own-publications.bib
@techreport{report-p2p-framework,
author = {Alois Ferscha and Manfred Hechinger and Rene Mayrhofer},
title = {The Peer-to-Peer Coordination Framework --- Architecture Reference},
institution = {Johannes Kepler Universit\"at Linz, Institut f\"ur Pervasive Computing},
year = {2004},
pubtype = {unrefereed}
}
@techreport{report-ultrasound-protocol,
author = {Rene Mayrhofer and Hans Gellersen and Mike Hazas},
title = {An Authentication Protocol using Ultrasonic Ranging},
institution = {Lancaster University},
year = {2006},
number = {COMP-002-2006},
month = {October},
abstract = {This report presents a method for establishing and securing spontaneous
interactions on the basis of spatial references which are obtained
by accurate sensing of relative device positions. Utilising the Relate
ultrasonic sensing system, we construct an interlocked protocol using
radio frequency messages and ultrasonic pulses for verifying that
two devices share a secret. This verification is necessary to prevent
man-in-the-middle attacks on standard Diffie-Hellman key agreement.},
documenturl = {http://www.mayrhofer.eu.org/downloads/publications/TR-COMP-002-2006-Spatial-Authentication-Protocol.pdf},
pubtype = {unrefereed},
url = {http://www.comp.lancs.ac.uk/}
}
@techreport{report-eth2010-openuat,
author = {Rene Mayrhofer and Iulia Ion},
title = {{OpenUAT}: The Open Source Ubiquitous Authentication Toolkit},
institution = {ETH Zurich},
year = {2010},
number = {657},
month = {August},
abstract = {Authenticating spontaneous interactions between devices and users
is challenging for several reasons: the wireless (and therefore invisible)
nature of device communication, the heterogeneous nature of devices
and lack of appropriate user interfaces in mobile devices, and the
requirement for unobtrusive user interaction. The most promising
approach that has been proposed in literature involves the exploitation
of so-called auxiliary channels for authentication to bridge the
gap between usability and security. This concept has spawned the
independent development of various authentication methods and research
prototypes, that, unfortunately, remain hard to compare and interchange
and are rarely available to potential application developers. We
built a system which implements and unifies these approaches. In
this paper, we present OpenUAT, an open source toolkit that implements
our novel, unified cryptographic authentication protocol (UACAP),
and a comprehensive range of specific auxiliary channels. We evaluated
OpenUAT based on a user study in which we compared four authentication
methods implemented by the toolkit. The user study showed that users
tend to prefer the visual channel in spite of its comparatively poor
performance.},
documenturl = {http://www.mayrhofer.eu.org/downloads/publications/TechReportETH2010-OpenUAT.pdf},
eventurl = {http://www.inf.ethz.ch/research/disstechreps/techreports/show?serial=657\&lang=en},
pubtype = {unrefereed}
}