Export 323 results:
Anonymisierung: Methoden und Zulässigkeit. Netzwerke.(2016).
Applicability of keystroke dynamics as a biometric security feature for mobile touchscreen devices with virtualised keyboards. International Journal of Information and Computer Security. 08, 72-91.(2016).
Cyber Security. IDIMT-2016. Information Technology, Society and Economy.(2016).
DAMN - A Debugging and Manipulation Tool for Android Applications. MoMM'16,November 28 - 30, 2016, Singapore, Singapore.(2016).
Deciding Unifiability and Computing Local Unifiers in the Description Logic EL without Top Constructor.(2016).
IP-based communications for Line current Differential Protection. PAC World Magazine (Protection Automation & Control).(2016).
Location-based Risk Assessment for Mobile Authentication. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct.(2016).
Open Mobile API: Accessing the UICC on Android Devices. Technical Report. 76.(2016).
Picky: Efficient and Reproducible Sharing of Large Datasets using Merkle-Trees. Proceedings of the IEEE 24rd International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2016).(2016).
Realization of Line Current Differential Protection over IP-based Networks using IEEE 1588 for Synchronous Sampling. 13th International Conference on Development in Power System Protection 2016 (DPSP).(2016).
Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification. MoMM’16, November 28 - 30, 2016, Singapore, Singapore.(2016).
Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. MoMM '15: Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia.(2015).
Cormorant: Towards Continuous Risk-aware Multi-modal Cross-device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. 169–172.(2015).
Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor. Fifteenth International Conference on Computer Aided Systems Theory.(2015).
Evaluation of Contactless Smartcard Antennas. Computing Research Repository (CoRR). abs/1507.06427, 29.(2015).
Key Code Recognition: Case Study of Automatically Deriving the Code of a Physical Key from Mobile Device Camera Images for the EVVA A key profile.(2015).
Localization in an Industrial Environment: A Case Study on the Difficulties for Positioning in a Harsh Environment. International Journal of Distributed Sensor Networks. 2015,(2015).
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Personal and Ubiquitous Computing. 19, 954.(2015).
A Password-authenticated Secure Channel for App to Java Card Applet Communication. International Journal of Pervasive Computing and Communications (IJPCC). 11, 374-397.(2015).
Security Issues in Mobile NFC Devices. T-Labs Series in Telecommunication Services. 185.(2015).