Publications

Export 360 results:
2013
Findling, R. Dieter, Wenny F., Holzmann C., & Mayrhofer R. (2013).  Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images. Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia. 260–269.
Hölzl, M., Mayrhofer R., & Roland M. (2013).  Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia. 249–252. (546.43 KB)
Nguyen, B. Thanh, & Sprenger C. (2013).  Sound Security Protocol Transformations. POST.  (369.07 KB)
Nguyen, T. Binh (2013).  Sound Security Protocol Transformations. (Sprenger, C., Ed.).POST.
Hölzl, M. (2013).  Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices. Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
Findling, R. Dieter, & Mayrhofer R. (2013).  Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices. International Journal of Pervasive Computing and Communications. 9, 190–208.
Findling, R. Dieter, & Mayrhofer R. (2013).  Towards Secure Personal Device Unlock using Stereo Camera Pan Shots. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013.
Riedl, P. (2013).  Towards the Principal Applicability of a Zone Concept to Create a User-Friendly Secure Mobile Environment. Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).
Muaaz, M. (2013).  A Transparent and Continuous Biometric Authentication Framework for User-Friendly Secure Mobile Environments. in Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).
Mayrhofer, R., Fuss J., & Ion I. (2013).  UACAP: A Unified Auxiliary Channel Authentication Protocol. IEEE Transactions on Mobile Computing. 12, 710–721.
Riedl, P., Koller P., Mayrhofer R., Möller A., Koelle M., & Kranz M. (2013).  Visualizations and Switching Mechanisms for Security Zones. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 278–281.
Sonntag, M. (2013).  Was ist ein "Computerprogramm" im Urheberrecht?. Erich Schweighofer, Franz Kummer, Walter Hötzendorfer (Eds.): Abstraktion und Applikation. 569-576.
Mayrhofer, R. (2013).  When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices. Proceedings of the 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. 1579–1584.
Praher, C. (2013).  Working Sets for the Principle of Least Privilege in Role Based Access Control (RBAC) and Desktop Operating Systems.
2012
König, F., & Paramythis A. (2012).  Adaptive Collaboration Scripting with IMS LD. Daradoumis, T., Demetriadis, S. N., Xhafa, F. (eds.) Intelligent Adaptation and Personalization Techniques in Computer-Supported Collaborative Learning.
Mayrhofer, R., Sommer A., & Saral S. (2012).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. International Journal of Pervasive Computing and Communications ({IJPCC}). 8, 53–78.
Nguyen, T. Binh (2012).  Attack-preserving security protocol transformations.. (Sprenger, C., Ed.).ESSoS-DS.
Nguyen, B. Thanh, Sprenger C., & Basin D. (2012).  Attack-preserving security protocol transformations. ESSoS-DS.  (85.45 KB)
Sonntag, M. (2012).  Automating Web History Analysis. Petr Doucek, Gerhard Gerhard Chroust, Václav Oskrdal (Eds.): IDIMT-2012. ICT Support for Complex Systems.
Sonntag, M. (2012).  Der Nachweis von Inhalten im Internet. Erich Schweighofer, Franz Kummer, Walter Hötzendorfer (Eds.): Transformation juristischer Sprachen.
Sonntag, M. (2012).  Die Spuren der Nutzung von Web-Browsern. Michael Sonntag, Rudolf Hörmanseder (Hrsg.) - Informatik: Von Anfang an. Festschrift für Jörg R. Mühlbacher.
Pabel, K., & Sonntag M. (2012).  E-Voting bei ÖH-Wahl gesetzwidrig. ZTR - Zeitschrift für Energie- und Technikrecht. 175-184.
Muaaz, M., & Nickel C. (2012).  Influence of different walking speeds and surfaces on accelerometer-based biometric gait recognition. in Proceedings of 35th International Conference on Telecommunications and Signal Processing (TSP), 508-512.
Sonntag, M., & Hörmanseder R. (2012).  Informatik: Von Anfang an. Festschrift für Jörg R. Mühlbacher.
Sonntag, M. (2012).  Informationstechnologie: Grundlagen. Dietmar Jahnel, Peter Mader, Elisabeth Staudegger (Hrsg.) (Eds.): IT-Recht.

Pages