Publications

This list of publications is generated automatically from my bibtex file. It should therefore be up-to-date and should contain all relevant data. For a list of citations, see e.g. my ResearchGate, Google Scholar , ACM Authorizer, or Semantic Scholar profiles. If anything is missing, please do not hesitate to contact me. For most of the conference papers, I have also given the presentations, and you can find my associated slides here.

Refereed journal articles

[1] R. Findling, M. Hölzl, and R. Mayrhofer, “Mobile match-on-card authentication using offline-simplified models with gait and face biometrics,” IEEE Transactions on Mobile Computing, March 2018. [ bib | DOI | conference link | www: | Abstract ]
[2] A. Aichhorn, B. Etzlinger, A. Unterweger, R. Mayrhofer, and A. Springer, “Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks,” International Journal of Critical Infrastructure Protection, 2018. [ bib ]
[3] M. Muaaz and R. Mayrhofer, “Smartphone-based gait recognition: From authentication to imitation,” IEEE Transactions on Mobile Computing (IEEE TMC), vol. 16, pp. 3209--3221, November 2017. [ bib | DOI | conference link | .pdf | Abstract ]
[4] R. D. Findling, M. Muaaz, D. Hintze, and R. Mayrhofer, “Shakeunlock: Securely transfer authentication states between mobile devices,” IEEE Transactions on Mobile Computing (IEEE TMC), vol. 16, p. 1175, 04/2017 2017. [ bib | DOI | conference link | .pdf | Abstract ]
[5] P. Riedl, R. Mayrhofer, A. Möller, M. Kranz, F. Lettner, C. Holzmann, and M. Koelle, “Only play in your comfort zone: interaction methods for improving security awareness on mobile devices,” Personal and Ubiquitous Computing, pp. 1--14, March 2015. [ bib | DOI | conference link | .pdf | Abstract ]
[6] R. Mayrhofer, H. Hlavacs, and R. D. Findling, “Optimal derotation of shared acceleration time series by determining relative spatial alignment,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, pp. 454--466, 2015. A preliminary version of this work was published in iiWAS 2014 [?]. [ bib | DOI | Abstract ]
[7] M. K. Chong, R. Mayrhofer, and H. Gellersen, “A survey of user interaction for spontaneous device association,” ACM Computing Surveys, vol. 47, July 2014. accepted for publication on 2014-03-11. [ bib | DOI | conference link | .pdf | Abstract ]
[8] R. Mayrhofer, “An architecture for secure mobile devices,” Security and Communication Networks, 2014. Significantly revised and extended version of [?], accepted for publication on 2014-03-24, online publication 2014-06-17 (AID SEC1028). [ bib | DOI | http | .pdf | Abstract ]
[9] M. Roland, J. Langer, and R. Mayrhofer, “Managing the life cycle of java card applets in other java virtual machines,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 10, pp. 291--312, 2014. A preliminary version of this work was published in MoMM 2013 [?]. [ bib | DOI | conference link | .pdf | Abstract ]
[10] R. Mayrhofer, J. Fuss, and I. Ion, “UACAP: A unified auxiliary channel authentication protocol,” IEEE Transactions on Mobile Computing, vol. 12, pp. 710--721, April 2013. [ bib | DOI | conference link | .pdf | Abstract ]
[11] R. Findling and R. Mayrhofer, “Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 9, pp. 190--208, 2013. A preliminary version of this work was published in MoMM 2012 [?] with a limited set of classifiers and a significantly smaller data set used for evaluation. [ bib | DOI | conference link | .pdf | Abstract ]
[12] R. Mayrhofer, A. Sommer, and S. Saral, “Air-writing: A platform for scalable, privacy-preserving, spatial group messaging,” International Journal of Pervasive Computing and Communications (IJPCC), vol. 8, pp. 53--78, 2012. A preliminary version of this work was published in iiWAS 2010 [?]. [ bib | DOI | conference link | .pdf | Abstract ]
[13] R. Mayrhofer and H. Gellersen, “Shake well before use: Intuitive and secure pairing of mobile devices,” IEEE Transactions on Mobile Computing, vol. 8, pp. 792--806, June 2009. revised and extended version of [?]. [ bib | conference link | .pdf | Abstract ]
[14] R. Mayrhofer and H. Gellersen, “Spontaneous mobile device authentication based on sensor data,” Information Security Technical Report, vol. 13, pp. 136--150, August 2008. presents a summary and extension of four previous conference papers [?]. [ bib | DOI | conference link | .pdf | Abstract ]
[15] A. Ferscha, M. Hechinger, A. Riener, M. dos Santos Rocha, A. Zeidler, M. Franz, and R. Mayrhofer, “Peer-it: Stick-on solutions for networks of things,” Pervasive and Mobile Computing, pp. 448--479, 2008. [ bib ]
[16] A. Ferscha, M. Hechinger, M. dos Santos Rocha, R. Mayrhofer, A. Zeidler, A. Riener, and M. Franz, “Building flexible manufacturing systems based on peer-its,” EURASIP Journal on Embedded Systems, vol. 2008, 2008. Article ID 267560. [ bib | DOI | http ]
[17] R. Mayrhofer and R. Gostner, “Using a spatial context authentication proxy for establishing secure wireless connections,” Journal of Mobile Multimedia, vol. 3, pp. 198--217, March 2007. [ bib | .pdf | Abstract ]
[18] R. Mayrhofer, H. Radi, and A. Ferscha, “Recognizing and predicting context by learning from user behavior,” Radiomatics: Journal of Communication Engineering, special issue on Advances in Mobile Multimedia, vol. 1, pp. 30--42, May 2004. extended version of [?]. [ bib | .pdf | Abstract ]
[19] A. Ferscha, M. Hechinger, R. Mayrhofer, and R. Oberhauser, “A peer-to-peer light-weight component model for context-aware smart space applications,” International Journal of Wireless and Mobile Computing (IJWMC), special issue on Mobile Distributed Computing, 2004. extended version of [?]. [ bib | .pdf | Abstract ]
[20] R. Mayrhofer, S. Sigg, and V. Mohan, “Adversary models for mobile device authentication,” submitted for review. [ bib ]

Refereed papers

[1] M. Rigger, R. Schatz, R. Mayrhofer, M. Grimmer, and H. Mössenböck, “Sulong, and thanks for all the bugs: Finding errors in c programs by abstracting from the native execution model,” in Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2018, 2018. [ bib | DOI ]
[2] M. Muaaz and R. Mayrhofer, “Accelerometer based gait recognition using adapted gaussian mixture models,” in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), (Singapore), pp. 288--291, ACM, 11/2016 2016. [ bib | DOI ]
[3] G. Schoiber, R. Mayrhofer, and M. Hölzl, “DAMN - a debugging and manipulation tool for android applications,” in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), (Singapore), pp. 40--44, ACM, ACM, 11/2016 2016. [ bib | DOI ]
[4] M. Hölzl, M. Roland, and R. Mayrhofer, “Real-world identification: Towards a privacy-aware mobile eID for physical and offline verification,” in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), (Singapore), p. 280–283, ACM, ACM, 11/2016 2016. [ bib | DOI | Abstract ]
[5] R. D. Findling, M. Hölzl, and R. Mayrhofer, “Mobile gait match-on-card authentication from acceleration data with offline-simplified models,” in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), (Singapore), pp. 250--260, ACM, ACM, 11/2016 2016. [ bib | DOI | Abstract ]
[6] D. Hintze, S. Scholz, E. Koch, and R. Mayrhofer, “Location-based risk assessment for mobile authentication,” in 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016, (Heidelberg, Germany), pp. 85--88, ACM, ACM, 09/2016 2016. [ bib | DOI | Abstract ]
[7] D. Hintze, R. D. Findling, M. Muaaz, E. Koch, and R. Mayrhofer, “CORMORANT: Towards continuous risk-aware multi-modal cross-device authentication,” in Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers: Adjunct Publication (UbiComp 2015), UbiComp '15, (New York, NY, USA), pp. 169--172, ACM, 2015. [ bib | DOI | http ]
[8] D. Hintze, M. Muaaz, R. D. Findling, S. Scholz, E. Koch, and R. Mayrhofer, “Confidence and risk estimation plugins for multi-modal authentication on mobile devices using CORMORANT,” in 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2015), (Brussels, Belgium), p. 384–388, ACM, ACM, 12/2015 2015. [ bib | DOI | Abstract ]
[9] M. Muaaz and R. Mayrhofer, “Cross pocket gait authentication using mobile phone based accelerometer sensor,” in Proc. EUROCAST 2015: 15th International Conference on Computer Aided Systems Theory, LNCS, pp. 731--738, Feb. 2015. [ bib | DOI ]
[10] R. D. Findling and R. Mayrhofer, “Towards device-to-user authentication: Protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns,” in Proc. MUM 2015: 14th International Conference on Mobile and Ubiquitous Multimedia, ACM, Dec. 2015. [ bib | Abstract ]
[11] D. Hintze, R. D. Findling, S. Scholz, and R. Mayrhofer, “Mobile device usage characteristics: The effect of context and form factor on locked and unlocked usage,” in Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 105--114, ACM Press, December 2014. [ bib | DOI | conference link | .pdf | Abstract ]
[12] M. Muaaz and R. Mayrhofer, “Orientation independent cell phone based gait authentication,” in Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 161--164, ACM Press, December 2014. [ bib | DOI | conference link | .pdf | Abstract ]
[13] R. D. Findling, M. Muaaz, D. Hintze, and R. Mayrhofer, “Shakeunlock: Securely unlock mobile devices by shaking them together,” in Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 165--174, ACM Press, December 2014. awarded best MoMM 2014 paper. [ bib | DOI | conference link | .pdf | Abstract ]
[14] R. Mayrhofer, H. Hlavacs, and R. D. Findling, “Optimal derotation of shared acceleration time series by determining relative spatial alignment,” in Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services, (New York, NY, USA), pp. 71--78, ACM Press, December 2014. awarded best iiWAS 2014 paper. [ bib | conference link | .pdf | Abstract ]
[15] D. Hintze, R. D. Findling, M. Muaaz, S. Scholz, and R. Mayrhofer, “Diversity in locked and unlocked mobile device usage,” in Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014), pp. 379--384, ACM Press, 2014. winner of UbiComp/ISWC 2014 Programming Competition. [ bib | DOI | conference link | http | Abstract ]
[16] M. Hölzl, E. Asnake, R. Mayrhofer, and M. Roland, “Mobile application to java card applet communication using a password-authenticated secure channel,” in Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 147--156, ACM Press, Dec. 2014. [ bib | DOI | conference link | .pdf | Abstract ]
[17] J. González, M. Hölzl, P. Riedl, P. Bonnet, and R. Mayrhofer, “A practical hardware-assisted approach to customize trusted boot for mobile devices,” in Information Security Conference (ISC 2014), (Hong Kong), Springer International Publishing, Springer International Publishing, 2014. [ bib ]
[18] R. Findling, F. Wenny, C. Holzmann, and R. Mayrhofer, “Range face segmentation: Face detection and segmentation for authentication in mobile device range images,” in Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 260--269, ACM Press, December 2013. [ bib | conference link | .pdf | Abstract ]
[19] M. Hölzl, R. Mayrhofer, and M. Roland, “Requirements for an open ecosystem for embedded tamper resistant hardware on mobile devices,” in Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 249--252, ACM Press, December 2013. [ bib | conference link | .pdf | Abstract ]
[20] M. Muaaz and R. Mayrhofer, “An analysis of different approaches to gait recognition using cell phone based accelerometer,” in Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 293--300, ACM Press, December 2013. [ bib | conference link | .pdf ]
[21] P. Riedl, P. Koller, R. Mayrhofer, M. Kranz, A. Möller, and M. Koelle, “Visualizations and switching mechanisms for security zones,” in Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 278--281, ACM Press, December 2013. [ bib | conference link | .pdf ]
[22] M. Roland, J. Langer, and R. Mayrhofer, “(ab)using foreign vms: Running java card applets in non-java card virtual machines,” in Proc. MoMM 2013: 11th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 286--292, ACM Press, December 2013. [ bib | conference link | .pdf ]
[23] R. Mayrhofer, “When users cannot verify digital signatures: On the difficulties of securing mobile devices,” in Proc. HPCC 2013: 15th IEEE International Conference on High Performance Computing and Communications, (Washington, DC, USA), pp. 1579--1584, IEEE CS Press, November 2013. [ bib | conference link | .pdf ]
[24] R. Findling and R. Mayrhofer, “Towards secure personal device unlock using stereo camera pan shots,” in Proc. EUROCAST 2013: 14th International Conference on ComputerAided Systems Theory, LNCS, (Berlin, Heidelberg, Wien), pp. 417--425, Springer-Verlag, February 2013. [ bib | conference link | .pdf ]
[25] R. Findling and R. Mayrhofer, “Towards face unlock: On the difficulty of reliably detecting faces on mobile phones,” in Proc. MoMM 2012: 10th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), ACM Press, December 2012. [ bib | conference link | .pdf ]
[26] B. Groza and R. Mayrhofer, “SAPHE - simple accelerometer based wireless pairing with heuristic trees,” in Proc. MoMM 2012: 10th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 161--168, ACM Press, December 2012. [ bib | conference link | .pdf ]
[27] R. Mayrhofer and T. Kaiser, “Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets,” in Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2012, June 2012. available online at http://www.medien.ifi.lmu.de/iwssi2011/. [ bib | conference link | .pdf | Abstract ]
[28] P. Riedl and R. Mayrhofer, “Towards a practical, scalable self-localization system for Android phones based on WLAN fingerprinting,” in Proc. ICDCSW 2012: 32nd International Conference on Distributed Computing Systems Workshops, (Washington, DC, USA), pp. 98--101, IEEE CS Press, June 2012. [ bib | DOI | .pdf | Abstract ]
[29] M. Tschernuth, M. Lettner, and R. Mayrhofer, “Unify localization using user interface description languages and a navigation context-aware translation tool,” in Proc. EICS 2012: 4th ACM SIGCHI symposium on Engineering interactive computing systems, pp. 179--188, ACM, June 2012. [ bib | DOI | conference link | Abstract ]
[30] P. Klingelhuber and R. Mayrhofer, “Private Notes: Encrypted xml notes synchronization and sharing with untrusted web services,” in Proc. iiWAS2011: 13th International Conference on Information Integration and Web-based Applications & Services, (New York, NY, USA), ACM Press, December 2011. [ bib | conference link | .pdf | Abstract ]
[31] M. Lettner, M. Tschernuth, and R. Mayrhofer, “Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components,” in Proc. MoMM 2011: 9th International Conference on Advances in Mobile Computing and Multimedia, (New York, NY, USA), pp. 268--272, ACM Press, December 2011. [ bib ]
[32] M. Lettner, M. Tschernuth, and R. Mayrhofer, “A critical review of applied mda for embedded devices: Identification of problem classes and discussing porting efforts in practice,” in Proc. MODELS 2011: ACM/IEEE 14th International Conference on Model Driven Engineering Languages and Systems, LNCS, (Berlin, Heidelberg, Wien), Springer-Verlag, October 2011. [ bib | conference link | Abstract ]
[33] S. Höbarth and R. Mayrhofer, “A framework for on-device privilege escalation exploit execution on Android,” in Proc. IWSSI/SPMU 2011: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2011, June 2011. [ bib | conference link | .pdf | Abstract ]
[34] M. Lettner, M. Tschernuth, and R. Mayrhofer, “Mobile platform architecture review: Android, iPhone, Qt,” in Proc. EUROCAST 2011: 13th International Conference on Computer Aided Systems Theory, Part II, vol. 6928 of LNCS, (Berlin, Heidelberg, Wien), pp. 545--552, Springer-Verlag, February 2011. [ bib | conference link | .pdf ]
[35] R. Mayrhofer and C. Holzmann, “Friends Radar: Towards a private P2P location sharing platform,” in Proc. EUROCAST 2011: 13th International Conference on Computer Aided Systems Theory, Part II, vol. 6928 of LNCS, (Berlin, Heidelberg, Wien), pp. 528--536, Springer-Verlag, February 2011. [ bib | conference link | .pdf ]
[36] M. Tschernuth, M. Lettner, and R. Mayrhofer, “Evaluation of descriptive user interface methodologies for mobile devices,” in Proc. EUROCAST 2011: 13th International Conference on Computer Aided Systems Theory, Part II, vol. 6928 of LNCS, (Berlin, Heidelberg, Wien), pp. 520--527, Springer-Verlag, February 2011. [ bib | conference link | .pdf ]
[37] R. Mayrhofer, A. Sommer, and S. Saral, “Air-Writing: A platform for scalable, privacy-preserving, spatial group messaging,” in Proc. iiWAS2010: 12th International Conference on Information Integration and Web-based Applications & Services, (New York, NY, USA), pp. 181--189, ACM Press, November 2010. [ bib | conference link | .pdf | Abstract ]
[38] V. Kumar, A. Fensel, S. Tomic, R. Mayrhofer, and T. Pellegrini, “User created machine-readable policies for energy efficiency in smart homes,” in Proc. UCSE 2010, co-located with Ubicomp 2010, September 2010. [ bib | conference link | .pdf | Abstract ]
[39] R. Mayrhofer, S. Winkler, H. Hlavacs, M. Affenzeller, and S. Schneider, “On structural identification of 2d regression functions for in-door bluetooth localization,” in Proc. EUROCAST 2009, vol. 5717 of LNCS, (Berlin, Heidelberg, Wien), pp. 801--808, Springer-Verlag, February 2009. [ bib | .pdf ]
[40] H. Radi and R. Mayrhofer, “Towards alternative user interfaces for capturing and managing tasks with mobile devices,” in Proc. MoMM 2008: 6th International Conference on Advances in Mobile Computing and Multimedia, pp. 272--275, November 2008. [ bib | conference link | .pdf | Abstract ]
[41] R. Mayrhofer and H. Gellersen, “Shake well before use: two implementations for implicit context authentication,” in Adjunct Proc. Ubicomp 2007, pp. 72--75, September 2007. [ bib | conference link | .pdf | Abstract ]
[42] R. Mayrhofer, H. Gellersen, and M. Hazas, “Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction,” in Proc. Ubicomp 2007: 9th International Conference on Ubiquitous Computing, vol. 4717 of LNCS, (Berlin, Heidelberg, Wien), pp. 199--216, Springer-Verlag, September 2007. [ bib | conference link | .pdf | Abstract ]
[43] R. Mayrhofer, “The candidate key protocol for generating secret shared keys from similar sensor data streams,” in Proc. ESAS 2007: 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks, vol. 4572 of LNCS, (Berlin, Heidelberg, Wien), pp. 1--15, Springer-Verlag, July 2007. [ bib | conference link | .pdf | Abstract ]
[44] R. Mayrhofer and H. Gellersen, “Shake well before use: Authentication based on accelerometer data,” in Proc. Pervasive 2007: 5th International Conference on Pervasive Computing, vol. 4480 of LNCS, (Berlin, Heidelberg, Wien), pp. 144--161, Springer-Verlag, May 2007. awarded best Pervasive 2007 paper. [ bib | conference link | .pdf | Abstract ]
[45] R. Mayrhofer and M. Welch, “A human-verifiable authentication protocol using visible laser light,” in Proc. ARES 2007: 2nd International Conference on Availability, Reliability and Security, (Washington, DC, USA), pp. 1143--1147, IEEE CS Press, April 2007. [ bib | conference link | .pdf | Abstract ]
[46] R. Mayrhofer, “Towards an open source toolkit for ubiquitous device authentication,” in Workshops Proc. PerCom 2007: 5th IEEE International Conference on Pervasive Computing and Communications, (Washington, DC, USA), pp. 247--252, IEEE CS Press, March 2007. Track PerSec 2007: 4th IEEE International Workshop on Pervasive Computing and Communication Security. [ bib | conference link | .pdf | Abstract ]
[47] R. Mayrhofer and H. Gellersen, “On the security of ultrasound as out-of-band channel,” in Proc. IPDPS 2007: 21st IEEE International Parallel and Distributed Processing Symposium, (Washington, DC, USA), p. 321, IEEE CS Press, March 2007. Track SSN 2007: 3rd International Workshop on Security in Systems and Networks. [ bib | conference link | .pdf | Abstract ]
[48] R. Mayrhofer, “Extending the growing neural gas classifier for context recognition,” in Proc. EUROCAST 2007: 11th International Conference on Computer Aided Systems Theory, vol. 4739 of LNCS, (Berlin, Heidelberg, Wien), pp. 920--927, Springer-Verlag, February 2007. [ bib | conference link | .pdf | Abstract ]
[49] R. Mayrhofer, “A context authentication proxy for IPSec using spatial reference,” in Proc. TwUC 2006: 1st International Workshop on Trustworthy Ubiquitous Computing, pp. 449--462, Austrian Computer Society (OCG), December 2006. awarded best iiWAS/MoMM 2006 workshop paper. [ bib | conference link | .pdf | Abstract ]
[50] R. Mayrhofer, “Technische Hintergründe für das rechtliche Handeln im Internet,” in Aktuelles zum Internet-Recht, pp. 1--16, proLibris.at, December 2005. [ bib | conference link | .pdf | Abstract ]
[51] A. Ferscha, M. Hechinger, R. Mayrhofer, E. Chtcherbina, M. Franz, M. dos Santos Rocha, and A. Zeidler, “Bridging the gap with P2P patterns,” in Proceedings of the Workshop on Smart Object Systems, September 2005. in conjunction with the Seventh International Conference on Ubiquitous Computing (UbiComp 2005). [ bib | conference link | .pdf | Abstract ]
[52] R. Mayrhofer, “Context prediction based on context histories: Expected benefits, issues and current state-of-the-art,” in Proc. ECHISE 2005: 1st International Workshop on Exploiting Context Histories in Smart Environments (T. Prante, B. Meyers, G. Fitzpatrick, and L. D. Harvel, eds.), May 2005. part of the Third International Conference on Pervasive Computing (PERVASIVE 2005). [ bib | conference link | .pdf | Abstract ]
[53] R. Mayrhofer, “Eine Architektur zur Kontextvorhersage,” in Ausgezeichnete Informatikdissertationen 2004, vol. D-5 of Series of the German Informatics society (GI), pp. 125--134, Lecture Notes in Informatics (LNI), May 2005. [ bib | .pdf | Abstract ]
[54] A. Ferscha, M. Hechinger, R. Mayrhofer, M. dos Santos Rocha, M. Franz, and R. Oberhauser, “Digital Aura,” in Advances in Pervasive Computing (A. Ferscha, H. Hörtner, and G. Kotsis, eds.), vol. 176, pp. 405--410, Austrian Computer Society (OCG), April 2004. part of the Second International Conference on Pervasive Computing (Pervasive 2004). [ bib | conference link | video | .pdf | Abstract ]
[55] R. Mayrhofer, “An architecture for context prediction,” in Advances in Pervasive Computing (A. Ferscha, H. Hörtner, and G. Kotsis, eds.), vol. 176, pp. 65--72, Austrian Computer Society (OCG), April 2004. part of the Second International Conference on Pervasive Computing (PERVASIVE 2004). [ bib | conference link | .pdf | Abstract ]
[56] R. Mayrhofer, H. Radi, and A. Ferscha, “A context prediction code and data base,” in Proceedings of the Benchmarks and a Database for Context Recognition Workshop (H. Junker, P. Lukowicz, and J. Mäntyjarvi, eds.), pp. 20--26, ETH Zurich, April 2004. part of the Second International Conference on Pervasive Computing (PERVASIVE 2004). [ bib | conference link | .pdf | Abstract ]
[57] H. Radi, R. Mayrhofer, and A. Ferscha, “A notebook sensory data set for context recognition,” in Proceedings of the Benchmarks and a Database for Context Recognition Workshop (H. Junker, P. Lukowicz, and J. Mäntyjarvi, eds.), pp. 17--19, ETH Zurich, April 2004. part of the Second International Conference on Pervasive Computing (PERVASIVE 2004). [ bib | conference link | .pdf | Abstract ]
[58] A. Ferscha, M. Hechinger, R. Mayrhofer, and R. Oberhauser, “A light-weight component model for peer-to-peer applications,” in Proceedings MDC04: 2nd International Workshop on Mobile Distributed Computing, (Washington, DC, USA), pp. 520--527, IEEE CS Press, March 2004. [ bib | conference link | .pdf | Abstract ]
[59] R. Mayrhofer, H. Radi, and A. Ferscha, “Feature extraction in wireless personal and local area networks,” in Proc. MWCN 2003: 5th International Conference on Mobile and Wireless Communications Networks, pp. 195--198, World Scientific, October 2003. [ bib | conference link | .pdf | Abstract ]
[60] R. Mayrhofer, H. Radi, and A. Ferscha, “Recognizing and predicting context by learning from user behavior,” in Proc. MoMM 2003: 1st International Conference On Advances in Mobile Multimedia (W. S. G. Kotsis, A. Ferscha and K. Ibrahim, eds.), vol. 171, pp. 25--35, Austrian Computer Society (OCG), September 2003. [ bib | conference link | http | .pdf | Abstract ]
[61] R. Mayrhofer, F. Ortner, A. Ferscha, and M. Hechinger, “Securing passive objects in mobile ad-hoc peer-to-peer networks,” in Electronic Notes in Theoretical Computer Science (R. Focardi and G. Zavattaro, eds.), vol. 85.3, Elsevier Science, June 2003. [ bib | conference link | .pdf | Abstract ]
[62] R. Mayrhofer, M. Affenzeller, H. Prähofer, G. Höfer, and A. Fried, “DEVS simulation of spiking neural networks,” in Cybernetics and Systems: Proc. EMCSR 2002: 16th European Meeting on Cybernetics and Systems Research (R. Trappl, ed.), vol. 2, pp. 573--578, Austrian Society for Cybernetic Studies, April 2002. [ bib | conference link | .ps | Abstract ]
[63] M. Affenzeller and R. Mayrhofer, “Generic heuristics for combinatorial optimization problems,” in Proceedings of the 9th International Conference on Operational Research (KOI2002), pp. 83--92, 2002. [ bib | .ps ]

Books

[1] H. R. Schmidtke, S. Sigg, and R. Mayrhofer, eds., Special Issue on Security and Trust in Context-Aware Applications. No. 1 in Personal and Ubiquitous Computing, Berlin, Heidelberg, Wien: Springer-Verlag, January 2014. [ bib | conference link | .pdf ]
[2] L. L. Chen, R. Mayrhofer, and M. Steinbauer, eds., Special Issue: The confluence and synergy of mobile computing and multimedia with pervasive computing and communication, vol. 10 of International Journal of Pervasive Computing and Communications. Emerald, January 2014. [ bib | conference link | Abstract ]
[3] R. Mayrhofer, K. Nyberg, and T. Kindberg, eds., Special Issue: Secure Spontaneous Interaction. International Journal on Security and Networks, Inderscience, 2009. [ bib ]
[4] R. Mayrhofer and K. Nyberg, eds., Proc. IWSSI 2007: First International Workshop on Security for Spontaneous Interaction (part of Adjunct Proc. Ubicomp 2007), September 2007. available online at http://www.comp.lancs.ac.uk/iwssi2007/. [ bib | conference link ]
[5] A. Ferscha, R. Mayrhofer, T. Strang, B. Linnhoff-Popien, A. Dey, and A. Butz, eds., Advances in Pervasive Computing: Adjunct Proceedings of the 3rd International Conference on Pervasive Computing, vol. 191, Austrian Computer Society (OCG), May 2005. available online at http://www.pervasive.ifi.lmu.de/. [ bib | conference link ]
[6] R. Mayrhofer, An Architecture for Context Prediction, vol. C 45 of Schriften der Johannes-Kepler-Universität Linz. Trauner Verlag, April 2005. revised version of [?]. [ bib ]

Theses

[1] R. Mayrhofer, “Ubiquitous computing security: Authenticating spontaneous interactions,” September 2008. Habilitation thesis, University of Vienna. [ bib | .pdf | Abstract ]
[2] R. Mayrhofer, An Architecture for Context Prediction. PhD thesis, Johannes Kepler University of Linz, Austria, October 2004. [ bib | .pdf | Abstract ]
[3] R. Mayrhofer, “A new approach to a fast simulation of spiking neural networks,” Master's thesis, Johannes Kepler University of Linz, Austria, July 2002. [ bib | .pdf | Abstract ]

Other (not refereed)

[1] R. Mayrhofer and I. Ion, “OpenUAT: The open source ubiquitous authentication toolkit,” Tech. Rep. 657, ETH Zurich, August 2010. [ bib | conference link | .pdf | Abstract ]
[2] R. Mayrhofer, H. Gellersen, and M. Hazas, “An authentication protocol using ultrasonic ranging,” Tech. Rep. COMP-002-2006, Lancaster University, October 2006. [ bib | http | .pdf | Abstract ]
[3] A. Ferscha, M. Hechinger, and R. Mayrhofer, “The peer-to-peer coordination framework --- architecture reference,” tech. rep., Johannes Kepler Universität Linz, Institut für Pervasive Computing, 2004. [ bib ]
This page was last modified on 2016-09-29