Thomas Rössler

According to our database1, Thomas Rössler authored at least 13 papers between 2003 and 2010.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Electronic Voting Using Identity Domain Separation and Hardware Security Modules.
Int. J. E Adopt., 2010

Reconstruction of electronic signatures from eDocument printouts.
Comput. Secur., 2010

A Scalable Interoperability Architecture for Certified Mail Systems.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010

Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation.
Proceedings of the Information Security - 13th International Conference, 2010

The SPOCS Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as Example.
Proceedings of the ISSE 2010, 2010

2009
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience.
Proceedings of the Emerging Challenges for Security, 2009

Empowerment through Electronic Mandates - Best Practice Austria.
Proceedings of the Software Services for e-Business and e-Society, 2009

Professional Presentation in Austrian E-Government.
Proceedings of the Electronic Government, 8th International Conference, 2009

2008
Giving an interoperable e-ID solution: Using foreign e-IDs in Austrian e-Government.
Comput. Law Secur. Rev., 2008

2006
Proposed Framework for Achieving Interoperable Services Between European Public Administrations.
Proceedings of the The First International Conference on Availability, 2006

2005
E-Voting: A Scalable Approach using XML and Hardware Security Modules.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
Process Modelling - Burden or Relief? Living Process Modelling Within a Public Organisation.
Proceedings of the ICEIS 2004, 2004

2003
Privacy and Trust in Distributed Networks.
Proceedings of the Communications and Multimedia Security, 2003


  Loading...