René Mayrhofer
René Mayrhofer
Home
Publications
Presentations
Posts
Courses
Projects archive
Contact
Light
Dark
Automatic
1
Anonymously Publishing Liveness Signals with Plausible Deniability
Sometimes entities have to prove to others that they are still alive at a certain point in time, but with the added requirements of …
Michael Sonntag
,
and René Mayrhofer
,
Stefan Rass
PDF
Cite
DOI
Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices
While real-time face recognition has become increasingly popular, its use in decentralized systems and on embedded hardware presents …
Philipp Hofer
,
Michael Roland
,
Philipp Schwarz
,
René Mayrhofer
PDF
Cite
DOI
A Large-Scale Data Collection and Evaluation Framework for Android Device Security Attributes
Ernst Leierzopf
,
Michael Roland
,
Florentin Putz
,
René Mayrhofer
Cite
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments
Philipp Hofer
,
Michael Roland
,
Philipp Schwarz
,
René Mayrhofer
Cite
DOI
On the state of V3 onion services
Tor onion services are a challenging research topic because they were designed to reveal as little metadata as possible which makes it …
Tobias Höller
,
Michael Roland
,
René Mayrhofer
PDF
Cite
DOI
URL
Importance of different facial parts for face detection networks
Philipp Hofer
,
Michael Roland
,
Philipp Schwarz
,
Martin Schwaighofer
,
René Mayrhofer
Cite
DOI
URL
On the feasibility of short-lived dynamic onion services
Tobias Höller
,
Thomas Raab
,
Michael Roland
,
René Mayrhofer
Cite
DOI
Experiences and Recommendations from Operating a Tor Exit Node at a University
We report on a multi-year operation of a Tor exit node at a public university and provide recommendations for running other instances. …
Michael Sonntag
,
René Mayrhofer
Cite
DOI
URL
Analyzing inconsistencies in the Tor consensus
Every distributed system needs some way to list its current participants. The Tor networks consensus is one way of tackling this …
Tobias Höller
,
Michael Roland
,
René Mayrhofer
Cite
DOI
URL
Dynamic Taint Tracking Simulation
Detection of unauthorized disclosure of sensitive data is still an open problem. Taint tracking is one effective approach to detect …
Fabian Berner
,
René Mayrhofer
,
Johannes Sametinger
Cite
DOI
URL
»
Cite
×