Publications
Export 8 results:
Filters: Author is Peter Riedl [Clear All Filters]
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices.
Personal and Ubiquitous Computing. 19, 954.
(2015).
(2014).
A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices.
Information Security Conference (ISC 2014).
(643.58 KB)
(2014).
(2014).
(2014). 
Towards the Principal Applicability of a Zone Concept to Create a User-Friendly Secure Mobile Environment.
Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).
(2013). Visualizations and Switching Mechanisms for Security Zones.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 278–281.
(2013). Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting.
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 98-101.
(2012).