default search action
Peter Teufl
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c31]Alexander Marsalek, Christian Kollmann, Thomas Zefferer, Peter Teufl:
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications. IEEE ICBC 2019: 394-402 - 2016
- [j4]Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel M. Hein, Stefan Kraxberger, Clemens Orthacker:
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). Secur. Commun. Networks 9(5): 389-419 (2016) - 2015
- [c30]Thomas Zefferer, Peter Teufl:
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe. EGOVIS 2015: 86-100 - [c29]Florian Reimair, Johannes Feichtner, Peter Teufl:
Attribute-Based Encryption Goes X.509. ICEBE 2015: 393-400 - [c28]Florian Reimair, Peter Teufl, Christian Kollmann, Christoph Thaller:
MoCrySIL - Carry Your Cryptographic Keys in Your Pocket. SECRYPT 2015: 285-292 - [c27]Florian Reimair, Peter Teufl, Bernd Prünster:
In Certificates We Trust - Revisited. TrustCom/BigDataSE/ISPA (1) 2015: 702-709 - [c26]Florian Reimair, Peter Teufl, Thomas Zefferer:
WebCrySIL - Web Cryptographic Service Interoperability Layer. WEBIST 2015: 35-44 - [c25]Florian Reimair, Peter Teufl, Thomas Zefferer:
CrySIL: Bringing Crypto to the Modern User. WEBIST (Revised Selected Papers) 2015: 70-90 - 2014
- [c24]Peter Teufl, Andreas Fitzek, Daniel M. Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer:
Android encryption systems. PRISMS 2014: 1-8 - [c23]Peter Teufl, Thomas Zefferer, Christoph Wörgötter, Alexander Oprisnik, Daniel M. Hein:
Android - On-device detection of SMS catchers and sniffers. PRISMS 2014: 1-8 - [c22]Dominik Ziegler, Mattias Rauter, Christof Stromberger, Peter Teufl, Daniel M. Hein:
Do you think your passwords are secure? PRISMS 2014: 1-8 - [c21]Alexander Oprisnik, Daniel M. Hein, Peter Teufl:
Identifying Cryptographic Functionality in Android Applications. SECRYPT 2014: 151-162 - 2013
- [c20]Thomas Zefferer, Sandra Kreuzhuber, Peter Teufl:
Assessing the Suitability of Current Smartphone Platforms for Mobile Government. EGOVIS/EDEM 2013: 125-139 - [c19]Bernd Zwattendorfer, Christoph Hillebold, Peter Teufl:
Secure and Privacy-Preserving Proxy Voting System. ICEBE 2013: 472-477 - [c18]Peter Teufl, Herbert Leitold, Reinhard Posch:
Semantic Pattern Transformation: Applying Knowledge Discovery Processes in Heterogeneous Domains. I-KNOW 2013: 10:1-10:8 - [c17]Bernd Zwattendorfer, Bojan Suzic, Peter Teufl, Andreas Derler:
Secure Hardware-Based Public Cloud Storage. Open Identity Summit 2013: 43-54 - [c16]Peter Teufl, Thomas Zefferer, Christof Stromberger:
Mobile Device Encryption Systems. SEC 2013: 203-216 - [c15]Peter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner:
iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments. SECRYPT 2013: 170-182 - [c14]Thomas Zefferer, Peter Teufl:
Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones. SECRYPT 2013: 347-354 - [c13]Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian Hanser, Peter Teufl, Liqun Chen:
Group Signatures on Mobile Devices: Practical Experiences. TRUST 2013: 47-64 - 2012
- [c12]Peter Teufl, Thomas Zefferer, Sandra Kreuzhuber, Christian M. Lesjak:
Trusted Location Based Services. ICITST 2012: 185-192 - 2011
- [j3]Thomas Zefferer, Peter Teufl, Herbert Leitold:
Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung elektronischer Signaturen durch die Verwendung mobiler Endgeräte. Datenschutz und Datensicherheit 35(11): 768-773 (2011) - [j2]Peter Teufl, Günther Lackner:
Knowledge Extraction from RDF Data with Activation Patterns. J. Univers. Comput. Sci. 17(7): 983-1004 (2011) - [c11]Günther Lackner, Peter Teufl:
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. AISC 2011: 41-50 - [c10]Peter Teufl, Stefan Kraxberger:
Extracting Semantic Knowledge from Twitter. ePart 2011: 48-59 - [c9]Peter Teufl, Stefan Kraxberger, Clemens Orthacker, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber:
Android Market Analysis with Activation Patterns. MobiSec 2011: 1-12 - [c8]Clemens Orthacker, Peter Teufl, Stefan Kraxberger, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber:
Android Security Permissions - Can We Trust Them? MobiSec 2011: 40-51 - 2010
- [c7]Günther Lackner, Peter Teufl, Roman Weinberger:
User Tracking Based on Behavioral Fingerprints. CANS 2010: 76-95 - [c6]Peter Teufl, Udo Payer, Guenther Lackner:
From NLP (Natural Language Processing) to MLP (Machine Language Processing). MMM-ACNS 2010: 256-269 - [c5]Peter Teufl, Udo Payer, Reinhard Fellner:
Event Correlation on the Basis of Activation Patterns. PDP 2010: 631-640
2000 – 2009
- 2009
- [j1]Günther Lackner, Udo Payer, Peter Teufl:
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods. Int. J. Netw. Secur. 9(2): 164-172 (2009) - [c4]Peter Teufl, Udo Payer, Peter Parycek:
Automated Analysis of e-Participation Data by Utilizing Associative Networks, Spreading Activation and Unsupervised Learning. ePart 2009: 139-150 - 2008
- [c3]Peter Teufl, Udo Payer, Michael Amling, Martin Godec, Stefan Ruff, Gerhard Scheikl, Gernot Walzl:
InFeCT - Network Traffic Classification. ICN 2008: 439-444 - 2005
- [c2]Udo Payer, Peter Teufl, Mario Lamberger:
Hybrid Engine for Polymorphic Shellcode Detection. DIMVA 2005: 19-31 - [c1]Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger:
Massive Data Mining for Polymorphic Code Detection. MMM-ACNS 2005: 448-453
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint