Export 352 results:
Mayrhofer, R., Reisner H., & Haidinger A. (2017).  Cybercrime: Darknet. Cybercrime - Darknet. 1,
Sonntag, M. (2017).  Die "Neuheit" einer Öffentlichkeit im Urheberrecht - Zugleich Anmerkung zu OGH 4 Ob 249/15v. Trends und Communities der Rechtsinformatik.
Hölzl, M., Roland M., & Mayrhofer R. (2017).  An Extensible and Privacy-preserving Mobile eID System for Real-world Identification and Offline Verification. The Smart World Revolution - 12th International IFIP Summer School on Privacy and Identity Management (Pre-proceedings).
Muaaz, M. (2017).  Implicit Biometric Authentication for Smartphones. xviii, 198, 3 Pages.
Hintze, D., Hintze P., Findling R. Dieter, & Mayrhofer R. (2017).  A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 1,  (1.34 MB)
Sonntag, M. (2017).  Privacy and Security - Friends or Enemies?. IDIMT-2017. Digitalization in Management, Society and Economy.
Ota, F. Kaway Carv, Roland M., Hölzl M., Mayrhofer R., & Manacero A. (2017).  Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags. Information. 8,
Hölzl, M., Roland M., & Mayrhofer R. (2017).  Real-world Identification for an Extensible and Privacy-preserving Mobile eID. Privacy and Identity Management. The Smart World Revolution - 12th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School.
Aichhorn, A., Etzlinger B., Hutterer S., & Mayrhofer R. (2017).  Secure communication interface for line current differential protection over Ethernet-based networks. 2017 IEEE Manchester PowerTech.
Mayrhofer, R. (2017).  Security for Medical Data and Processes. Whitebook Medical Technology. 56-57.
Findling, R. Dieter, Muaaz M., Hintze D., & Mayrhofer R. (2017).  ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices. IEEE Transactions on Mobile Computing (IEEE TMC). 16, 1175. (1.37 MB)
Muaaz, M., & Mayrhofer R. (2017).  Smartphone-based Gait Recognition: From Authentication to Imitation. IEEE Transactions on Mobile Computing.
Sonntag, M., & Mayrhofer R. (2017).  Traffic Statistics of a High-Bandwidth Tor Exit Node. Proceedings of 3rd International Conference on Information Systems Security and Privacy.
Findling, R. Dieter (2017).  Unobtrusive Mutual Mobile Authentication with Biometrics and Mobile Device Motion. 185. (5.36 MB)
Hengstberger, M. (2017).  Wi-Fi Data Transmission: Android & iOS Interoperability.
Sonntag, M. (2017).  Zur Technizität von Software-Patenten, insb. Ansprüchen auf Datenstrukturen.