Publications

Export 98 results:
Filters: Author is René Mayrhofer  [Clear All Filters]
2011
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components. Proc. {MoMM} 2011: 9th International Conference on Advances in Mobile Computing and Multimedia. 268–272.
Höbarth, S., & Mayrhofer R. (2011).  A framework for on-device privilege escalation exploit execution on Android. Proc. {IWSSI/SPMU 2011}: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with {Pervasive 2011}.
Lettner, M., Tschernuth M., & Mayrhofer R. (2011).  Mobile Platform Architecture Review: Android, iPhone, Qt. Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 545–552.
Klingelhuber, P., & Mayrhofer R. (2011).  Private Notes: Encrypted XML Notes Synchronization and Sharing with Untrusted Web Services. Proc. {iiWAS2011}: 13th International Conference on Information Integration and Web-based Applications & Services.
2010
Mayrhofer, R., Sommer A., & Saral S. (2010).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. Proc. {iiWAS2010}: 12th International Conference on Information Integration and Web-based Applications & Services. 181–189.
Mayrhofer, R., & Ion I. (2010).  OpenUAT: The Open Source Ubiquitous Authentication Toolkit.
Kumar, V., Fensel A., Tomic S., Mayrhofer R., & Pellegrini T. (2010).  User Created Machine-readable Policies for Energy Efficiency in Smart Homes. Proc. {UCSE} 2010, co-located with Ubicomp 2010.
2009
Mayrhofer, R., & Gellersen H. (2009).  Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Transactions on Mobile Computing. 8, 792–806.
[Anonymous] (2009).  Special Issue: Secure Spontaneous Interaction. (Mayrhofer, R., Nyberg K., & Kindberg T., Ed.).International Journal on Security and Networks.
Mayrhofer, R., Winkler S., Hlavacs H., Affenzeller M., & Schneider S. (2009).  On Structural Identification of 2D Regression Functions for In-door Bluetooth Localization. Proc. {EUROCAST} 2009. 5717, 801–808.
2007
Mayrhofer, R. (2007).  The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams. Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks. 4572, 1–15.
Mayrhofer, R. (2007).  Extending the Growing Neural Gas Classifier for Context Recognition. Proc. {EUROCAST} 2007: 11th International Conference on Computer Aided Systems Theory. 4739, 920–927.
Mayrhofer, R., & Welch M. (2007).  A Human-Verifiable Authentication Protocol Using Visible Laser Light. Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security. 1143–1147.
[Anonymous] (2007).  Proc. IWSSI 2007: First International Workshop on Security for Spontaneous Interaction (part of Adjunct Proc. Ubicomp 2007). (Mayrhofer, R., & Nyberg K., Ed.).
Mayrhofer, R., Gellersen H., & Hazas M. (2007).  Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. Proc. {Ubicomp 2007}: 9th International Conference on Ubiquitous Computing. 4717, 199–216.
Mayrhofer, R., & Gellersen H. (2007).  On the Security of Ultrasound as Out-of-band Channel. Proc. {IPDPS 2007}: 21st {IEEE} International Parallel and Distributed Processing Symposium. 321.
Mayrhofer, R., & Gellersen H. (2007).  Shake well before use: Authentication based on Accelerometer Data. Proc. {Pervasive 2007}: 5th International Conference on Pervasive Computing. 4480, 144–161.
Mayrhofer, R., & Gellersen H. (2007).  Shake well before use: two implementations for implicit context authentication. Adjunct Proc. {Ubicomp 2007}. 72–75.
Mayrhofer, R. (2007).  Towards an Open Source Toolkit for Ubiquitous Device Authentication. Workshops Proc. {PerCom 2007}: 5th {IEEE} International Conference on Pervasive Computing and Communications. 247–252.
Mayrhofer, R., & Gostner R. (2007).  Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. Journal of Mobile Multimedia. 3, 198–217.

Pages