Publications

Export 360 results:
2014
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2014).  Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 147-156. (554.86 KB)
Hintze, D., Findling R. Dieter, Scholz S., & Mayrhofer R. (2014).  Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 105-114. (722.63 KB)
Sonntag, M. (2014).  Multimediawerke und der Rechtsschutz technischer Schutzmaßnahmen im Urheberrecht. JusIT. 41-45.
Sonntag, M. (2014).  OGH 4 Ob 5/14k: Rechtzeitigkeit des Rücktritts bei baldigem Leistungsbeginn.. JusIT. 128-129.
Sonntag, M. (2014).  OGH 6 Ob 58/14v: Zum Auskunftsanspruch nach § 18 Abs 4 ECG bei dynamischen IP-Adressen. JusIT 4. 217-218.
Mayrhofer, R., Hlavacs H., & Findling R. Dieter (2014).  Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services. 71-78.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. {MoMM} 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161–164.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161-164.
González, J., Hölzl M., Riedl P., Bonnet P., & Mayrhofer R. (2014).  A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Information Security Conference (ISC 2014).  (643.58 KB)
Riedl, P., & Riedler L. (2014).  Prototypical implementation and demonstration of context sensing and reasoning on embedded mobile devices for estimating current context aspects.
Findling, R. Dieter, Hintze D., Muaaz M., & Mayrhofer R. (2014).  Prototypical Implementation and Demonstration of Multiple Multi-Channel Device Authentication Protocols Using Embedded Sensors on Various Off-the-shelf Mobile Phones.
Hölzl, M., & Riedl P. (2014).  Requirements for Secure Input and Output on Personal Mobile Devices and an Analysis of Advantages/Disadvantages of Different Solutions.
Findling, R. Dieter, Muaaz M., Hintze D., & Mayrhofer R. (2014).  ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 165-174. (586.7 KB)
[Anonymous] (2014).  Special Issue on Security and Trust in Context-Aware Applications. (Schmidtke, H. R., Sigg S., & Mayrhofer R., Ed.).Personal and Ubiquitous Computing.
[Anonymous] (2014).  Special Issue: The confluence and synergy of mobile computing and multimedia with pervasive computing and communication. (Chen, L. Luke, Mayrhofer R., & Steinbauer M., Ed.).International Journal of Pervasive Computing and Communications. 10,
Chong, M. Ki, Mayrhofer R., & Gellersen H. (2014).  A Survey of User Interaction for Spontaneous Device Association. ACM Computing Surveys. 47,
2013
Roland, M., Langer J., & Mayrhofer R. (2013).  (Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 286–292.
Hölzl, M., Neumeier R., & Ostermayer G. (2013).  Analysis of Compass Sensor Accuracy on Several Mobile Devices in an Industrial Environment. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013. 381–389. (743.7 KB)
Muaaz, M., & Mayrhofer R. (2013).  An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. 11th International Conference on Advances in Mobile Computing and Multimedia, (MoMM 2013), Vienna, Austria.
Roland, M., & Langer J. (2013).  Comparison of the Usability and Security of NFC’s Different Operating Modes in Mobile Devices. e & i Elektrotechnik und Informationstechnik. 130, 201–206.
Roland, M. (2013).  Debugging and Rapid Prototyping of NFC Secure Element Applications. Mobile Computing, Applications, and Services (MobiCASE 2013). 130/2014, LNICST, 298–313.
Sonntag, M. (2013).  Evidence Collection for Critical Infrastructure. Petr Doucek, Gerhard Gerhard Chroust, Václav Oskrdal (Eds.): IDIMT-2013. Human Values, Innovation and Economy. 23-30.
Sonntag, M. (2013).  Learning Security through Insecurity. Ariwa, E., Krawczyk-Stando, D., Guncaga, J. (Eds.): Proceedings of the Second International Conference on E-Learning and E-Technologies in Education (ICEEE2013). 143-148.
Acquisti, A., Krontiris I., Langheinrich M., & Sasse M. Angela (2013).  'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). (Acquisti, A., Krontiris I., Langheinrich M., & Sasse M. Angela, Ed.).Dagstuhl Reports. 3, 74–107.
Sonntag, M. (2013).  OGH 6 ObA 86/12y: Zum Werkbegriff "Computerprogramm".. JusIT2. 53-54.

Pages