Search Results - "Mayrhofer, Rene"

Refine Results
  1. 1

    Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport by Groza, Bogdan, Berdich, Adriana, Jichici, Camil, Mayrhofer, Rene

    Published in IEEE access (2020)
    “…We address the secure pairing of mobile devices based on accelerometer data under various transportation environments, e.g., train, tram, car, bike, walking,…”
    Get full text
    Journal Article
  2. 2

    Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings by Berdich, Adriana, Groza, Bogdan, Levy, Efrat, Shabtai, Asaf, Elovici, Yuval, Mayrhofer, Rene

    Published in IEEE access (2022)
    “…Fingerprinting devices based on unique characteristics of their sensors is an important research direction nowadays due to its immediate impact on…”
    Get full text
    Journal Article
  3. 3

    Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags by Carvalho Ota, Fernando, Roland, Michael, Hölzl, Michael, Mayrhofer, René, Manacero, Aleardo

    Published in Information (Basel) (06-07-2017)
    “…Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However,…”
    Get full text
    Journal Article
  4. 4

    Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation by Mir, Omid, Slamanig, Daniel, Mayrhofer, Rene

    “…Anonymous credential systems allow users to obtain a credential on multiple attributes from an organization and then present it to verifiers in a way that no…”
    Get full text
    Journal Article
  5. 5

    A Survey on Fingerprinting Technologies for Smartphones based on Embedded Transducers by Berdich, Adriana, Groza, Bogdan, Mayrhofer, Rene

    Published in IEEE internet of things journal (15-08-2023)
    “…Smartphones are a vital technology, they improve our social interactions, provide us a great deal of information and bring forth the means to control various…”
    Get full text
    Journal Article
  6. 6

    An architecture for secure mobile devices by Mayrhofer, René

    Published in Security and communication networks (10-07-2015)
    “…Mobile devices such as smart phones have become one of the preferred means of accessing digital services, both for consuming and creating content…”
    Get full text
    Journal Article
  7. 7

    Decentralized, Privacy-Preserving, Single Sign-On by Mir, Omid, Roland, Michael, Mayrhofer, René

    Published in Security and communication networks (22-01-2022)
    “…In current single sign-on authentication schemes on the web, users are required to interact with identity providers securely to set up authentication data…”
    Get full text
    Journal Article
  8. 8

    Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation by Hölzl, Michael, Roland, Michael, Mir, Omid, Mayrhofer, René

    “…Providing methods to anonymously validate user identity is essential in many applications of electronic identity (eID) systems. A feasible approach to realize…”
    Get full text
    Journal Article
  9. 9

    Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks by Aichhorn, Andreas, Etzlinger, Bernhard, Unterweger, Andreas, Mayrhofer, René, Springer, Andreas

    “…In this work we propose a secure communication concept for the protection of critical power supply and distribution infrastructure. Especially, we consider the…”
    Get full text
    Journal Article
  10. 10

    Investigating the impact of network security on the line current differential protection system by Aichhorn, Andreas, Unterweger, Andreas, Mayrhofer, René, Engel, Dominik

    “…This paper analyses the influence of network security measures on the system behaviour of a power system protection device. In this particular case, an…”
    Get full text
    Journal Article
  11. 11

    Security and trust in context-aware applications by Mayrhofer, René, Schmidtke, Hedda R., Sigg, Stephan

    Published in Personal and ubiquitous computing (2014)
    “…Issue Title: Special Issue on Assistive Environments for the Disabled and the Senior Citizens - Theme Issue of PETRA 2010 and 2011 Conferences / Special Issue…”
    Get full text
    Journal Article
  12. 12

    Optimal derotation of shared acceleration time series by determining relative spatial alignment by Mayrhofer, René, Hlavacs, Helmut, Findling, Rainhard Dieter

    “…Purpose – The purpose of this article is to improve detection of common movement. Detecting if two or multiple devices are moved together is an interesting…”
    Get full text
    Journal Article
  13. 13

    Smartphone-Based Gait Recognition: From Authentication to Imitation by Muaaz, Muhammad, Mayrhofer, Rene

    Published in IEEE transactions on mobile computing (01-11-2017)
    “…This work evaluates the security strength of a smartphone-based gait recognition system against zero-effort and live minimal-effort impersonation attacks under…”
    Get full text
    Magazine Article
  14. 14

    Towards an Open Source Toolkit for Ubiquitous Device Authentication by Mayrhofer, R.

    “…Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless…”
    Get full text
    Conference Proceeding
  15. 15

    Only play in your comfort zone: interaction methods for improving security awareness on mobile devices by Riedl, Peter, Mayrhofer, Rene, Möller, Andreas, Kranz, Matthias, Lettner, Florian, Holzmann, Clemens, Koelle, Marion

    Published in Personal and ubiquitous computing (01-08-2015)
    “…In this paper, we study the concept of security zones as an intermediate layer of compartmentalization on mobile devices. Each of these security zones is…”
    Get full text
    Journal Article
  16. 16

    A password-authenticated secure channel for App to Java Card applet communication by Hölzl, Michael, Asnake, Endalkachew, Mayrhofer, Rene, Roland, Michael

    “…Purpose – The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the…”
    Get full text
    Journal Article
  17. 17

    Managing the life cycle of Java Card applets in other Java virtual machines by Roland, Michael, Langer, Josef, Mayrhofer, Rene

    “…Purpose – The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for…”
    Get full text
    Journal Article
  18. 18

    BioDSSL: A Domain Specific Sensor Language for Global, Distributed, Biometric Identification Systems by Hofer, Philipp, Roland, Michael, Mayrhofer, Rene

    “…With biometric identification systems becoming increasingly ubiquitous, their complexity is escalating due to the integration of diverse sensors and…”
    Get full text
    Conference Proceeding
  19. 19

    Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices by Findling, Rainhard Dieter, Mayrhofer, Rene

    “…Purpose - Personal mobile devices currently have access to a significant portion of their user's private sensitive data and are increasingly used for…”
    Get full text
    Journal Article
  20. 20

    Accurate clock synchronization for power systems protection devices over packet switched networks by Aichhorn, Andreas, Etzlinger, Bernhard, Mayrhofer, René, Springer, Andreas

    Published in Computer science (Berlin, Germany) (01-03-2017)
    “…Channel based clock synchronization in packet switched networks (PSNs) is considered for, but not limited to, the time and safety/security critical application…”
    Get full text
    Journal Article