Export 324 results:
Paramythis, A., & Mühlbacher J. R. (2008).  Towards New Approaches in Adaptive Support for Collaborative E-Learning. in: Proceedings of the The Eleventh IASTED International Conference on Computers and Advanced Technology in Education (CATE 2008), September 29 – October 1, 2008, Crete, Greece.
Sonntag, M. (2008).  Towards un-personal security. Gerhard Gerhard Chroust, Petr Doucek, Jan Klas (Eds.): IDIMT-2008. 16th Interdisciplinary Information management Talks.
Mayrhofer, R. (2008).  Ubiquitous Computing Security: Authenticating Spontaneous Interactions.
Paramythis, A., König F., Schwendtner C., & van Velsen L. (2008).  Using thematic ontologies for user- and group- based adaptive personalization in web searching. in: Proceedings of the 6th International Workshop on Adaptive Multimedia Retrieval (AMR'2008), 26-27 June 2008, Berlin, Germany.
Mayrhofer, R. (2007).  The Candidate Key Protocol for Generating Secret Shared Keys From Similar Sensor Data Streams. Proc. {ESAS 2007}: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks. 4572, 1–15.
Putzinger, A., & Mühlbacher J. R. (2007).  Entwicklungsgeschichtliche Analogien zwischen Programmiersprachen und Lernplattformen. Bernad Batinic, Alfons Koller, Hermann Sikora (Eds.): E-Learning, digitale Medien und lebenslanges Lernen.
Mayrhofer, R. (2007).  Extending the Growing Neural Gas Classifier for Context Recognition. Proc. {EUROCAST} 2007: 11th International Conference on Computer Aided Systems Theory. 4739, 920–927.
Mayrhofer, R., & Welch M. (2007).  A Human-Verifiable Authentication Protocol Using Visible Laser Light. Proc. {ARES 2007}: 2nd International Conference on Availability, Reliability and Security. 1143–1147.
Sonntag, M. (2007).  Interactivity in Legal Web Courses through Direct Response Systems. 33nd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 2007.
Sonntag, M. (2007).  IS/ICT security and privacy. Christoph Hoyer, Gerhard Gerhard Chroust (Eds.): IDIMT-2007. 15th Interdisciplinary Information management Talks.
Sonntag, M. (2007).  Juristische Übungen mit direktem Feedback. Erich Schweighofer, Anton Geist, Gisela Heindl (Eds.): 10 Jahre IRIS: Bilanz und Ausblick; Tagungsband des 10. Internationalen Rechtsinformatik Symposions IRIS 2007.
Pilz, G., Mühlbacher J. R., & Widi M. (2007).  Mathematik explorativ - Ausgewählte Kapitel der Algebra, Zahlentheorie und Graphentheorie für Anwendungen in der Informatik.
[Anonymous] (2007).  Proc. IWSSI 2007: First International Workshop on Security for Spontaneous Interaction (part of Adjunct Proc. Ubicomp 2007). (Mayrhofer, R., & Nyberg K., Ed.).
Kinne, R. (2007).  Rechtsschutz für Software.
Mayrhofer, R., Gellersen H., & Hazas M. (2007).  Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. Proc. {Ubicomp 2007}: 9th International Conference on Ubiquitous Computing. 4717, 199–216.
Mayrhofer, R., & Gellersen H. (2007).  On the Security of Ultrasound as Out-of-band Channel. Proc. {IPDPS 2007}: 21st {IEEE} International Parallel and Distributed Processing Symposium. 321.
Mayrhofer, R., & Gellersen H. (2007).  Shake well before use: Authentication based on Accelerometer Data. Proc. {Pervasive 2007}: 5th International Conference on Pervasive Computing. 4480, 144–161.
Mayrhofer, R., & Gellersen H. (2007).  Shake well before use: two implementations for implicit context authentication. Adjunct Proc. {Ubicomp 2007}. 72–75.
Mayrhofer, R. (2007).  Towards an Open Source Toolkit for Ubiquitous Device Authentication. Workshops Proc. {PerCom 2007}: 5th {IEEE} International Conference on Pervasive Computing and Communications. 247–252.
Mayrhofer, R., & Gostner R. (2007).  Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. Journal of Mobile Multimedia. 3, 198–217.
Sonntag, M. (2006).  Agents as web service providers: Single agents or MAS?. Journal of Applied Artificial Intelligence (JAAI).
Sonntag, M. (2006).  Ajax Security in Groupware. 32nd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 2006.
Mayrhofer, R., Gellersen H., & Hazas M. (2006).  An Authentication Protocol using Ultrasonic Ranging.
Mayrhofer, R. (2006).  A Context Authentication Proxy for IPSec using Spatial Reference. Proc. {TwUC} 2006: 1st International Workshop on Trustworthy Ubiquitous Computing. 449–462.
Sonntag, M. (2006).  Datenschutz - Eine Querschnittsmaterie. Softwaretechnik - Trends 26:4.