Publications

Export 328 results:
2015
Findling, R. Dieter (2015).  Key Code Recognition: Case Study of Automatically Deriving the Code of a Physical Key from Mobile Device Camera Images for the EVVA A key profile.
Hölzl, M., Neumeier R., & Ostermayer G. (2015).  Localization in an Industrial Environment: A Case Study on the Difficulties for Positioning in a Harsh Environment. International Journal of Distributed Sensor Networks. 2015,  (2.97 MB)
Riedl, P., Mayrhofer R., Möller A., Kranz M., Lettner F., Holzmann C., et al. (2015).  Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Personal and Ubiquitous Computing. 19, 954.
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2015).  A Password-authenticated Secure Channel for App to Java Card Applet Communication. International Journal of Pervasive Computing and Communications (IJPCC). 11, 374-397. (618.42 KB)
Roland, M. (2015).  Security Issues in Mobile NFC Devices. T-Labs Series in Telecommunication Services. 185.
Findling, R. Dieter, & Mayrhofer R. (2015).  Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns. 14th International Conference on Mobile and Ubiquitous Multimedia (MUM’15).
Hintze, D. (2015).  Towards Transparent Multi-Device-Authentication. Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers.
2014
Mayrhofer, R. (2014).  An Architecture for Secure Mobile Devices. Security and Communication Networks.
Sonntag, M. (2014).  Cheats aus rechtlicher Sicht. Transparenz. 683 - 692.
Sonntag, M. (2014).  Cloud Computing: Risks and Chances. IDIMT-2014. Networking Societies - Cooperation and Conflict. 355-364.
Sonntag, M., & Schaitl J. (2014).  Das individuelle Gesetzbuch - Open Government Data aus dem RIS. Zeichen und Zauber des Rechts. Festschrift für Friedrich Lachmayer. 403 - 426.
Sonntag, M. (2014).  Die EU-Richtlinie über Angriffe auf Informationssysteme. JusIT. 8-14.
Sonntag, M. (2014).  Die Technizität von Programmlogiken im Gebrauchsmusterschutz. JusIT. 129-133.
Hintze, D., Findling R. Dieter, Muaaz M., Scholz S., & Mayrhofer R. (2014).  Diversity in Locked and Unlocked Mobile Device Usage. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014). 379-384.
Sonntag, M. (2014).  Einführung in das Internetrecht. Rechtsgrundlagen für Informatiker.
Riedl, P. (2014).  Guidelines for secure user interface handling.
Schoiber, G. (2014).  HotPatch Android Patching Framework.
Roland, M., Langer J., & Mayrhofer R. (2014).  Managing the life cycle of Java Card applets in other Java virtual machines. International Journal of Pervasive Computing and Communications. 10, 291–312.
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2014).  Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 147-156. (554.86 KB)
Hintze, D., Findling R. Dieter, Scholz S., & Mayrhofer R. (2014).  Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 105-114.
Sonntag, M. (2014).  Multimediawerke und der Rechtsschutz technischer Schutzmaßnahmen im Urheberrecht. JusIT. 41-45.
Sonntag, M. (2014).  OGH 4 Ob 5/14k: Rechtzeitigkeit des Rücktritts bei baldigem Leistungsbeginn.. JusIT. 128-129.
Sonntag, M. (2014).  OGH 6 Ob 58/14v: Zum Auskunftsanspruch nach § 18 Abs 4 ECG bei dynamischen IP-Adressen. JusIT 4. 217-218.
Mayrhofer, R., Hlavacs H., & Findling R. Dieter (2014).  Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services. 71-78.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161-164.

Pages