Publications

This list of publications is automatically created from my BibTeX database and will be updated semi-regularly as I update that master file. If you need a PDF version of one of these publications that is not online (for various reasons), please send me an email.

For a list of citations, see e.g. my ResearchGate, Google Scholar, ACM Authorizer, Semantic Scholar, or ORCID profiles. For most of the conference papers, I have also given the presentations, and you can find my associated slides here.

Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, …

We address the secure pairing of mobile devices based on accelerometer data under various transportation environments, e.g., train, …

Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods having been …

Detection of unauthorized disclosure of sensitive data is still an open problem. Taint tracking is one effective approach to detect …

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and …

Providing methods to anonymously validate user identity is essential in many applications of electronic identity (eID) systems. A …

Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, …

We propose a system for enabling auxiliary communication channels in which a node transmits a millimeter (mm) wave signal which is …

The threat model for a mobile device ecosystem is complex. In addition to the obvious physical attacks on lost or stolen devices and …

This paper analyses the influence of network security measures on the system behaviour of a power system protection device. In this …

In this work we propose a secure communication concept for the protection of critical power supply and distribution infrastructure. …

Biometrics have become important for mobile authentication, e.g. to unlock devices before using them. One way to protect biometric …

This work evaluates the security strength of a smartphone-based gait recognition system against zero-effort and live minimal-effort …

Today, mobile devices like smartphones and tablets have become an indispensable part of people’s lives, posing many new questions …

As users start carrying multiple mobile devices, we propose a novel, token based mobile device unlocking approach. Mobile devices are …

There are many systems that provide users with an electronic identity (eID) to sign documents or authenticate to online services (e.g. …

Biometrics have become important for authentication on mobile devices, e.g. to unlock devices before using them. One way to protect …

Mobile devices offer access to our digital lives and thus need to be protected against the risk of unauthorized physical access by …

Users usually authenticate to mobile devices before using them (e.g PIN, password), but devices do not do the same to users. Revealing …

Mobile devices, ubiquitous in modern lifestyle, embody and provide convenient access to our digital lives. Being small and mobile, they …

In this paper, we study the concept of security zones as an intermediate layer of compartmentalization on mobile devices. Each of these …

Purpose: Detecting if two or multiple devices are moved together is an interesting problem for different applications. However, these …

ABSTRACTThe inherent weakness of typical mobile device unlockingapproaches (PIN, password, graphic pattern) is that theydemand time and …

Gait authentication using a cell phone based accelerometer sensor offers an unobtrusive, user-friendly, and periodicway of …

Detecting if two or multiple devices are moved together isan interesting problem for different applications. However,these devices may …

Smartphones and tablets are an indispensable part of moderncommunication and people spend considerable time interacting with their …

With the increasing popularity of security and privacy sensitive systems on mobile devices, such as mobile banking,mobile credit cards, …

In a wireless world, users can establish ad hoc virtual connections between devices that are unhampered bycables. This process is known …

This is the first issue of Volume 10 of the International Journal of Pervasive Computing and Communication, which commences the tenth …

Purpose - The purpose of this paper is to address the design, implementation, performance and limitations of an environment that …

We analyze locked and unlocked mobile device usage of 1 960 Android smartphones. Based on approximately 10TB of mobile device data logs …

Mobile devices such as smart phones have become one of the preferredmeans of accessing digital services, both for consuming and …

Insufficient security and privacy on mobile devices have made it difficultto utilize sensitive systems like mobile banking, mobile …

Face detection (finding faces of different perspectives in images)is an important task as prerequisite to face recognition. This …

Authenticating spontaneous interactions between devices and usersis challenging for several reasons: the wireless (and therefore …

Purpose – Personal mobile devices currently have access to a significantportion of their user’s private sensitive data and are …

The past few years have shown a tendency from desktop software developmenttowards mobile application development due to the increasing …

Authenticating users on mobile devices is particularly challengingbecause of usability concerns: authentication must be quick and …

Indoor localization is becoming increasingly important for mobileapplications. WLAN fingerprinting is a compelling technique becauseit …

Spatial messaging is a direct extension to text and other multi-mediamessaging services that have become highly popular with the …

Personal notes, even when shared with others, often contain highlysensitive information. From a security and privacy point of …

Model-driven development (MDD) has seen wide application in research,but still has limitations in real world industrial projects. …

Exploits on mobile phones can be used for various reasons; a benignone may be to achieve system-level access on a device that was …

Spatial messaging is a direct extension to text and other multi-mediamessaging services that have become highly popular with the …

The project SESAME utilizes smart metering, building automation andpolicy-based reasoning to support home owners and building …

Authenticating spontaneous interactions between devices and usersis challenging for several reasons: the wireless (and therefore …

A challenge in facilitating spontaneous mobile interactions is toprovide pairing methods that are both intuitive and secure. …

Mobile devices, per definition, are supposed to assist in organizingall kinds of things, also tasks of course, because usually such …

This habilitation thesis (``Sammelhabilitation’') collects and summarisesoriginal research by the author, primarily in the area …

Small, mobile devices or infrastructure devices without user interfaces,such as Bluetooth headsets, wireless LAN access points, or …

Secure device pairing is especially difficult for spontaneous interactionin ubiquitous computing environments because of wireless …

Spontaneous interaction is a desirable characteristic associated withmobile and ubiquitous computing. The aim is to enable users to …

Secure communication over wireless channels necessitates authenticationof communication partners to prevent man-in-the-middle attacks. …

Small, mobile devices without user interfaces, such as Bluetooth headsets,often need to communicate securely over wireless networks. …

Securing wireless channels necessitates authenticating communicationpartners. For spontaneous interaction, authentication must be …

Spontaneous interaction in wireless ad-hoc networks is often desirablenot only between users or devices in direct contact, but also …

Most authentication protocols designed for ubiquitous computing environmentstry to solve the problem of intuitive, scalable, secure …

Ultrasound has been proposed as out-of-band channel for authenticationof peer devices in wireless ad hoc networks. Ultrasound can …

Context awareness is one of the building blocks of many applicationsin pervasive computing. Recognizing the current context of a useror …

Spontaneous interaction in ad-hoc networks is often desirable notonly between users or devices in direct contact, but also with …

This report presents a method for establishing and securing spontaneousinteractions on the basis of spatial references which are …

Internet-Recht bewegt sich grundsätzlich an der Schnittstelle zwischenGesetzgebung und Technik. Wie an vielen Schnittstellen gibt es …

Abstract The design principles of pervasive computing software architecturesare widely driven by the need for opportunistic interaction …

So genannte ``kontextsensitive Systeme’’ haben zum Ziel, die eingesetztenComputersysteme automatisch an die aktuellen …

This paper presents the topic of context prediction as one possibilityto exploit context histories. It lists some expected benefits …

Pervasive Computing is a new area of research with increasing prominence;it is situated at the intersection between human/computer …

Current mobile devices like mobile phones or personal digital assistantshave become more and more powerful; they already offer features …

Smart space and smart appliances, i.e. wirelessly ad-hoc networked,mobile, autonomous special purpose computing devices, providing …

Today’s information appliances are usually very powerful, featuringlocal storage and processing power, communication technology …

For a qualitative and quantitative assessment of context predictionand recognition methods, real-world data sets are inevitable. …

Many of the currently available sensors do not provide simple, numericalvalues but more complex data like a list of other devices in …

Mobile Peer-to-Peer (P2P) computing applications involve collectionsof heterogeneous and resource-limited devices (such as PDAs or …

Abstract—Mobile Peer-to-Peer (P2P) computing applications involvecollections of heterogeneous and resource-limited devices (such asPDAs …

Context awareness is currently being investigated for applicationsin different areas, including Mobile Computing. Many mobile …

Current mobile devices like mobile phones or personal digital assistantshave become more and more powerful; they already offer features …

Security and privacy in mobile ad-hoc peer-to-peer environments arehard to attain, especially when working with passive objects …

Spiking Neural Networks are considered as a new computation paradigm,representing the next generation of Artificial Neural Networks …

This paper presents a new model for simulating Spiking Neural Networksusing discrete event simulation which might possibly offer …