Publications

Export 324 results:
2013
Roland, M., Langer J., & Mayrhofer R. (2013).  (Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 286–292.
Hölzl, M., Neumeier R., & Ostermayer G. (2013).  Analysis of Compass Sensor Accuracy on Several Mobile Devices in an Industrial Environment. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013. 381–389. (743.7 KB)
Muaaz, M., & Mayrhofer R. (2013).  An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. 11th International Conference on Advances in Mobile Computing and Multimedia, (MoMM 2013), Vienna, Austria.
Roland, M., & Langer J. (2013).  Comparison of the Usability and Security of NFC’s Different Operating Modes in Mobile Devices. e & i Elektrotechnik und Informationstechnik. 130, 201–206.
Roland, M. (2013).  Debugging and Rapid Prototyping of NFC Secure Element Applications. Mobile Computing, Applications, and Services (MobiCASE 2013). 130/2014, LNICST, 298–313.
Sonntag, M. (2013).  Evidence Collection for Critical Infrastructure. Petr Doucek, Gerhard Gerhard Chroust, Václav Oskrdal (Eds.): IDIMT-2013. Human Values, Innovation and Economy. 23-30.
Sonntag, M. (2013).  Learning Security through Insecurity. Ariwa, E., Krawczyk-Stando, D., Guncaga, J. (Eds.): Proceedings of the Second International Conference on E-Learning and E-Technologies in Education (ICEEE2013). 143-148.
Acquisti, A., Krontiris I., Langheinrich M., & Sasse M. Angela (2013).  'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). (Acquisti, A., Krontiris I., Langheinrich M., & Sasse M. Angela, Ed.).Dagstuhl Reports. 3, 74–107.
Sonntag, M. (2013).  OGH 6 ObA 86/12y: Zum Werkbegriff "Computerprogramm".. JusIT2. 53-54.
Findling, R. Dieter, Wenny F., Holzmann C., & Mayrhofer R. (2013).  Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images. Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia. 260–269.
Hölzl, M., Mayrhofer R., & Roland M. (2013).  Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia. 249–252. (546.43 KB)
Nguyen, T. Binh (2013).  Sound Security Protocol Transformations. (Sprenger, C., Ed.).POST.
Hölzl, M. (2013).  Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices. Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
Findling, R. Dieter, & Mayrhofer R. (2013).  Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices. International Journal of Pervasive Computing and Communications. 9, 190–208.
Findling, R. Dieter, & Mayrhofer R. (2013).  Towards Secure Personal Device Unlock using Stereo Camera Pan Shots. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013.
Riedl, P. (2013).  Towards the Principal Applicability of a Zone Concept to Create a User-Friendly Secure Mobile Environment. Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).
Muaaz, M. (2013).  A Transparent and Continuous Biometric Authentication Framework for User-Friendly Secure Mobile Environments. in Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).
Mayrhofer, R., Fuss J., & Ion I. (2013).  UACAP: A Unified Auxiliary Channel Authentication Protocol. IEEE Transactions on Mobile Computing. 12, 710–721.
Riedl, P., Koller P., Mayrhofer R., Möller A., Koelle M., & Kranz M. (2013).  Visualizations and Switching Mechanisms for Security Zones. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 278–281.
Sonntag, M. (2013).  Was ist ein "Computerprogramm" im Urheberrecht?. Erich Schweighofer, Franz Kummer, Walter Hötzendorfer (Eds.): Abstraktion und Applikation. 569-576.

Pages