Josef Ressel Center for User-friendly Secure Mobile Environments
Michael Roland
Primary tabs
Filters: Author is Michael Roland
“Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs”, in Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC '18), Pau, France, 2018, pp. 1601–1609.
, “AmDL Framework: APDU Protocol Reference”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
, “AmDL Framework: API Design Documentation”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
, “AmDL Protocol Design”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
, “Extensibility in a Privacy-preserving eID: Towards a Mobile eID System for Real-world Identification and Offline Verification”, in 12th IFIP International Summer School on Privacy and Identity Management – Pre-proceedings, 2017.
, “An Extensible and Privacy-preserving Mobile eID System for Real-world Identification and Offline Verification”, in 12th IFIP International Summer School on Privacy and Identity Management – Extended Abstracts, 2017.
, “Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags”, Information, vol. 8, no. 3:81, 2017.
, “User-friendly Secure Mobile Environments (Final Report for JRC u’smile)”, University of Applied Sciences Upper Austria and SBA Research, JR-Center u'smile, Hagenberg, 2017.
, “Executing Arbitrary Code in the Context of the Smartcard System Service”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1601.05833 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2016. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service (V2.0, Jan 2016).pdf (1.07 MB)
, “Open Mobile API: Accessing the UICC on Android Devices”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1601.03027 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2016. Roland, Hoelzl - Open Mobile API - Accessing the UICC on Android Devices (Jan 2016).pdf (1.04 MB)
, “Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 280-283. p280-holzl.pdf (200.75 KB)
, “Evaluation of Contactless Smartcard Antennas”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, arXiv:1507.06427 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2015. Roland, Hoelzl - Evaluation of Contactless Smartcard Antennas (Jun 2015).pdf (4.6 MB)
, “A Password-authenticated Secure Channel for App to Java Card Applet Communication”, International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, no. 4, 2015.
, “Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia”, 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15). ACM, Linz, Austria, p. 443, 2015.
, Security Issues in Mobile NFC Devices. Cham: Springer, 2015, p. 185.
, “Managing the life cycle of Java Card applets in other Java virtual machines”, International Journal of Pervasive Computing and Communications, vol. 10, no. 3, pp. 291–312, 2014.
, “Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel”, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), 2014.
, “(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), 2013, pp. 286–292.
, “Applying Relay Attacks to Google Wallet”, in Proceedings of the Fifth International Workshop on Near Field Communication (NFC 2013), Zurich, Switzerland, 2013.
, “Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices”, e & i Elektrotechnik und Informationstechnik, vol. 130, no. 7, pp. 201–206, 2013.
, “Debugging and Rapid Prototyping of NFC Secure Element Applications”, in Mobile Computing, Applications, and Services (MobiCASE 2013), 2013, vol. 130/2014, LNICST, pp. 298–313.
, “Requirements Analysis for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, 2013, pp. 249–252.
, “Security Issues in Mobile NFC Devices”, Johannes Kepler University Linz, Department of Computational Perception, Linz, Austria, 2013.
, “Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack”, University of Applied Sciences Upper Austria, Hagenberg, arXiv:1209.0875 [cs.CR], Computing Research Repository (CoRR), arXiv.org/corr, 2012.
, “Practical Attack Scenarios on Secure Element-enabled Mobile Devices”, in Proceedings of the Fourth International Workshop on Near Field Communication (NFC 2012), Helsinki, Finland, 2012, pp. 19–24.
, “Relay Attacks on Secure Element-enabled Mobile Devices: Virtual Pickpocketing Revisited”, in Information Security and Privacy Research, Heraklion, Creete, Greece, 2012, vol. IFIP AICT 376/2012, pp. 1–12.
, “Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?”, in 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, Newcastle, UK, 2012.
,