René Mayrhofer
Home
Publications
Presentations
Posts
Courses
Contact
Rene Mayrhofer
Latest
Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics
Sulong, and Thanks For All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
A Survey of User Interaction for Spontaneous Device Association
An Architecture for Secure Mobile Devices
Managing the life cycle of Java Card applets in other Java virtual machines
Special Issue on Security and Trust in Context-Aware Applications
Special Issue: The confluence and synergy of mobile computing and multimedia with pervasive computing and communication
(Ab)using foreign VMs: Running Java Card Applets in non-Java CardVirtual Machines
An Analysis Of Different Approaches To Gait Recognition Using CellPhone Based Accelerometer
Range Face Segmentation: Face Detection and Segmentation for Authenticationin Mobile Device Range Images
Requirements for an Open Ecosystem for Embedded Tamper ResistantHardware on Mobile Devices
Visualizations and Switching Mechanisms for Security Zones
When Users Cannot Verify Digital Signatures: On the Difficultiesof Securing Mobile Devices
UACAP: A Unified Auxiliary Channel Authentication Protocol
Towards Secure Personal Device Unlock using Stereo Camera Pan Shots
Towards pan shot face unlock: Using biometric face information fromdifferent perspectives to unlock mobile devices
SAPHE - Simple Accelerometer based wireless Pairing with HEuristictrees
Towards Face Unlock: On the Difficulty of Reliably Detecting Faceson Mobile Phones
Towards a Practical, Scalable Self-Localization System for Android Phones based on WLAN Fingerprinting
Towards usable authentication on mobile phones: An evaluation ofspeaker and face recognition on off-the-shelf handsets
Unify localization using user interface description languages anda navigation context-aware translation tool
Air-Writing: A Platform for Scalable, Privacy-Preserving, SpatialGroup Messaging
Feature interaction analysis in mobile phones: on the borderlinebetween application functionalities and platform components
Private Notes: Encrypted XML Notes Synchronization and Sharingwith Untrusted Web Services
A Critical Review of Applied MDA for Embedded Devices: Identificationof Problem Classes and Discussing Porting Efforts in Practice
A framework for on-device privilege escalation exploit executionon Android
emphFriends Radar: Towards a Private P2P Location Sharing Platform
Evaluation of Descriptive User Interface Methodologies for MobileDevices
Mobile Platform Architecture Review: Android, iPhone, Qt
Global indexing of indoor localization data
Air-Writing: A Platform for Scalable, Privacy-Preserving, SpatialGroup Messaging
User Created Machine-readable Policies for Energy Efficiency in SmartHomes
OpenUAT: The Open Source Ubiquitous Authentication Toolkit
Shake well before use: Intuitive and Secure Pairing of Mobile Devices
On Structural Identification of 2D Regression Functions for In-doorBluetooth Localization
Special Issue: Secure Spontaneous Interaction
Towards Alternative User Interfaces for Capturing and Managing Taskswith Mobile Devices
Ubiquitous Computing Security: Authenticating Spontaneous Interactions
Spontaneous Mobile Device Authentication based on Sensor Data
Building Flexible Manufacturing Systems Based on Peer-Its
Peer-it: Stick-on solutions for networks of things
Proc. IWSSI 2007: First International Workshop on Security forSpontaneous Interaction (part of Adjunct Proc. Ubicomp 2007)
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Shake well before use: two implementations for implicit context authentication
The Candidate Key Protocol for Generating Secret Shared Keys FromSimilar Sensor Data Streams
Shake well before use: Authentication based on Accelerometer Data
A Human-Verifiable Authentication Protocol Using Visible Laser Light
On the Security of Ultrasound as Out-of-band Channel
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Using a Spatial Context Authentication Proxy for Establishing SecureWireless Connections
Extending the Growing Neural Gas Classifier for Context Recognition
A Context Authentication Proxy for IPSec using Spatial Reference
An Authentication Protocol using Ultrasonic Ranging
Technische Hintergründe f̈̊ das rechtliche Handeln im Internet
Bridging the Gap with P2P Patterns
Advances in Pervasive Computing: Adjunct Proceedings of the 3rd InternationalConference on Pervasive Computing
Context Prediction based on Context Histories: Expected Benefits,Issues and Current State-of-the-Art
Eine Architektur zur Kontextvorhersage
An Architecture for Context Prediction
An Architecture for Context Prediction
Recognizing and Predicting Context by Learning from User Behavior
A Context Prediction Code and Data Base
A Notebook Sensory Data Set for Context Recognition
An Architecture for Context Prediction
Digital Aura
A Light-Weight Component Model for Peer-to-Peer Applications
A Peer-to-Peer Light-Weight Component Model for Context-Aware SmartSpace Applications
The Peer-to-Peer Coordination Framework --- Architecture Reference
Feature Extraction in Wireless Personal and Local Area Networks
Recognizing and Predicting Context by Learning from User Behavior
Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks
A New Approach to a Fast Simulation of Spiking Neural Networks
DEVS Simulation of Spiking Neural Networks
Generic Heuristics for Combinatorial Optimization Problems
Cite
×