Export 337 results:
Mayrhofer, R., Reisner H., & Haidinger A. (2017).  Cybercrime: Darknet. Cybercrime - Darknet. 1,
Sonntag, M. (2017).  Die "Neuheit" einer Öffentlichkeit im Urheberrecht - Zugleich Anmerkung zu OGH 4 Ob 249/15v. Trends und Communities der Rechtsinformatik.
Muaaz, M. (2017).  Implicit Biometric Authentication for Smartphones. xviii, 198, 3 Pages.
Hintze, D., Hintze P., Findling R. Dieter, & Mayrhofer R. (2017).  A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 1,
Sonntag, M. (2017).  Privacy and Security - Friends or Enemies?. IDIMT-2017. Digitalization in Management, Society and Economy.
Mayrhofer, R. (2017).  Security for Medical Data and Processes. Whitebook Medical Technology. 56-57.
Findling, R. Dieter, Muaaz M., Hintze D., & Mayrhofer R. (2017).  ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices. IEEE Transactions on Mobile Computing (IEEE TMC). 16, 1175.
Muaaz, M., & Mayrhofer R. (2017).  Smartphone-based Gait Recognition: From Authentication to Imitation. IEEE Transactions on Mobile Computing.
Sonntag, M., & Mayrhofer R. (2017).  Traffic Statistics of a High-Bandwidth Tor Exit Node. Proceedings of 3rd International Conference on Information Systems Security and Privacy.
Findling, R. Dieter (2017).  Unobtrusive Mutual Mobile Authentication with Biometrics and Mobile Device Motion. 185.
Hengstberger, M. (2017).  Wi-Fi Data Transmission: Android & iOS Interoperability.
Sonntag, M. (2017).  Zur Technizität von Software-Patenten, insb. Ansprüchen auf Datenstrukturen.
Muaaz, M., & Mayrhofer R. (2016).  Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016).
Aichhorn, A., Etzlinger B., Mayrhofer R., & Springer A. (2016).  Accurate clock synchronization for power systems protection devices over packet switched networks.
Sonntag, M. (2016).  Anonymisierung: Methoden und Zulässigkeit. Netzwerke.
Praher, C., & Sonntag M. (2016).  Applicability of keystroke dynamics as a biometric security feature for mobile touchscreen devices with virtualised keyboards. International Journal of Information and Computer Security. 08, 72-91.
Sonntag, M. (2016).  Cyber Security. IDIMT-2016. Information Technology, Society and Economy.
Schoiber, G., Mayrhofer R., & Hölzl M. (2016).  DAMN - A Debugging and Manipulation Tool for Android Applications. MoMM'16,November 28 - 30, 2016, Singapore, Singapore.
Baader, F., Nguyen T. Binh, Borgwardt S., & Morawska B. (2016).  Deciding Unifiability and Computing Local Unifiers in the Description Logic EL without Top Constructor.  (466.29 KB)
Sonntag, M. (2016).  Entscheidungsbesprechung OGH 4 Ob 142/15h: Zur Schutzfähigkeit von Schriftarten.
Aichhorn, A., Krammer H., Mayrhofer R., & Kern T. (2016).  IP-based communications for Line current Differential Protection. PAC World Magazine (Protection Automation & Control).
Hintze, D., Scholz S., Koch E., & Mayrhofer R. (2016).  Location-based Risk Assessment for Mobile Authentication. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct.
Findling, R. Dieter, Hölzl M., & Mayrhofer R. (2016).  Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016).
Roland, M., & Hölzl M. (2016).  Open Mobile API: Accessing the UICC on Android Devices. Technical Report. 76. (1.04 MB)
Hintze, D., & Rice A. (2016).  Picky: Efficient and Reproducible Sharing of Large Datasets using Merkle-Trees. Proceedings of the IEEE 24rd International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2016).