Export 328 results:
Ferscha, A., Hechinger M., Riener A., Rocha M. dos Santos, Zeidler A., Franz M., et al. (2008).  Peer-it: Stick-on solutions for networks of things. Pervasive and Mobile Computing. 448-479.
Praher, C. (2008).  Security and Privacy in an Enterprise Search Infrastructure for Mobile Devices. Gerhard Gerhard Chroust, Petr Doucek, Jan Klas (Eds.): IDIMT-2008. 16th Interdisciplinary Information management Talks.
Mayrhofer, R., & Gellersen H. (2008).  Spontaneous Mobile Device Authentication based on Sensor Data. Information Security Technical Report. 13, 136–150.
Radi, H., & Mayrhofer R. (2008).  Towards Alternative User Interfaces for Capturing and Managing Tasks with Mobile Devices. Proc. {MoMM} 2008: 6th International Conference on Advances in Mobile Computing and Multimedia. 272–275.
Paramythis, A., & Mühlbacher J. R. (2008).  Towards New Approaches in Adaptive Support for Collaborative E-Learning. in: Proceedings of the The Eleventh IASTED International Conference on Computers and Advanced Technology in Education (CATE 2008), September 29 – October 1, 2008, Crete, Greece.
Sonntag, M. (2008).  Towards un-personal security. Gerhard Gerhard Chroust, Petr Doucek, Jan Klas (Eds.): IDIMT-2008. 16th Interdisciplinary Information management Talks.
Mayrhofer, R. (2008).  Ubiquitous Computing Security: Authenticating Spontaneous Interactions.
Paramythis, A., König F., Schwendtner C., & van Velsen L. (2008).  Using thematic ontologies for user- and group- based adaptive personalization in web searching. in: Proceedings of the 6th International Workshop on Adaptive Multimedia Retrieval (AMR'2008), 26-27 June 2008, Berlin, Germany.
Mayrhofer, R. (2007).  The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams. Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks. 4572, 1–15.
Putzinger, A., & Mühlbacher J. R. (2007).  Entwicklungsgeschichtliche Analogien zwischen Programmiersprachen und Lernplattformen. Bernad Batinic, Alfons Koller, Hermann Sikora (Eds.): E-Learning, digitale Medien und lebenslanges Lernen.
Mayrhofer, R. (2007).  Extending the Growing Neural Gas Classifier for Context Recognition. Proc. {EUROCAST} 2007: 11th International Conference on Computer Aided Systems Theory. 4739, 920–927.
Mayrhofer, R., & Welch M. (2007).  A Human-Verifiable Authentication Protocol Using Visible Laser Light. Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security. 1143–1147.
Sonntag, M. (2007).  Interactivity in Legal Web Courses through Direct Response Systems. 33nd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 2007.
Sonntag, M. (2007).  IS/ICT security and privacy. Christoph Hoyer, Gerhard Gerhard Chroust (Eds.): IDIMT-2007. 15th Interdisciplinary Information management Talks.
Sonntag, M. (2007).  Juristische Übungen mit direktem Feedback. Erich Schweighofer, Anton Geist, Gisela Heindl (Eds.): 10 Jahre IRIS: Bilanz und Ausblick; Tagungsband des 10. Internationalen Rechtsinformatik Symposions IRIS 2007.
Pilz, G., Mühlbacher J. R., & Widi M. (2007).  Mathematik explorativ - Ausgewählte Kapitel der Algebra, Zahlentheorie und Graphentheorie für Anwendungen in der Informatik.
[Anonymous] (2007).  Proc. IWSSI 2007: First International Workshop on Security for Spontaneous Interaction (part of Adjunct Proc. Ubicomp 2007). (Mayrhofer, R., & Nyberg K., Ed.).
Kinne, R. (2007).  Rechtsschutz für Software.
Mayrhofer, R., Gellersen H., & Hazas M. (2007).  Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. Proc. {Ubicomp 2007}: 9th International Conference on Ubiquitous Computing. 4717, 199–216.
Mayrhofer, R., & Gellersen H. (2007).  On the Security of Ultrasound as Out-of-band Channel. Proc. {IPDPS 2007}: 21st {IEEE} International Parallel and Distributed Processing Symposium. 321.
Mayrhofer, R., & Gellersen H. (2007).  Shake well before use: Authentication based on Accelerometer Data. Proc. {Pervasive 2007}: 5th International Conference on Pervasive Computing. 4480, 144–161.
Mayrhofer, R., & Gellersen H. (2007).  Shake well before use: two implementations for implicit context authentication. Adjunct Proc. {Ubicomp 2007}. 72–75.
Mayrhofer, R. (2007).  Towards an Open Source Toolkit for Ubiquitous Device Authentication. Workshops Proc. {PerCom 2007}: 5th {IEEE} International Conference on Pervasive Computing and Communications. 247–252.
Mayrhofer, R., & Gostner R. (2007).  Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. Journal of Mobile Multimedia. 3, 198–217.
Sonntag, M. (2006).  Agents as web service providers: Single agents or MAS?. Journal of Applied Artificial Intelligence (JAAI).