Publications

Export 104 results:
Filters: Author is Mayrhofer, René  [Clear All Filters]
2012
Findling, R. Dieter, & Mayrhofer R. (2012).  Towards Face Unlock: On the Difficulty of Reliably Detecting Faces on Mobile Phones. Proc. MoMM 2012: 10th International Conference on Advances in Mobile Computing and Multimedia. 275–280.
Mayrhofer, R., & Kaiser T. (2012).  Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets. Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2012.
Tschernuth, M., Lettner M., & Mayrhofer R. (2012).  Unify localization using user interface description languages and a navigation context-aware translation tool. Proc. {EICS 2012}: 4th ACM SIGCHI symposium on Engineering interactive computing systems. 179–188.
2011
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice. Proc. {MODELS 2011}: ACM/IEEE 14th International Conference on Model Driven Engineering Languages and Systems.
Mayrhofer, R., & Holzmann C. (2011).  \emphFriends Radar: Towards a Private P2P Location Sharing Platform. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 528–536.
Tschernuth, M., Lettner M., & Mayrhofer R. (2011).  Evaluation of Descriptive User Interface Methodologies for Mobile Devices. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 520–527.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components. Proc. {MoMM} 2011: 9th International Conference on Advances in Mobile Computing and Multimedia. 268–272.
Höbarth, S., & Mayrhofer R. (2011).  A framework for on-device privilege escalation exploit execution on Android. Proc. {IWSSI/SPMU 2011}: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with {Pervasive 2011}.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Mobile Platform Architecture Review: Android, iPhone, Qt. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 545–552.
Klingelhuber, P., & Mayrhofer R. (2011).  Private Notes: Encrypted XML Notes Synchronization and Sharing with Untrusted Web Services. Proc. {iiWAS2011}: 13th International Conference on Information Integration and Web-based Applications & Services.
2010
Mayrhofer, R., Sommer A., & Saral S. (2010).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. Proc. {iiWAS2010}: 12th International Conference on Information Integration and Web-based Applications & Services. 181–189.
Mayrhofer, R., & Ion I. (2010).  OpenUAT: The Open Source Ubiquitous Authentication Toolkit.
Kumar, V., Fensel A., Tomic S., Mayrhofer R., & Pellegrini T. (2010).  User Created Machine-readable Policies for Energy Efficiency in Smart Homes. Proc. {UCSE} 2010, co-located with Ubicomp 2010.
2009
Mayrhofer, R., & Gellersen H. (2009).  Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Transactions on Mobile Computing. 8, 792–806.
[Anonymous] (2009).  Special Issue: Secure Spontaneous Interaction. (Mayrhofer, R., Nyberg K., & Kindberg T., Ed.).International Journal on Security and Networks.
Mayrhofer, R., Winkler S., Hlavacs H., Affenzeller M., & Schneider S. (2009).  On Structural Identification of 2D Regression Functions for In-door Bluetooth Localization. Proc. {EUROCAST} 2009. 5717, 801–808.
2007
Mayrhofer, R. (2007).  The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams. Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks. 4572, 1–15.
Mayrhofer, R. (2007).  Extending the Growing Neural Gas Classifier for Context Recognition. Proc. {EUROCAST} 2007: 11th International Conference on Computer Aided Systems Theory. 4739, 920–927.
Mayrhofer, R., & Welch M. (2007).  A Human-Verifiable Authentication Protocol Using Visible Laser Light. Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security. 1143–1147.
[Anonymous] (2007).  Proc. IWSSI 2007: First International Workshop on Security for Spontaneous Interaction (part of Adjunct Proc. Ubicomp 2007). (Mayrhofer, R., & Nyberg K., Ed.).

Pages