own-publications.bib

@techreport{report-p2p-framework,
  author = {Alois Ferscha and Manfred Hechinger and Rene Mayrhofer},
  title = {The Peer-to-Peer Coordination Framework --- Architecture Reference},
  institution = {Johannes Kepler Universit\"at Linz, Institut f\"ur Pervasive Computing},
  year = {2004},
  pubtype = {unrefereed}
}
@techreport{report-ultrasound-protocol,
  author = {Rene Mayrhofer and Hans Gellersen and Mike Hazas},
  title = {An Authentication Protocol using Ultrasonic Ranging},
  institution = {Lancaster University},
  year = {2006},
  number = {COMP-002-2006},
  month = {October},
  abstract = {This report presents a method for establishing and securing spontaneous
	interactions on the basis of spatial references which are obtained
	by accurate sensing of relative device positions. Utilising the Relate
	ultrasonic sensing system, we construct an interlocked protocol using
	radio frequency messages and ultrasonic pulses for verifying that
	two devices share a secret. This verification is necessary to prevent
	man-in-the-middle attacks on standard Diffie-Hellman key agreement.},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/TR-COMP-002-2006-Spatial-Authentication-Protocol.pdf},
  pubtype = {unrefereed},
  url = {http://www.comp.lancs.ac.uk/}
}
@techreport{report-eth2010-openuat,
  author = {Rene Mayrhofer and Iulia Ion},
  title = {{OpenUAT}: The Open Source Ubiquitous Authentication Toolkit},
  institution = {ETH Zurich},
  year = {2010},
  number = {657},
  month = {August},
  abstract = {Authenticating spontaneous interactions between devices and users
	is challenging for several reasons: the wireless (and therefore invisible)
	nature of device communication, the heterogeneous nature of devices
	and lack of appropriate user interfaces in mobile devices, and the
	requirement for unobtrusive user interaction. The most promising
	approach that has been proposed in literature involves the exploitation
	of so-called auxiliary channels for authentication to bridge the
	gap between usability and security. This concept has spawned the
	independent development of various authentication methods and research
	prototypes, that, unfortunately, remain hard to compare and interchange
	and are rarely available to potential application developers. We
	built a system which implements and unifies these approaches. In
	this paper, we present OpenUAT, an open source toolkit that implements
	our novel, unified cryptographic authentication protocol (UACAP),
	and a comprehensive range of specific auxiliary channels. We evaluated
	OpenUAT based on a user study in which we compared four authentication
	methods implemented by the toolkit. The user study showed that users
	tend to prefer the visual channel in spite of its comparatively poor
	performance.},
  documenturl = {http://www.mayrhofer.eu.org/downloads/publications/TechReportETH2010-OpenUAT.pdf},
  eventurl = {http://www.inf.ethz.ch/research/disstechreps/techreports/show?serial=657\&lang=en},
  pubtype = {unrefereed}
}