentication Services.
Proceedings of the Electronic Government and the Information Systems Perspective, 2010

2007
Evaluation of the Masked Logic Style MDPL on a Prototype Chip.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007


  Loading...