Publications

Export 346 results:
2014
Sonntag, M. (2014).  Cheats aus rechtlicher Sicht. Transparenz. 683 - 692.
Sonntag, M. (2014).  Cloud Computing: Risks and Chances. IDIMT-2014. Networking Societies - Cooperation and Conflict. 355-364.
Hörmanseder, R., & Jäger M. (2014).  Cloud Security Problems Caused By Virtualization Technology Vulnerabilities And Their Prevention. IDIMT-2014 Networking Societies - Cooperation and Conflict.
Sonntag, M., & Schaitl J. (2014).  Das individuelle Gesetzbuch - Open Government Data aus dem RIS. Zeichen und Zauber des Rechts. Festschrift für Friedrich Lachmayer. 403 - 426.
Sonntag, M. (2014).  Die EU-Richtlinie über Angriffe auf Informationssysteme. JusIT. 8-14.
Sonntag, M. (2014).  Die Technizität von Programmlogiken im Gebrauchsmusterschutz. JusIT. 129-133.
Hintze, D., Findling R. Dieter, Muaaz M., Scholz S., & Mayrhofer R. (2014).  Diversity in Locked and Unlocked Mobile Device Usage. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014). 379-384.
Sonntag, M. (2014).  Einführung in das Internetrecht. Rechtsgrundlagen für Informatiker.
Riedl, P. (2014).  Guidelines for secure user interface handling.
Schoiber, G. (2014).  HotPatch Android Patching Framework.
Roland, M., Langer J., & Mayrhofer R. (2014).  Managing the life cycle of Java Card applets in other Java virtual machines. International Journal of Pervasive Computing and Communications. 10, 291–312.
Hölzl, M., Asnake E., Mayrhofer R., & Roland M. (2014).  Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 147-156. (554.86 KB)
Hintze, D., Findling R. Dieter, Scholz S., & Mayrhofer R. (2014).  Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 105-114.
Sonntag, M. (2014).  Multimediawerke und der Rechtsschutz technischer Schutzmaßnahmen im Urheberrecht. JusIT. 41-45.
Sonntag, M. (2014).  OGH 4 Ob 5/14k: Rechtzeitigkeit des Rücktritts bei baldigem Leistungsbeginn.. JusIT. 128-129.
Sonntag, M. (2014).  OGH 6 Ob 58/14v: Zum Auskunftsanspruch nach § 18 Abs 4 ECG bei dynamischen IP-Adressen. JusIT 4. 217-218.
Mayrhofer, R., Hlavacs H., & Findling R. Dieter (2014).  Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services. 71-78.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161-164.
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. {MoMM} 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161–164.
González, J., Hölzl M., Riedl P., Bonnet P., & Mayrhofer R. (2014).  A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Information Security Conference (ISC 2014).  (643.58 KB)
Riedl, P., & Riedler L. (2014).  Prototypical implementation and demonstration of context sensing and reasoning on embedded mobile devices for estimating current context aspects.
Findling, R. Dieter, Hintze D., Muaaz M., & Mayrhofer R. (2014).  Prototypical Implementation and Demonstration of Multiple Multi-Channel Device Authentication Protocols Using Embedded Sensors on Various Off-the-shelf Mobile Phones.
Hölzl, M., & Riedl P. (2014).  Requirements for Secure Input and Output on Personal Mobile Devices and an Analysis of Advantages/Disadvantages of Different Solutions.
Findling, R. Dieter, Muaaz M., Hintze D., & Mayrhofer R. (2014).  ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 165-174.
[Anonymous] (2014).  Special Issue on Security and Trust in Context-Aware Applications. (Schmidtke, H. R., Sigg S., & Mayrhofer R., Ed.).Personal and Ubiquitous Computing.

Pages