Publications

Export 328 results:
2013
Muaaz, M. (2013).  A Transparent and Continuous Biometric Authentication Framework for User-Friendly Secure Mobile Environments. in Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013).
Mayrhofer, R., Fuss J., & Ion I. (2013).  UACAP: A Unified Auxiliary Channel Authentication Protocol. IEEE Transactions on Mobile Computing. 12, 710–721.
Riedl, P., Koller P., Mayrhofer R., Möller A., Koelle M., & Kranz M. (2013).  Visualizations and Switching Mechanisms for Security Zones. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013). 278–281.
Sonntag, M. (2013).  Was ist ein "Computerprogramm" im Urheberrecht?. Erich Schweighofer, Franz Kummer, Walter Hötzendorfer (Eds.): Abstraktion und Applikation. 569-576.
Mayrhofer, R. (2013).  When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices. Proceedings of the 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. 1579–1584.
Praher, C. (2013).  Working Sets for the Principle of Least Privilege in Role Based Access Control (RBAC) and Desktop Operating Systems.
2012
König, F., & Paramythis A. (2012).  Adaptive Collaboration Scripting with IMS LD. Daradoumis, T., Demetriadis, S. N., Xhafa, F. (eds.) Intelligent Adaptation and Personalization Techniques in Computer-Supported Collaborative Learning.
Mayrhofer, R., Sommer A., & Saral S. (2012).  Air-Writing: A Platform for Scalable, Privacy-Preserving, Spatial Group Messaging. International Journal of Pervasive Computing and Communications ({IJPCC}). 8, 53–78.
Nguyen, T. Binh (2012).  Attack-preserving security protocol transformations.. (Sprenger, C., Ed.).ESSoS-DS.
Nguyen, B. Thanh, Sprenger C., & Basin D. (2012).  Attack-preserving security protocol transformations. ESSoS-DS.  (85.45 KB)
Sonntag, M. (2012).  Automating Web History Analysis. Petr Doucek, Gerhard Gerhard Chroust, Václav Oskrdal (Eds.): IDIMT-2012. ICT Support for Complex Systems.
Sonntag, M. (2012).  Der Nachweis von Inhalten im Internet. Erich Schweighofer, Franz Kummer, Walter Hötzendorfer (Eds.): Transformation juristischer Sprachen.
Sonntag, M. (2012).  Die Spuren der Nutzung von Web-Browsern. Michael Sonntag, Rudolf Hörmanseder (Hrsg.) - Informatik: Von Anfang an. Festschrift für Jörg R. Mühlbacher.
Pabel, K., & Sonntag M. (2012).  E-Voting bei ÖH-Wahl gesetzwidrig. ZTR - Zeitschrift für Energie- und Technikrecht. 175-184.
Muaaz, M., & Nickel C. (2012).  Influence of different walking speeds and surfaces on accelerometer-based biometric gait recognition. in Proceedings of 35th International Conference on Telecommunications and Signal Processing (TSP), 508-512.
Sonntag, M., & Hörmanseder R. (2012).  Informatik: Von Anfang an. Festschrift für Jörg R. Mühlbacher.
Sonntag, M. (2012).  Informationstechnologie: Grundlagen. Dietmar Jahnel, Peter Mader, Elisabeth Staudegger (Hrsg.) (Eds.): IT-Recht.
Hörmanseder, R. (2012).  Jörg R. Mühlbacher: 30 Jahre Institutschef und Vorgesetzter. Der Weg vom Dienstvorgesetzten zum Freund. Michael Sonntag, Rudolf Hörmanseder (Hrsg.) - Informatik: Von Anfang an. Festschrift für Jörg R. Mühlbacher.
Groza, B., & Mayrhofer R. (2012).  SAPHE - Simple Accelerometer based wireless Pairing with HEuristic trees. Proc. MoMM 2012: 10th International Conference on Advances in Mobile Computing and Multimedia.
Riedl, P., & Mayrhofer R. (2012).  Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting. Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 98-101.
Findling, R. Dieter, & Mayrhofer R. (2012).  Towards Face Unlock: On the Difficulty of Reliably Detecting Faces on Mobile Phones. Proc. MoMM 2012: 10th International Conference on Advances in Mobile Computing and Multimedia. 275–280.
Mayrhofer, R., & Kaiser T. (2012).  Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets. Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2012.
Praher, C. (2012).  Towards Working Set Based Approximation of Least Privilege Principle for Operating Systems. Petr Doucek, Gerhard Gerhard Chroust, Václav Oskrdal (Eds.): IDIMT-2012. ICT Support for Complex Systems.
Tschernuth, M., Lettner M., & Mayrhofer R. (2012).  Unify localization using user interface description languages and a navigation context-aware translation tool. Proc. {EICS 2012}: 4th ACM SIGCHI symposium on Engineering interactive computing systems. 179–188.
2011
Köck, M., & Paramythis A. (2011).  Activity Sequence Modeling and Dynamic Clustering for Personalized E-Learning. Journal of User Modeling and User-Adapted Interaction.

Pages