Refereed journal articles

[1] R. Findling, M. Hölzl, and R. Mayrhofer, “Mobile match-on-card authentication using offline-simplified models with gait and face biometrics,” IEEE Transactions on Mobile Computing, March 2018. [ bib | DOI | conference link | www: | Abstract ]
[2] A. Aichhorn, B. Etzlinger, A. Unterweger, R. Mayrhofer, and A. Springer, “Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks,” International Journal of Critical Infrastructure Protection, 2018. [ bib ]
[3] M. Muaaz and R. Mayrhofer, “Smartphone-based gait recognition: From authentication to imitation,” IEEE Transactions on Mobile Computing (IEEE TMC), vol. 16, pp. 3209--3221, November 2017. [ bib | DOI | conference link | .pdf | Abstract ]
[4] R. D. Findling, M. Muaaz, D. Hintze, and R. Mayrhofer, “Shakeunlock: Securely transfer authentication states between mobile devices,” IEEE Transactions on Mobile Computing (IEEE TMC), vol. 16, p. 1175, 04/2017 2017. [ bib | DOI | conference link | .pdf | Abstract ]
[5] P. Riedl, R. Mayrhofer, A. Möller, M. Kranz, F. Lettner, C. Holzmann, and M. Koelle, “Only play in your comfort zone: interaction methods for improving security awareness on mobile devices,” Personal and Ubiquitous Computing, pp. 1--14, March 2015. [ bib | DOI | conference link | .pdf | Abstract ]
[6] R. Mayrhofer, H. Hlavacs, and R. D. Findling, “Optimal derotation of shared acceleration time series by determining relative spatial alignment,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, pp. 454--466, 2015. A preliminary version of this work was published in iiWAS 2014 [?]. [ bib | DOI | Abstract ]
[7] M. K. Chong, R. Mayrhofer, and H. Gellersen, “A survey of user interaction for spontaneous device association,” ACM Computing Surveys, vol. 47, July 2014. accepted for publication on 2014-03-11. [ bib | DOI | conference link | .pdf | Abstract ]
[8] R. Mayrhofer, “An architecture for secure mobile devices,” Security and Communication Networks, 2014. Significantly revised and extended version of [?], accepted for publication on 2014-03-24, online publication 2014-06-17 (AID SEC1028). [ bib | DOI | http | .pdf | Abstract ]
[9] M. Roland, J. Langer, and R. Mayrhofer, “Managing the life cycle of java card applets in other java virtual machines,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 10, pp. 291--312, 2014. A preliminary version of this work was published in MoMM 2013 [?]. [ bib | DOI | conference link | .pdf | Abstract ]
[10] R. Mayrhofer, J. Fuss, and I. Ion, “UACAP: A unified auxiliary channel authentication protocol,” IEEE Transactions on Mobile Computing, vol. 12, pp. 710--721, April 2013. [ bib | DOI | conference link | .pdf | Abstract ]
[11] R. Findling and R. Mayrhofer, “Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 9, pp. 190--208, 2013. A preliminary version of this work was published in MoMM 2012 [?] with a limited set of classifiers and a significantly smaller data set used for evaluation. [ bib | DOI | conference link | .pdf | Abstract ]
[12] R. Mayrhofer, A. Sommer, and S. Saral, “Air-writing: A platform for scalable, privacy-preserving, spatial group messaging,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 8, pp. 53--78, 2012. A preliminary version of this work was published in iiWAS 2010 [?]. [ bib | DOI | conference link | .pdf | Abstract ]
[13] R. Mayrhofer and H. Gellersen, “Shake well before use: Intuitive and secure pairing of mobile devices,” IEEE Transactions on Mobile Computing, vol. 8, pp. 792--806, June 2009. revised and extended version of [?]. [ bib | conference link | .pdf | Abstract ]
[14] R. Mayrhofer and H. Gellersen, “Spontaneous mobile device authentication based on sensor data,” Information Security Technical Report, vol. 13, pp. 136--150, August 2008. presents a summary and extension of four previous conference papers [?]. [ bib | DOI | conference link | .pdf | Abstract ]
[15] A. Ferscha, M. Hechinger, A. Riener, M. dos Santos Rocha, A. Zeidler, M. Franz, and R. Mayrhofer, “Peer-it: Stick-on solutions for networks of things,” Pervasive and Mobile Computing, pp. 448--479, 2008. [ bib ]
[16] A. Ferscha, M. Hechinger, M. dos Santos Rocha, R. Mayrhofer, A. Zeidler, A. Riener, and M. Franz, “Building flexible manufacturing systems based on peer-its,” EURASIP Journal on Embedded Systems, vol. 2008, 2008. Article ID 267560. [ bib | DOI | http ]
[17] R. Mayrhofer and R. Gostner, “Using a spatial context authentication proxy for establishing secure wireless connections,” Journal of Mobile Multimedia, vol. 3, pp. 198--217, March 2007. [ bib | .pdf | Abstract ]
[18] R. Mayrhofer, H. Radi, and A. Ferscha, “Recognizing and predicting context by learning from user behavior,” Radiomatics: Journal of Communication Engineering, special issue on Advances in Mobile Multimedia, vol. 1, pp. 30--42, May 2004. extended version of [?]. [ bib | .pdf | Abstract ]
[19] A. Ferscha, M. Hechinger, R. Mayrhofer, and R. Oberhauser, “A peer-to-peer light-weight component model for context-aware smart space applications,” International Journal of Wireless and Mobile Computing (IJWMC), special issue on Mobile Distributed Computing, 2004. extended version of [?]. [ bib | .pdf | Abstract ]
[20] R. Mayrhofer, S. Sigg, and V. Mohan, “Adversary models for mobile device authentication,” submitted for review. [ bib ]