Publications

Export 328 results:
2017
Mayrhofer, R., Reisner H., & Haidinger A. (2017).  Cybercrime: Darknet. Cybercrime - Darknet. 1,
Sonntag, M. (2017).  Die "Neuheit" einer Öffentlichkeit im Urheberrecht - Zugleich Anmerkung zu OGH 4 Ob 249/15v. Trends und Communities der Rechtsinformatik.
Mayrhofer, R. (2017).  Security for Medical Data and Processes. Whitebook Medical Technology. 56-57.
Sonntag, M., & Mayrhofer R. (2017).  Traffic Statistics of a High-Bandwidth Tor Exit Node. Proceedings of 3rd International Conference on Information Systems Security and Privacy.
2016
Aichhorn, A., Etzlinger B., Mayrhofer R., & Springer A. (2016).  Accurate clock synchronization for power systems protection devices over packet switched networks.
Sonntag, M. (2016).  Anonymisierung: Methoden und Zulässigkeit. Netzwerke.
Praher, C., & Sonntag M. (2016).  Applicability of keystroke dynamics as a biometric security feature for mobile touchscreen devices with virtualised keyboards. International Journal of Information and Computer Security. 08, 72-91.
Sonntag, M. (2016).  Cyber Security. IDIMT-2016. Information Technology, Society and Economy.
Schoiber, G., Mayrhofer R., & Hölzl M. (2016).  DAMN - A Debugging and Manipulation Tool for Android Applications. MoMM'16,November 28 - 30, 2016, Singapore, Singapore.
Baader, F., Nguyen T. Binh, Borgwardt S., & Morawska B. (2016).  Deciding Unifiability and Computing Local Unifiers in the Description Logic EL without Top Constructor.  (466.29 KB)
Sonntag, M. (2016).  Entscheidungsbesprechung OGH 4 Ob 142/15h: Zur Schutzfähigkeit von Schriftarten.
Aichhorn, A., Krammer H., Mayrhofer R., & Kern T. (2016).  IP-based communications for Line current Differential Protection. PAC World Magazine (Protection Automation & Control).
Hintze, D., Scholz S., Koch E., & Mayrhofer R. (2016).  Location-based Risk Assessment for Mobile Authentication. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct.
Findling, R. Dieter, Hölzl M., & Mayrhofer R. (2016).  Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016).
Roland, M., & Hölzl M. (2016).  Open Mobile API: Accessing the UICC on Android Devices. Technical Report. 76. (1.04 MB)
Hintze, D., & Rice A. (2016).  Picky: Efficient and Reproducible Sharing of Large Datasets using Merkle-Trees. Proceedings of the IEEE 24rd International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2016).
Aichhorn, A., Mayrhofer R., Krammer H., & Kern T. (2016).  Realization of Line Current Differential Protection over IP-based Networks using IEEE 1588 for Synchronous Sampling. 13th International Conference on Development in Power System Protection 2016 (DPSP).
Hölzl, M., Roland M., & Mayrhofer R. (2016).  Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification. MoMM’16, November 28 - 30, 2016, Singapore, Singapore.
Sonntag, M. (2016).  Third Person Data.
2015
Nguyen, T. Binh (2015).  Abstractions for Security Protocol Verification. (Sprenger, C., Ed.).POST.
Hörmanseder, R. (2015).  Computernetzwerke - Grundlagen. 2,
Hintze, D., Muaaz M., Findling R. D., Scholz S., Koch E., & Mayrhofer R. (2015).  Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. MoMM '15: Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia.
Hintze, D., Findling R. Dieter, Muaaz M., Koch E., & Mayrhofer R. (2015).  Cormorant: Towards Continuous Risk-aware Multi-modal Cross-device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. 169–172.
Muaaz, M., & Mayrhofer R. (2015).  Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor. Fifteenth International Conference on Computer Aided Systems Theory.
Roland, M., & Hölzl M. (2015).  Evaluation of Contactless Smartcard Antennas. Computing Research Repository (CoRR). abs/1507.06427, 29. (4.6 MB)

Pages