Search Results - "Mayrhofer, Rene"
-
1
Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport
Published in IEEE access (2020)“…We address the secure pairing of mobile devices based on accelerometer data under various transportation environments, e.g., train, tram, car, bike, walking,…”
Get full text
Journal Article -
2
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings
Published in IEEE access (2022)“…Fingerprinting devices based on unique characteristics of their sensors is an important research direction nowadays due to its immediate impact on…”
Get full text
Journal Article -
3
Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags
Published in Information (Basel) (06-07-2017)“…Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However,…”
Get full text
Journal Article -
4
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation
Published in IEEE transactions on dependable and secure computing (01-07-2024)“…Anonymous credential systems allow users to obtain a credential on multiple attributes from an organization and then present it to verifiers in a way that no…”
Get full text
Journal Article -
5
A Survey on Fingerprinting Technologies for Smartphones based on Embedded Transducers
Published in IEEE internet of things journal (15-08-2023)“…Smartphones are a vital technology, they improve our social interactions, provide us a great deal of information and bring forth the means to control various…”
Get full text
Journal Article -
6
An architecture for secure mobile devices
Published in Security and communication networks (10-07-2015)“…Mobile devices such as smart phones have become one of the preferred means of accessing digital services, both for consuming and creating content…”
Get full text
Journal Article -
7
Decentralized, Privacy-Preserving, Single Sign-On
Published in Security and communication networks (22-01-2022)“…In current single sign-on authentication schemes on the web, users are required to interact with identity providers securely to set up authentication data…”
Get full text
Journal Article -
8
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation
Published in International journal of information security (01-08-2020)“…Providing methods to anonymously validate user identity is essential in many applications of electronic identity (eID) systems. A feasible approach to realize…”
Get full text
Journal Article -
9
Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks
Published in International journal of critical infrastructure protection (01-12-2018)“…In this work we propose a secure communication concept for the protection of critical power supply and distribution infrastructure. Especially, we consider the…”
Get full text
Journal Article -
10
Investigating the impact of network security on the line current differential protection system
Published in Journal of engineering (Stevenage, England) (01-10-2018)“…This paper analyses the influence of network security measures on the system behaviour of a power system protection device. In this particular case, an…”
Get full text
Journal Article -
11
Security and trust in context-aware applications
Published in Personal and ubiquitous computing (2014)“…Issue Title: Special Issue on Assistive Environments for the Disabled and the Senior Citizens - Theme Issue of PETRA 2010 and 2011 Conferences / Special Issue…”
Get full text
Journal Article -
12
Optimal derotation of shared acceleration time series by determining relative spatial alignment
Published in International journal of pervasive computing and communications (02-11-2015)“…Purpose – The purpose of this article is to improve detection of common movement. Detecting if two or multiple devices are moved together is an interesting…”
Get full text
Journal Article -
13
Smartphone-Based Gait Recognition: From Authentication to Imitation
Published in IEEE transactions on mobile computing (01-11-2017)“…This work evaluates the security strength of a smartphone-based gait recognition system against zero-effort and live minimal-effort impersonation attacks under…”
Get full text
Magazine Article -
14
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Published in Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07) (01-03-2007)“…Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless…”
Get full text
Conference Proceeding -
15
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Published in Personal and ubiquitous computing (01-08-2015)“…In this paper, we study the concept of security zones as an intermediate layer of compartmentalization on mobile devices. Each of these security zones is…”
Get full text
Journal Article -
16
A password-authenticated secure channel for App to Java Card applet communication
Published in International journal of pervasive computing and communications (02-11-2015)“…Purpose – The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the…”
Get full text
Journal Article -
17
Managing the life cycle of Java Card applets in other Java virtual machines
Published in International journal of pervasive computing and communications (26-08-2014)“…Purpose – The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for…”
Get full text
Journal Article -
18
BioDSSL: A Domain Specific Sensor Language for Global, Distributed, Biometric Identification Systems
Published in 2024 IEEE 12th International Conference on Intelligent Systems (IS) (29-08-2024)“…With biometric identification systems becoming increasingly ubiquitous, their complexity is escalating due to the integration of diverse sensors and…”
Get full text
Conference Proceeding -
19
Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices
Published in International journal of pervasive computing and communications (01-01-2013)“…Purpose - Personal mobile devices currently have access to a significant portion of their user's private sensitive data and are increasingly used for…”
Get full text
Journal Article -
20
Accurate clock synchronization for power systems protection devices over packet switched networks
Published in Computer science (Berlin, Germany) (01-03-2017)“…Channel based clock synchronization in packet switched networks (PSNs) is considered for, but not limited to, the time and safety/security critical application…”
Get full text
Journal Article