Publications
Export 360 results:
(2020).
Der Beweiswert von mittels Remote Forensic Software gesammelten Daten.
Verantwortungsbewusste Digitalisierung.
(2020). Dynamic Taint Tracking Simulation.
(Obaidat, M. S., Ed.).Communications in Computer and Information Science. 1247, 223-227.
(1.8 MB)
(2020). 
Identity and Privacy.
IDIMT-2020 Digitalized Economy, Society and Information Management.
(2020). Informationstechnologie: Grundlagen.
IT-Recht. 1-46.
(2020). Kriterien zur Beurteilung der Beweiskraft von Daten.
International Trends in Legal Informatics - Festschrift für Erich Schweighofer.
(2020). Secure Accelerometer-based Pairing of Mobile Devices in Multi-modal Transport.
(Xplore, IEEE., Ed.).IEEE Access. 8, 9246-9259.
(2020). Das Netz- und Informationssystemsicherheitsgesetz.
JusIT 2. 43-49.
(2019). Der Nachweis von Urheberrechtsverletzungen in Computerprogrammen.
IRIS 2019 - Internet of Things. 607-622.
(2019). Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation.
International Journal of Information Security.
(2019). KinPhy: A Kinetic In-Band Channel for Millimetre-Wave.
(Library, ACM. Digital, Ed.).SenSys '19 Proceedings of the 17th Conference on Embedded Networked Sensor Systems.
(2019). Malicious DNS Traffic in Tor: Analysis and Countermeasures.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy.
(2019).
(2019). Abstractions for security protocol verification.
(537.62 KB)
(2018).
(2018). 
Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics.
{IEEE} Transactions on Mobile Computing ({TMC}). 14(11), 2578–2590.
(1.48 MB)
(2018). 
Sulong, and Thanks For All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems.
(2018). Cybercrime: Darknet.
Cybercrime - Darknet. 1,
(2017). Die "Neuheit" einer Öffentlichkeit im Urheberrecht - Zugleich Anmerkung zu OGH 4 Ob 249/15v.
Trends und Communities der Rechtsinformatik.
(2017). An Extensible and Privacy-preserving Mobile eID System for Real-world Identification and Offline Verification.
The Smart World Revolution - 12th International IFIP Summer School on Privacy and Identity Management (Pre-proceedings).
(2017). Implicit Biometric Authentication for Smartphones.
xviii, 198, 3 Pages.
(2017). A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 1,
(1.34 MB)
(2017). 
Privacy and Security - Friends or Enemies?.
IDIMT-2017. Digitalization in Management, Society and Economy.
(2017). Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags.
Information. 8,
(2017). Real-world Identification for an Extensible and Privacy-preserving Mobile eID.
Privacy and Identity Management. The Smart World Revolution - 12th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School.
(2017).