Publications

Export 360 results:
2020
Mayrhofer, R., Mohan V., & Sigg S. (2020).  Adversary Models for Mobile Device Authentication. arXiv.
Sonntag, M. (2020).  Der Beweiswert von mittels Remote Forensic Software gesammelten Daten. Verantwortungsbewusste Digitalisierung.
Berner, F., Mayrhofer R., & Sametinger J. (2020).  Dynamic Taint Tracking Simulation. (Obaidat, M. S., Ed.).Communications in Computer and Information Science. 1247, 223-227. (1.8 MB)
Sonntag, M. (2020).  Identity and Privacy. IDIMT-2020 Digitalized Economy, Society and Information Management.
Sonntag, M. (2020).  Informationstechnologie: Grundlagen. IT-Recht. 1-46.
Sonntag, M. (2020).  Kriterien zur Beurteilung der Beweiskraft von Daten. International Trends in Legal Informatics - Festschrift für Erich Schweighofer.
Groza, B., Berdich A., Jichici C., & Mayrhofer R. (2020).  Secure Accelerometer-based Pairing of Mobile Devices in Multi-modal Transport. (Xplore, IEEE., Ed.).IEEE Access. 8, 9246-9259.
2019
Sonntag, M. (2019).  Das Netz- und Informationssystemsicherheitsgesetz. JusIT 2. 43-49.
Sonntag, M. (2019).  Der Nachweis von Urheberrechtsverletzungen in Computerprogrammen. IRIS 2019 - Internet of Things. 607-622.
Hölzl, M., Roland M., Mir O., & Mayrhofer R. (2019).  Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. International Journal of Information Security.
Alloulah, M., Radivojevic Z., Mayrhofer R., & Huang H. (2019).  KinPhy: A Kinetic In-Band Channel for Millimetre-Wave. (Library, ACM. Digital, Ed.).SenSys '19 Proceedings of the 17th Conference on Embedded Networked Sensor Systems.
Sonntag, M. (2019).  Malicious DNS Traffic in Tor: Analysis and Countermeasures. ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy.
Sonntag, M. (2019).  Missbräuchliche Nutzung des Tor-Netzwerks.
2017
Mayrhofer, R., Reisner H., & Haidinger A. (2017).  Cybercrime: Darknet. Cybercrime - Darknet. 1,
Sonntag, M. (2017).  Die "Neuheit" einer Öffentlichkeit im Urheberrecht - Zugleich Anmerkung zu OGH 4 Ob 249/15v. Trends und Communities der Rechtsinformatik.
Hölzl, M., Roland M., & Mayrhofer R. (2017).  An Extensible and Privacy-preserving Mobile eID System for Real-world Identification and Offline Verification. The Smart World Revolution - 12th International IFIP Summer School on Privacy and Identity Management (Pre-proceedings).
Muaaz, M. (2017).  Implicit Biometric Authentication for Smartphones. xviii, 198, 3 Pages.
Hintze, D., Hintze P., Findling R. Dieter, & Mayrhofer R. (2017).  A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 1,  (1.34 MB)
Sonntag, M. (2017).  Privacy and Security - Friends or Enemies?. IDIMT-2017. Digitalization in Management, Society and Economy.
Ota, F. Kaway Carv, Roland M., Hölzl M., Mayrhofer R., & Manacero A. (2017).  Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags. Information. 8,
Hölzl, M., Roland M., & Mayrhofer R. (2017).  Real-world Identification for an Extensible and Privacy-preserving Mobile eID. Privacy and Identity Management. The Smart World Revolution - 12th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School.

Pages