[1]
|
R. Findling, M. Hölzl, and R. Mayrhofer, “Mobile match-on-card
authentication using offline-simplified models with gait and face
biometrics,” IEEE Transactions on Mobile Computing, March 2018.
[ bib |
DOI |
conference link |
www: |
Abstract ]
|
[2]
|
A. Aichhorn, B. Etzlinger, A. Unterweger, R. Mayrhofer, and A. Springer,
“Design, implementation, and evaluation of secure communication for line
current differential protection systems over packet switched networks,”
International Journal of Critical Infrastructure Protection, 2018.
[ bib ]
|
[3]
|
M. Muaaz and R. Mayrhofer, “Smartphone-based gait recognition: From
authentication to imitation,” IEEE Transactions on Mobile Computing
(IEEE TMC), vol. 16, pp. 3209--3221, November 2017.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[4]
|
R. D. Findling, M. Muaaz, D. Hintze, and R. Mayrhofer, “Shakeunlock: Securely
transfer authentication states between mobile devices,” IEEE
Transactions on Mobile Computing (IEEE TMC), vol. 16, p. 1175, 04/2017 2017.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[5]
|
P. Riedl, R. Mayrhofer, A. Möller, M. Kranz, F. Lettner, C. Holzmann, and
M. Koelle, “Only play in your comfort zone: interaction methods for
improving security awareness on mobile devices,” Personal and
Ubiquitous Computing, pp. 1--14, March 2015.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[6]
|
R. Mayrhofer, H. Hlavacs, and R. D. Findling, “Optimal derotation of shared
acceleration time series by determining relative spatial alignment,”
International Journal of Pervasive Computing and Communications (IJPCC),
vol. 11, pp. 454--466, 2015.
A preliminary version of this work was published in
iiWAS 2014 [?].
[ bib |
DOI |
Abstract ]
|
[7]
|
M. K. Chong, R. Mayrhofer, and H. Gellersen, “A survey of user interaction for
spontaneous device association,” ACM Computing Surveys, vol. 47, July
2014.
accepted for publication on 2014-03-11.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[8]
|
R. Mayrhofer, “An architecture for secure mobile devices,” Security and
Communication Networks, 2014.
Significantly revised and extended version of [?],
accepted for publication on 2014-03-24, online publication 2014-06-17 (AID
SEC1028).
[ bib |
DOI |
http |
.pdf |
Abstract ]
|
[9]
|
M. Roland, J. Langer, and R. Mayrhofer, “Managing the life cycle of java card
applets in other java virtual machines,” International Journal of
Pervasive Computing and Communications (IJPCC), vol. 10, pp. 291--312, 2014.
A preliminary version of this work was published in
MoMM 2013 [?].
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[10]
|
R. Mayrhofer, J. Fuss, and I. Ion, “UACAP: A unified auxiliary channel
authentication protocol,” IEEE Transactions on Mobile Computing,
vol. 12, pp. 710--721, April 2013.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[11]
|
R. Findling and R. Mayrhofer, “Towards pan shot face unlock: Using biometric
face information from different perspectives to unlock mobile devices,”
International Journal of Pervasive Computing and Communications (IJPCC),
vol. 9, pp. 190--208, 2013.
A preliminary version of this work was published in MoMM
2012 [?] with a limited set of classifiers
and a significantly smaller data set used for evaluation.
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[12]
|
R. Mayrhofer, A. Sommer, and S. Saral, “Air-writing: A platform for scalable,
privacy-preserving, spatial group messaging,” International Journal of
Pervasive Computing and Communications (IJPCC), vol. 8, pp. 53--78, 2012.
A preliminary version of this work was published in iiWAS
2010 [?].
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[13]
|
R. Mayrhofer and H. Gellersen, “Shake well before use: Intuitive and secure
pairing of mobile devices,” IEEE Transactions on Mobile Computing,
vol. 8, pp. 792--806, June 2009.
revised and extended version of [?].
[ bib |
conference link |
.pdf |
Abstract ]
|
[14]
|
R. Mayrhofer and H. Gellersen, “Spontaneous mobile device authentication based
on sensor data,” Information Security Technical Report, vol. 13,
pp. 136--150, August 2008.
presents a summary and extension of four previous conference
papers [?].
[ bib |
DOI |
conference link |
.pdf |
Abstract ]
|
[15]
|
A. Ferscha, M. Hechinger, A. Riener, M. dos Santos Rocha, A. Zeidler, M. Franz,
and R. Mayrhofer, “Peer-it: Stick-on solutions for networks of things,”
Pervasive and Mobile Computing, pp. 448--479, 2008.
[ bib ]
|
[16]
|
A. Ferscha, M. Hechinger, M. dos Santos Rocha, R. Mayrhofer, A. Zeidler,
A. Riener, and M. Franz, “Building flexible manufacturing systems based on
peer-its,” EURASIP Journal on Embedded Systems, vol. 2008, 2008.
Article ID 267560.
[ bib |
DOI |
http ]
|
[17]
|
R. Mayrhofer and R. Gostner, “Using a spatial context authentication proxy for
establishing secure wireless connections,” Journal of Mobile
Multimedia, vol. 3, pp. 198--217, March 2007.
[ bib |
.pdf |
Abstract ]
|
[18]
|
R. Mayrhofer, H. Radi, and A. Ferscha, “Recognizing and predicting context by
learning from user behavior,” Radiomatics: Journal of Communication
Engineering, special issue on Advances in Mobile Multimedia, vol. 1,
pp. 30--42, May 2004.
extended version of [?].
[ bib |
.pdf |
Abstract ]
|
[19]
|
A. Ferscha, M. Hechinger, R. Mayrhofer, and R. Oberhauser, “A peer-to-peer
light-weight component model for context-aware smart space applications,”
International Journal of Wireless and Mobile Computing (IJWMC),
special issue on Mobile Distributed Computing, 2004.
extended version of [?].
[ bib |
.pdf |
Abstract ]
|
[20]
|
R. Mayrhofer, S. Sigg, and V. Mohan, “Adversary models for mobile device
authentication,”
submitted for review.
[ bib ]
|