Publications

Export 328 results:
2014
Muaaz, M., & Mayrhofer R. (2014).  Orientation Independent Cell Phone Based Gait Authentication. Proc. {MoMM} 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 161–164.
González, J., Hölzl M., Riedl P., Bonnet P., & Mayrhofer R. (2014).  A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Information Security Conference (ISC 2014).  (643.58 KB)
Riedl, P., & Riedler L. (2014).  Prototypical implementation and demonstration of context sensing and reasoning on embedded mobile devices for estimating current context aspects.
Findling, R. Dieter, Hintze D., Muaaz M., & Mayrhofer R. (2014).  Prototypical Implementation and Demonstration of Multiple Multi-Channel Device Authentication Protocols Using Embedded Sensors on Various Off-the-shelf Mobile Phones.
Hölzl, M., & Riedl P. (2014).  Requirements for Secure Input and Output on Personal Mobile Devices and an Analysis of Advantages/Disadvantages of Different Solutions.
Findling, R. Dieter, Muaaz M., Hintze D., & Mayrhofer R. (2014).  ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia. 165-174.
[Anonymous] (2014).  Special Issue on Security and Trust in Context-Aware Applications. (Schmidtke, H. R., Sigg S., & Mayrhofer R., Ed.).Personal and Ubiquitous Computing.
[Anonymous] (2014).  Special Issue: The confluence and synergy of mobile computing and multimedia with pervasive computing and communication. (Chen, L. Luke, Mayrhofer R., & Steinbauer M., Ed.).International Journal of Pervasive Computing and Communications. 10,
Chong, M. Ki, Mayrhofer R., & Gellersen H. (2014).  A Survey of User Interaction for Spontaneous Device Association. ACM Computing Surveys. 47,
2013
Roland, M., Langer J., & Mayrhofer R. (2013).  (Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 286–292.
Hölzl, M., Neumeier R., & Ostermayer G. (2013).  Analysis of Compass Sensor Accuracy on Several Mobile Devices in an Industrial Environment. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013. 381–389. (743.7 KB)
Muaaz, M., & Mayrhofer R. (2013).  An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. 11th International Conference on Advances in Mobile Computing and Multimedia, (MoMM 2013), Vienna, Austria.
Roland, M., & Langer J. (2013).  Comparison of the Usability and Security of NFC’s Different Operating Modes in Mobile Devices. e & i Elektrotechnik und Informationstechnik. 130, 201–206.
Roland, M. (2013).  Debugging and Rapid Prototyping of NFC Secure Element Applications. Mobile Computing, Applications, and Services (MobiCASE 2013). 130/2014, LNICST, 298–313.
Sonntag, M. (2013).  Evidence Collection for Critical Infrastructure. Petr Doucek, Gerhard Gerhard Chroust, Václav Oskrdal (Eds.): IDIMT-2013. Human Values, Innovation and Economy. 23-30.
Sonntag, M. (2013).  Learning Security through Insecurity. Ariwa, E., Krawczyk-Stando, D., Guncaga, J. (Eds.): Proceedings of the Second International Conference on E-Learning and E-Technologies in Education (ICEEE2013). 143-148.
Acquisti, A., Krontiris I., Langheinrich M., & Sasse M. Angela (2013).  'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). (Acquisti, A., Krontiris I., Langheinrich M., & Sasse M. Angela, Ed.).Dagstuhl Reports. 3, 74–107.
Sonntag, M. (2013).  OGH 6 ObA 86/12y: Zum Werkbegriff "Computerprogramm".. JusIT2. 53-54.
Findling, R. Dieter, Wenny F., Holzmann C., & Mayrhofer R. (2013).  Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images. Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia. 260–269.
Hölzl, M., Mayrhofer R., & Roland M. (2013).  Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia. 249–252. (546.43 KB)
Nguyen, T. Binh (2013).  Sound Security Protocol Transformations. (Sprenger, C., Ed.).POST.
Hölzl, M. (2013).  Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices. Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
Findling, R. Dieter, & Mayrhofer R. (2013).  Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices. International Journal of Pervasive Computing and Communications. 9, 190–208.
Findling, R. Dieter, & Mayrhofer R. (2013).  Towards Secure Personal Device Unlock using Stereo Camera Pan Shots. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013.
Riedl, P. (2013).  Towards the Principal Applicability of a Zone Concept to Create a User-Friendly Secure Mobile Environment. Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).

Pages