Export 8 results:
Filters: Author is Peter Riedl [Clear All Filters]
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Personal and Ubiquitous Computing. 19, 954.(2015).
A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Information Security Conference (ISC 2014).(2014).
Prototypical implementation and demonstration of context sensing and reasoning on embedded mobile devices for estimating current context aspects.(2014).
Towards the Principal Applicability of a Zone Concept to Create a User-Friendly Secure Mobile Environment. Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).(2013).
Visualizations and Switching Mechanisms for Security Zones. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 278–281.(2013).
Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting. Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 98-101.(2012).