Josef Ressel Center for User-friendly Secure Mobile Environments
René Mayrhofer
Primary tabs
Filters: Author is René Mayrhofer
“Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs”, in Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC '18), Pau, France, 2018, pp. 1601–1609.
, “Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics”, IEEE Transactions on Mobile Computing (TMC), vol. 17, no. 11, pp. 2578–2590, 2018. Findling_18_MobileMatchon.pdf (1.48 MB)
, “Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers”, in Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 2018.
, “AmDL Framework: API Design Documentation”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2017.
, “Extensibility in a Privacy-preserving eID: Towards a Mobile eID System for Real-world Identification and Offline Verification”, in 12th IFIP International Summer School on Privacy and Identity Management – Pre-proceedings, 2017.
, “An Extensible and Privacy-preserving Mobile eID System for Real-world Identification and Offline Verification”, in 12th IFIP International Summer School on Privacy and Identity Management – Extended Abstracts, 2017.
, “A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics”, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 1, no. 2, 2017. Hintze_17_LargeScaleLong.pdf (1.34 MB)
, “Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags”, Information, vol. 8, no. 3:81, 2017.
, “ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices”, IEEE Transactions on Mobile Computing (IEEE TMC), vol. 16, no. 4, p. 1175, 2017. findling2017shake.pdf (6.54 MB)
, “Smartphone-based Gait Recognition: From Authentication to Imitation”, IEEE Transactions on Mobile Computing, 2017.
, “User-friendly Secure Mobile Environments (Final Report for JRC u’smile)”, University of Applied Sciences Upper Austria and SBA Research, JR-Center u'smile, Hagenberg, 2017.
, “Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 288-291. p288-muaaz.pdf (507.06 KB)
, “DAMN - A Debugging and Manipulation Tool for Android Applications”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 40-44. p40-schoiber.pdf (221.04 KB)
, “Location-based Risk Assessment for Mobile Authentication”, in 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016, Heidelberg, Germany, 2016, pp. 85–88.
, “Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 250-260. p250-findling.pdf (568.8 KB)
, “Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification”, in Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, 2016, pp. 280-283. p280-holzl.pdf (200.75 KB)
, “Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT”, in 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2015), Brussels, Belgium, 2015, pp. 384–388. Hintze_15_ConfidenceandRisk.pdf (560.81 KB)
, “CORMORANT: Towards Continuous Risk-Aware Multi-Modal Cross-Device Authentication”, in Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2015), Osaka, Japan, 2015, pp. 169–172. Hintze_15_CORMORANT:TowardsContinuous_posterpaper.pdf (555.14 KB)
, “Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor”, Computer Aided Systems Theory – EUROCAST 2015, vol. LNCS 9520/2015. Springer, Las Palmas, Gran Canaria, pp. 731–738, 2015.
, “Only play in your comfort zone: interaction methods for improving security awareness on mobile devices”, Personal and Ubiquitous Computing, vol. 19, no. 5-6, p. 954, 2015. preprint.pdf (6.09 MB)
, “Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment”, International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, no. 4, p. 466, 2015. Mayrhofer_15_OptimalDerotationOf.pdf (1.61 MB)
, “A Password-authenticated Secure Channel for App to Java Card Applet Communication”, International Journal of Pervasive Computing and Communications (IJPCC), vol. 11, no. 4, 2015.
, “Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia”, 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15). ACM, Linz, Austria, p. 443, 2015.
, “Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns”, in 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15), Linz, Austria, 2015, pp. 131–136. Findling_15_TowardsDeviceto.pdf (138.91 KB)
, “An architecture for secure mobile devices”, Security and Communication Networks, vol. 8, no. 10, pp. 1958-1970, 2014.
, “Diversity in Locked and Unlocked Mobile Device Usage”, in UbiComp/ISWC 2014 Programming Competition, UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, 2014, pp. 379-384. Hintze_14_DiversityinLocked.pdf (327 KB)
, “Managing the life cycle of Java Card applets in other Java virtual machines”, International Journal of Pervasive Computing and Communications, vol. 10, no. 3, pp. 291–312, 2014.
, “Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel”, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), 2014.
, “Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage”, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), New York, NY, USA, 2014, pp. 105-114. Hintze_14_MobileDeviceUsage.pdf (722.63 KB)
, “Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment”, in Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services, 2014, pp. 71-78. Mayrhofer_14_OptimalDerotationShared.pdf (1.47 MB)
, “Orientation Independent Cell Phone Based Gait Authentication”, in Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), 2014, pp. 161-164.
, “A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices”, in Information Security Conference (ISC 2014), Hong Kong, 2014. usmile-ISC14-SecureBoot.pdf (643.58 KB)
, “Prototypical Implementation and Demonstration of Multiple Multi-Channel Device Authentication Protocols Using Embedded Sensors on Various Off-the-shelf Mobile Phones”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2014.
, “Security and trust in context-aware applications”, Personal and Ubiquitous Computing, vol. 18, pp. 115–116, 2014.
, “ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together”, in Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, New York, NY, USA, 2014, pp. 165-174. Findling_14_ShakeUnlockSecure.pdf (3.69 MB)
, “A Survey of User Interaction for Spontaneous Device Association”, ACM Computing Surveys, 2014.
, “(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), 2013, pp. 286–292.
, “An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers”, in 11th International Conference on Advances in Mobile Computing and Multimedia, (MoMM 2013), Vienna, Austria, 2013.
, “Personal Data Service: Accessing and Aggregating Personal Data”, in "My Life, Shared" - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312), A. Acquisti, I. Krontiris, M. Langheinrich, and M.A. Sasse (eds.), Dagstuhl Reports., vol. 3, issue 7, Dagstuhl Publishing, Germany: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2013, pp. 87–92.
, “Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, 2013, pp. 260–269. findling_13_range_face_segmentation.pdf (1.31 MB)
, “Requirements Analysis for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM 2013), Vienna, Austria, 2013, pp. 249–252.
, “Requirements for Mobile Application Virtualization and Mobile TPM/SE Integration”, University of Applied Sciences Upper Austria, JR-Center u'smile, Hagenberg, 2013.
, “Towards Pan Shot Face Unlock: Using Biometric Face Information from Different Perspectives to Unlock Mobile Devices”, International Journal of Pervasive Computing and Communications, vol. 9, no. 3, pp. 190–208, 2013.
, “Towards Secure Personal Device Unlock using Stereo Camera Pan Shots”, in Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013, Las Palmas, Gran Canaria, 2013. findling_13_stereo_pan_shot_face_unlock.pdf (524.84 KB)
, “UACAP: A Unified Auxiliary Channel Authentication Protocol”, IEEE Transactions on Mobile Computing, vol. 12, pp. 710–721, 2013.
, “Visualizations and Switching Mechanisms for Security Zones”, in Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), Vienna, Austria, 2013, pp. 278–281.
, “When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices”, in Proceedings of the 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013, pp. 1579–1584 .
, “SAPHE - Simple Accelerometer based wireless Pairing with HEuristic trees”, in Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), 2012.
, “Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting”, in Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, 2012, pp. 98-101.
, “Towards Face Unlock: On the Difficulty of Reliably Detecting Faces on Mobile Phones”, in Proceedings of the 10th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2012), Bali, Indonesia, 2012, pp. 275–280. findling_12_towards_face_unlock.pdf (1.05 MB)
, “Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets”, in Proc. IWSSI/SPMU 2012: 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2012, 2012.
,