René Mayrhofer
René Mayrhofer
Home
Publications
Presentations
Posts
Courses
Projects archive
Contact
Light
Dark
Automatic
1
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments
Philipp Hofer
,
Michael Roland
,
Philipp Schwarz
,
René Mayrhofer
Cite
DOI
On the state of V3 onion services
Tor onion services are a challenging research topic because they were designed to reveal as little metadata as possible which makes it …
Tobias Höller
,
Michael Roland
,
René Mayrhofer
Cite
DOI
URL
Importance of different facial parts for face detection networks
Philipp Hofer
,
Michael Roland
,
Philipp Schwarz
,
Martin Schwaighofer
,
René Mayrhofer
Cite
DOI
URL
On the feasibility of short-lived dynamic onion services
Tobias Höller
,
Thomas Raab
,
Michael Roland
,
René Mayrhofer
Cite
DOI
Experiences and Recommendations from Operating a Tor Exit Node at a University
We report on a multi-year operation of a Tor exit node at a public university and provide recommendations for running other instances. …
Michael Sonntag
,
René Mayrhofer
Cite
DOI
URL
Analyzing inconsistencies in the Tor consensus
Every distributed system needs some way to list its current participants. The Tor networks consensus is one way of tackling this …
Tobias Höller
,
Michael Roland
,
René Mayrhofer
Cite
DOI
URL
Dynamic Taint Tracking Simulation
Detection of unauthorized disclosure of sensitive data is still an open problem. Taint tracking is one effective approach to detect …
Fabian Berner
,
René Mayrhofer
,
Johannes Sametinger
PDF
Cite
DOI
DAMFA: Decentralized Anonymous Multi-Factor Authentication
Omid Mir
,
René Mayrhofer
,
Michael Roland
Cite
URL
KinPhy: A Kinetic in-Band Channel for Millimetre-Wave Networks
We propose a system for enabling auxiliary communication channels in which a node transmits a millimeter (mm) wave signal which is …
Mohammed Alloulah
,
Zoran Radivojevic
,
René Mayrhofer
,
Howard Huang
PDF
Cite
DOI
Introspection for C and its Applications to Library Robustness
In C, low-level errors, such as buffer overflow and use-after-free, are a major problem, as they cause security vulnerabilities and …
Manuel Rigger
,
René Mayrhofer
,
Roland Schatz
,
Matthias Grimmer
,
Hanspeter Mössenböck
Cite
URL
»
Cite
×