Publications

Export 324 results:
2015
Roland, M. (2015).  Security Issues in Mobile NFC Devices. T-Labs Series in Telecommunication Services. 185.
Findling, R. Dieter, & Mayrhofer R. (2015).  Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns. 14th International Conference on Mobile and Ubiquitous Multimedia (MUM’15).
Hintze, D. (2015).  Towards Transparent Multi-Device-Authentication. Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers.
2014
Mayrhofer, R. (2014).  An Architecture for Secure Mobile Devices. Security and Communication Networks.
Sonntag, M. (2014).  Cheats aus rechtlicher Sicht. Transparenz. 683 - 692.
Sonntag, M. (2014).  Cloud Computing: Risks and Chances. IDIMT-2014. Networking Societies - Cooperation and Conflict. 355-364.
Sonntag, M., & Schaitl J. (2014).  Das individuelle Gesetzbuch - Open Government Data aus dem RIS. Zeichen und Zauber des Rechts. Festschrift für Friedrich Lachmayer. 403 - 426.
Sonntag, M. (2014).  Die EU-Richtlinie über Angriffe auf Informationssysteme. JusIT. 8-14.
Sonntag, M. (2014).  Die Technizität von Programmlogiken im Gebrauchsmusterschutz. JusIT. 129-133.
Hintze, D., Findling R. Dieter, Muaaz M., Scholz S., & Mayrhofer R. (2014).  Diversity in Locked and Unlocked Mobile Device Usage. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014). 379-384.
Sonntag, M. (2014).  Einführung in das Internetrecht. Rechtsgrundlagen für Informatiker.
Riedl, P. (2014).  Guidelines for secure user interface handling.
Schoiber, G. (2014).  HotPatch Android Patching Framework.
Roland, M., Langer J., & Mayrhofer R. (2014).  Managing the life cycle of Java Card applets in other Java virtual machines. International Journal of Pervasive Computing and Communications. 10, 291–312.
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2014).  Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 147-156. (554.86 KB)
Hintze, D., Findling R. Dieter, Scholz S., & Mayrhofer R. (2014).  Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 105-114.
Sonntag, M. (2014).  Multimediawerke und der Rechtsschutz technischer Schutzmaßnahmen im Urheberrecht. JusIT. 41-45.
Sonntag, M. (2014).  OGH 4 Ob 5/14k: Rechtzeitigkeit des Rücktritts bei baldigem Leistungsbeginn.. JusIT. 128-129.
Sonntag, M. (2014).  OGH 6 Ob 58/14v: Zum Auskunftsanspruch nach § 18 Abs 4 ECG bei dynamischen IP-Adressen. JusIT 4. 217-218.
Mayrhofer, R., Hlavacs H., & Findling R. Dieter (2014).  Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services. 71-78.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161-164.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. {MoMM} 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161–164.
González, J., Hölzl M., Riedl P., Bonnet P., & Mayrhofer R. (2014).  A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Information Security Conference (ISC 2014).  (643.58 KB)
Riedl, P., & Riedler L. (2014).  Prototypical implementation and demonstration of context sensing and reasoning on embedded mobile devices for estimating current context aspects.
Findling, R. Dieter, Hintze D., Muaaz M., & Mayrhofer R. (2014).  Prototypical Implementation and Demonstration of Multiple Multi-Channel Device Authentication Protocols Using Embedded Sensors on Various Off-the-shelf Mobile Phones.

Pages