Publications

Export 360 results:
2015
Hörmanseder, R. (2015).  Computernetzwerke - Grundlagen. 2,
Hintze, D., Muaaz M., Findling R. D., Scholz S., Koch E., & Mayrhofer R. (2015).  Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. MoMM '15: Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia.
Hintze, D., Findling R. Dieter, Muaaz M., Koch E., & Mayrhofer R. (2015).  Cormorant: Towards Continuous Risk-aware Multi-modal Cross-device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. 169–172. (555.14 KB)
Muaaz, M., & Mayrhofer R. (2015).  Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor. Fifteenth International Conference on Computer Aided Systems Theory.
Roland, M., & Hölzl M. (2015).  Evaluation of Contactless Smartcard Antennas. Computing Research Repository (CoRR). abs/1507.06427, 29. (4.6 MB)
Findling, R. Dieter (2015).  Key Code Recognition: Case Study of Automatically Deriving the Code of a Physical Key from Mobile Device Camera Images for the EVVA A key profile.
Hölzl, M., Neumeier R., & Ostermayer G. (2015).  Localization in an Industrial Environment: A Case Study on the Difficulties for Positioning in a Harsh Environment. International Journal of Distributed Sensor Networks. 2015,  (2.97 MB)
Riedl, P., Mayrhofer R., Möller A., Kranz M., Lettner F., Holzmann C., et al. (2015).  Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Personal and Ubiquitous Computing. 19, 954.
Mayrhofer, R., Hlavacs H., & Findling R. Dieter (2015).  Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. International Journal of Pervasive Computing and Communications (IJPCC). 11(4), 
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2015).  A Password-authenticated Secure Channel for App to Java Card Applet Communication. International Journal of Pervasive Computing and Communications (IJPCC). 11, 374-397. (618.42 KB)
Roland, M. (2015).  Security Issues in Mobile NFC Devices. T-Labs Series in Telecommunication Services. 185.
Findling, R. Dieter, & Mayrhofer R. (2015).  Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns. 14th International Conference on Mobile and Ubiquitous Multimedia (MUM’15).  (139.74 KB)
Hintze, D. (2015).  Towards Transparent Multi-Device-Authentication. Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers.
2014
Mayrhofer, R. (2014).  An Architecture for Secure Mobile Devices. Security and Communication Networks.
Sonntag, M. (2014).  Cheats aus rechtlicher Sicht. Transparenz. 683 - 692.
Sonntag, M. (2014).  Cloud Computing: Risks and Chances. IDIMT-2014. Networking Societies - Cooperation and Conflict. 355-364.
Hörmanseder, R., & Jäger M. (2014).  Cloud Security Problems Caused By Virtualization Technology Vulnerabilities And Their Prevention. IDIMT-2014 Networking Societies - Cooperation and Conflict.
Sonntag, M., & Schaitl J. (2014).  Das individuelle Gesetzbuch - Open Government Data aus dem RIS. Zeichen und Zauber des Rechts. Festschrift für Friedrich Lachmayer. 403 - 426.
Sonntag, M. (2014).  Die EU-Richtlinie über Angriffe auf Informationssysteme. JusIT. 8-14.
Sonntag, M. (2014).  Die Technizität von Programmlogiken im Gebrauchsmusterschutz. JusIT. 129-133.
Hintze, D., Findling R. Dieter, Muaaz M., Scholz S., & Mayrhofer R. (2014).  Diversity in Locked and Unlocked Mobile Device Usage. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014). 379-384. (327 KB)
Sonntag, M. (2014).  Einführung in das Internetrecht. Rechtsgrundlagen für Informatiker.
Riedl, P. (2014).  Guidelines for secure user interface handling.
Schoiber, G. (2014).  HotPatch Android Patching Framework.
Roland, M., Langer J., & Mayrhofer R. (2014).  Managing the life cycle of Java Card applets in other Java virtual machines. International Journal of Pervasive Computing and Communications. 10, 291–312.

Pages