Publications
Export 98 results:
Filters: Author is René Mayrhofer [Clear All Filters]
Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components.
Proc. {MoMM} 2011: 9th International Conference on Advances in Mobile Computing and Multimedia. 268–272.
(2011). A framework for on-device privilege escalation exploit execution on Android.
Proc. {IWSSI/SPMU 2011}: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with {Pervasive 2011}.
(2011). Mobile Platform Architecture Review: Android, iPhone, Qt.
Proc. {EUROCAST 2011}: 13th International Conference on Computer Aided Systems Theory, Part II. 6928, 545–552.
(2011). Private Notes: Encrypted XML Notes Synchronization and Sharing with Untrusted Web Services.
Proc. {iiWAS2011}: 13th International Conference on Information Integration and Web-based Applications & Services.
(2011). Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging.
Proc. {iiWAS2010}: 12th International Conference on Information Integration and Web-based Applications & Services. 181–189.
(2010).
(2010). User Created Machine-readable Policies for Energy Efficiency in Smart Homes.
Proc. {UCSE} 2010, co-located with Ubicomp 2010.
(2010). Shake well before use: Intuitive and Secure Pairing of Mobile Devices.
IEEE Transactions on Mobile Computing. 8, 792–806.
(2009). Special Issue: Secure Spontaneous Interaction.
(Mayrhofer, R., Nyberg K., & Kindberg T., Ed.).International Journal on Security and Networks.
(2009). On Structural Identification of 2D Regression Functions for In-door Bluetooth Localization.
Proc. {EUROCAST} 2009. 5717, 801–808.
(2009). Building Flexible Manufacturing Systems Based on Peer-Its.
{EURASIP} Journal on Embedded Systems. 2008,
(2008). Peer-it: Stick-on solutions for networks of things.
Pervasive and Mobile Computing. 448-479.
(2008). Spontaneous Mobile Device Authentication based on Sensor Data.
Information Security Technical Report. 13, 136–150.
(2008). Towards Alternative User Interfaces for Capturing and Managing Tasks with Mobile Devices.
Proc. {MoMM} 2008: 6th International Conference on Advances in Mobile Computing and Multimedia. 272–275.
(2008).
(2008). The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams.
Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks. 4572, 1–15.
(2007). Extending the Growing Neural Gas Classifier for Context Recognition.
Proc. {EUROCAST} 2007: 11th International Conference on Computer Aided Systems Theory. 4739, 920–927.
(2007). A Human-Verifiable Authentication Protocol Using Visible Laser Light.
Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security. 1143–1147.
(2007). Proc. IWSSI 2007: First International Workshop on Security for Spontaneous Interaction (part of Adjunct Proc. Ubicomp 2007).
(Mayrhofer, R., & Nyberg K., Ed.).
(2007). Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction.
Proc. {Ubicomp 2007}: 9th International Conference on Ubiquitous Computing. 4717, 199–216.
(2007). On the Security of Ultrasound as Out-of-band Channel.
Proc. {IPDPS 2007}: 21st {IEEE} International Parallel and Distributed Processing Symposium. 321.
(2007). Shake well before use: Authentication based on Accelerometer Data.
Proc. {Pervasive 2007}: 5th International Conference on Pervasive Computing. 4480, 144–161.
(2007). Shake well before use: two implementations for implicit context authentication.
Adjunct Proc. {Ubicomp 2007}. 72–75.
(2007). Towards an Open Source Toolkit for Ubiquitous Device Authentication.
Workshops Proc. {PerCom 2007}: 5th {IEEE} International Conference on Pervasive Computing and Communications. 247–252.
(2007). Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections.
Journal of Mobile Multimedia. 3, 198–217.
(2007).