default search action
René Mayrhofer
Person information
- affiliation: University of Linz, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Omid Mir, Daniel Slamanig, René Mayrhofer:
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation. IEEE Trans. Dependable Secur. Comput. 21(4): 2312-2326 (2024) - [c67]Philipp Hofer, Michael Roland, René Mayrhofer:
BioDSSL: A Domain Specific Sensor Language for Global, Distributed, Biometric Identification Systems. IS 2024: 1-7 - [c66]Mario Kahlhofer, Stefan Achleitner, Stefan Rass, René Mayrhofer:
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires. RAID 2024: 317-336 - [c65]Martin Schwaighofer, Michael Roland, René Mayrhofer:
Extending Cloud Build Systems to Eliminate Transitive Trust. SCORED@CCS 2024: 45-55 - [i8]Mario Lins, René Mayrhofer, Michael Roland, Daniel Hofer, Martin Schwaighofer:
On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ. CoRR abs/2404.08987 (2024) - [i7]Mario Kahlhofer, Stefan Achleitner, Stefan Rass, René Mayrhofer:
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires. CoRR abs/2408.10796 (2024) - 2023
- [j35]Philipp Hofer, Michael Roland, René Mayrhofer, Philipp Schwarz:
Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings. Adv. Artif. Intell. Mach. Learn. 3(1): 693-711 (2023) - [j34]Michael Roland, Tobias Höller, René Mayrhofer:
Digitale Identitäten in der physischen Welt: Eine Abwägung von Privatsphäreschutz und Praktikabilität. HMD Prax. Wirtsch. 60(2): 283-307 (2023) - [j33]Adriana Berdich, Bogdan Groza, René Mayrhofer:
A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers. IEEE Internet Things J. 10(16): 14646-14670 (2023) - [j32]Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer:
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures. Proc. Priv. Enhancing Technol. 2023(3): 488-513 (2023) - [j31]Adriana Berdich, Bogdan Groza, René Mayrhofer, Efrat Levy, Asaf Shabtai, Yuval Elovici:
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Trans. Mob. Comput. 22(4): 2417-2434 (2023) - [c64]Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer:
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments. ICISSP 2023: 279-286 - [c63]Michael Sonntag, René Mayrhofer, Stefan Rass:
Anonymously Publishing Liveness Signals with Plausible Deniability. MoMM 2023: 3-19 - [c62]Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer:
Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices. MoMM 2023: 129-143 - [c61]Mario Lins, René Mayrhofer, Michael Roland, Alastair R. Beresford:
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems. NordSec 2023: 185-203 - [i6]Michael Sonntag, René Mayrhofer, Stephan Schraml:
INFRASPEC - Automated Inspection of Critical Infrastructure. ERCIM News 2023(135) (2023) - 2022
- [j30]Adriana Berdich, Bogdan Groza, Efrat Levy, Asaf Shabtai, Yuval Elovici, René Mayrhofer:
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access 10: 122399-122413 (2022) - [j29]René Mayrhofer, Stephan Sigg:
Adversary Models for Mobile Device Authentication. ACM Comput. Surv. 54(9): 198:1-198:35 (2022) - [j28]Omid Mir, Michael Roland, René Mayrhofer:
Decentralized, Privacy-Preserving, Single Sign-On. Secur. Commun. Networks 2022: 9983995:1-9983995:18 (2022) - [i5]Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer:
Efficient aggregation of face embeddings for decentralized face recognition deployments (extended version). CoRR abs/2212.10108 (2022) - [i4]Omid Mir, Daniel Slamanig, Balthazar Bauer, René Mayrhofer:
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures. IACR Cryptol. ePrint Arch. 2022: 680 (2022) - 2021
- [j27]René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Nick Kralevich:
The Android Platform Security Model. ACM Trans. Priv. Secur. 24(3): 19:1-19:35 (2021) - [c60]Michael Sonntag, René Mayrhofer:
Experiences and Recommendations from Operating a Tor Exit Node at a University. ICISSP 2021: 283-290 - [c59]Tobias Höller, Michael Roland, René Mayrhofer:
Analyzing inconsistencies in the Tor consensus. iiWAS 2021: 485-494 - [c58]Philipp Hofer, Michael Roland, Philipp Schwarz, Martin Schwaighofer, René Mayrhofer:
Importance of different facial parts for face detection networks. IWBF 2021: 1-6 - [c57]Tobias Höller, Michael Roland, René Mayrhofer:
On the state of V3 onion services. FOCI@SIGCOMM 2021: 50-56 - [c56]Tobias Höller, Thomas Raab, Michael Roland, René Mayrhofer:
On the feasibility of short-lived dynamic onion services. SP (Workshops) 2021: 25-30 - [e5]Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 [contents] - 2020
- [j26]Bogdan Groza, Adriana Berdich, Camil Jichici, Rene Mayrhofer:
Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport. IEEE Access 8: 9246-9259 (2020) - [j25]Michael Hölzl, Michael Roland, Omid Mir, René Mayrhofer:
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. Int. J. Inf. Sec. 19(4): 401-417 (2020) - [c55]Omid Mir, Michael Roland, René Mayrhofer:
DAMFA: Decentralized Anonymous Multi-Factor Authentication. BSCI 2020: 10-19 - [e4]René Mayrhofer, Michael Roland:
WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020. ACM 2020, ISBN 978-1-4503-8006-5 [contents] - [e3]René Mayrhofer, Michael Roland:
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020. ACM 2020, ISBN 978-1-4503-8007-2 [contents] - [i3]René Mayrhofer, Vishwath Mohan, Stephan Sigg:
Adversary Models for Mobile Device Authentication. CoRR abs/2009.10150 (2020)
2010 – 2019
- 2019
- [j24]Daniel Hintze, Matthias Füller, Sebastian Scholz, Rainhard D. Findling, Muhammad Muaaz, Philipp Kapfer, Eckhard Koch, René Mayrhofer:
CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3): 85:1-85:23 (2019) - [c54]Fabian Berner, René Mayrhofer, Johannes Sametinger:
Dynamic Taint Tracking Simulation. ICETE (Selected Papers) 2019: 203-227 - [c53]Daniel Hintze, Matthias Füller, Sebastian Scholz, Rainhard D. Findling, Muhammad Muaaz, Philipp Kapfer, Wilhelm Nüßer, René Mayrhofer:
CORMORANT: On Implementing Risk-Aware Multi-Modal Biometric Cross-Device Authentication For Android. MoMM 2019: 117-126 - [c52]Mohammed Alloulah, Zoran Radivojevic, René Mayrhofer, Howard Huang:
KinPhy: a kinetic in-band channel for millimetre-wave networks. SenSys 2019: 364-377 - [i2]René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Nick Kralevich:
The Android Platform Security Model. CoRR abs/1904.05572 (2019) - 2018
- [j23]Andreas Aichhorn, Bernhard Etzlinger, Andreas Unterweger, René Mayrhofer, Andreas Springer:
Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks. Int. J. Crit. Infrastructure Prot. 23: 68-78 (2018) - [j22]Manuel Rigger, Rene Mayrhofer, Roland Schatz, Matthias Grimmer, Hanspeter Mössenböck:
Introspection for C and its Applications to Library Robustness. Art Sci. Eng. Program. 2(2): 4 (2018) - [j21]Rainhard Dieter Findling, Michael Hölzl, Rene Mayrhofer:
Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics. IEEE Trans. Mob. Comput. 17(11): 2578-2590 (2018) - [c51]Omid Mir, René Mayrhofer, Michael Hölzl, Thanh-Binh Nguyen:
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. ARES 2018: 38:1-38:10 - [c50]Manuel Rigger, Roland Schatz, René Mayrhofer, Matthias Grimmer, Hanspeter Mössenböck:
Sulong, and Thanks for All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model. ASPLOS 2018: 377-391 - [c49]Michael Hölzl, Michael Roland, Omid Mir, René Mayrhofer:
Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs. SAC 2018: 1601-1609 - 2017
- [j20]Andreas Aichhorn, Bernhard Etzlinger, René Mayrhofer, Andreas Springer:
Accurate clock synchronization for power systems protection devices over packet switched networks. Comput. Sci. Res. Dev. 32(1-2): 147-158 (2017) - [j19]Daniel Hintze, Philipp Hintze, Rainhard D. Findling, René Mayrhofer:
A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(2): 13:1-13:21 (2017) - [j18]Fernando Kaway Carvalho Ota, Michael Roland, Michael Hölzl, René Mayrhofer, Aleardo Manacero:
Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags. Inf. 8(3): 81 (2017) - [j17]Rainhard Dieter Findling, Muhammad Muaaz, Daniel Hintze, Rene Mayrhofer:
ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices. IEEE Trans. Mob. Comput. 16(4): 1163-1175 (2017) - [j16]Muhammad Muaaz, Rene Mayrhofer:
Smartphone-Based Gait Recognition: From Authentication to Imitation. IEEE Trans. Mob. Comput. 16(11): 3209-3221 (2017) - [c48]Michael Sonntag, René Mayrhofer:
Traffic Statistics of a High-Bandwidth Tor Exit Node. ICISSP 2017: 270-277 - [c47]Michael Hölzl, Michael Roland, René Mayrhofer:
Real-World Identification for an Extensible and Privacy-Preserving Mobile eID. Privacy and Identity Management 2017: 354-370 - [i1]Manuel Rigger, Rene Mayrhofer, Roland Schatz, Matthias Grimmer, Hanspeter Mössenböck:
Introspection for C and its Applications to Library Robustness. CoRR abs/1712.01163 (2017) - 2016
- [c46]Daniel Hintze, Eckhard Koch, Sebastian Scholz, René Mayrhofer:
Location-based risk assessment for mobile authentication. UbiComp Adjunct 2016: 85-88 - [c45]Gerald Schoiber, Rene Mayrhofer, Michael Hölzl:
DAMN: A Debugging and Manipulation Tool for Android Applications. MoMM 2016: 40-44 - [c44]Rainhard Dieter Findling, Michael Hölzl, René Mayrhofer:
Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models. MoMM 2016: 250-260 - [c43]Michael Hölzl, Michael Roland, René Mayrhofer:
Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification. MoMM 2016: 280-283 - [c42]Muhammad Muaaz, René Mayrhofer:
Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models. MoMM 2016: 288-291 - 2015
- [j15]Michael Hölzl, Endalkachew Asnake, Rene Mayrhofer, Michael Roland:
A password-authenticated secure channel for App to Java Card applet communication. Int. J. Pervasive Comput. Commun. 11(4): 374-397 (2015) - [j14]René Mayrhofer, Helmut Hlavacs, Rainhard Dieter Findling:
Optimal derotation of shared acceleration time series by determining relative spatial alignment. Int. J. Pervasive Comput. Commun. 11(4): 454-466 (2015) - [j13]Peter Riedl, Rene Mayrhofer, Andreas Möller, Matthias Kranz, Florian Lettner, Clemens Holzmann, Marion Koelle:
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Pers. Ubiquitous Comput. 19(5-6): 941-954 (2015) - [j12]René Mayrhofer:
An architecture for secure mobile devices. Secur. Commun. Networks 8(10): 1958-1970 (2015) - [c41]Muhammad Muaaz, René Mayrhofer:
Cross Pocket Gait Authentication Using Mobile Phone Based Accelerometer Sensor. EUROCAST 2015: 731-738 - [c40]Daniel Hintze, Rainhard D. Findling, Muhammad Muaaz, Eckhard Koch, René Mayrhofer:
Cormorant: towards continuous risk-aware multi-modal cross-device authentication. UbiComp/ISWC Adjunct 2015: 169-172 - [c39]Daniel Hintze, Muhammad Muaaz, Rainhard D. Findling, Sebastian Scholz, Eckhard Koch, René Mayrhofer:
Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. MoMM 2015: 384-388 - [c38]Rainhard Dieter Findling, René Mayrhofer:
Towards device-to-user authentication: protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns. MUM 2015: 131-135 - [e2]Clemens Holzmann, René Mayrhofer:
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30 - December 2, 2015. ACM 2015, ISBN 978-1-4503-3605-5 [contents] - 2014
- [j11]Ming Ki Chong, Rene Mayrhofer, Hans Gellersen:
A Survey of User Interaction for Spontaneous Device Association. ACM Comput. Surv. 47(1): 8:1-8:40 (2014) - [j10]Michael Roland, Josef Langer, Rene Mayrhofer:
Managing the life cycle of Java Card applets in other Java virtual machines. Int. J. Pervasive Comput. Commun. 10(3): 291-312 (2014) - [j9]René Mayrhofer, Hedda Rahel Schmidtke, Stephan Sigg:
Security and trust in context-aware applications. Pers. Ubiquitous Comput. 18(1): 115-116 (2014) - [c37]Daniel Hintze, Sebastian Scholz, Rainhard D. Findling, René Mayrhofer, Muhammad Muaaz:
Diversity in locked and unlocked mobile device usage. UbiComp Adjunct 2014: 379-384 - [c36]Rene Mayrhofer, Helmut Hlavacs, Rainhard Dieter Findling:
Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. iiWAS 2014: 71-78 - [c35]Javier González, Michael Hölzl, Peter Riedl, Philippe Bonnet, René Mayrhofer:
A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. ISC 2014: 542-554 - [c34]Daniel Hintze, Rainhard D. Findling, Sebastian Scholz, René Mayrhofer:
Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. MoMM 2014: 105-114 - [c33]Michael Hölzl, Endalkachew Asnake, René Mayrhofer, Michael Roland:
Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. MoMM 2014: 147-156 - [c32]Muhammad Muaaz, René Mayrhofer:
Orientation Independent Cell Phone Based Gait Authentication. MoMM 2014: 161-164 - [c31]Rainhard Dieter Findling, Muhammad Muaaz, Daniel Hintze, René Mayrhofer:
ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together. MoMM 2014: 165-174 - 2013
- [j8]Rainhard Dieter Findling, Rene Mayrhofer:
Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices. Int. J. Pervasive Comput. Commun. 9(3): 190-208 (2013) - [j7]Rene Mayrhofer, Jürgen Fuß, Iulia Ion:
UACAP: A Unified Auxiliary Channel Authentication Protocol. IEEE Trans. Mob. Comput. 12(4): 710-721 (2013) - [c30]Rainhard D. Findling, Rene Mayrhofer:
Towards Secure Personal Device Unlock Using Stereo Camera Pan Shots. EUROCAST (2) 2013: 417-425 - [c29]Rene Mayrhofer:
When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices. HPCC/EUC 2013: 1579-1584 - [c28]Michael Hölzl, René Mayrhofer, Michael Roland:
Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. MoMM 2013: 249 - [c27]Rainhard D. Findling, Fabian Wenny, Clemens Holzmann, René Mayrhofer:
Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images. MoMM 2013: 260 - [c26]Peter Riedl, Phillip Koller, Rene Mayrhofer, Andreas Möller, Marion Koelle, Matthias Kranz:
Visualizations and Switching Mechanisms for Security Zones. MoMM 2013: 278 - [c25]Michael Roland, Josef Langer, René Mayrhofer:
(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines. MoMM 2013: 286 - [c24]Muhammad Muaaz, René Mayrhofer:
An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. MoMM 2013: 293 - [e1]René Mayrhofer, Luke Chen, Matthias Steinbauer, Gabriele Kotsis, Ismail Khalil:
The 11th International Conference on Advances in Mobile Computing & Multimedia, MoMM '13, Vienna, Austria, December 2-4, 2013. ACM 2013, ISBN 978-1-4503-2106-8 [contents] - 2012
- [j6]Rene Mayrhofer, Alexander Sommer, Sinan Saral:
Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging. Int. J. Pervasive Comput. Commun. 8(1): 53-78 (2012) - [c23]Michael Tschernuth, Michael Lettner, Rene Mayrhofer:
Unify localization using user interface description languages and a navigation context-aware translation tool. EICS 2012: 179-188 - [c22]Peter Riedl, Rene Mayrhofer:
Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting. ICDCS Workshops 2012: 98-101 - [c21]Bogdan Groza, Rene Mayrhofer:
SAPHE: simple accelerometer based wireless pairing with heuristic trees. MoMM 2012: 161-168 - [c20]Rainhard Dieter Findling, Rene Mayrhofer:
Towards face unlock: on the difficulty of reliably detecting faces on mobile phones. MoMM 2012: 275-280 - 2011
- [c19]Michael Tschernuth, Michael Lettner, Rene Mayrhofer:
Evaluation of Descriptive User Interface Methodologies for Mobile Devices. EUROCAST (2) 2011: 519-526 - [c18]René Mayrhofer, Clemens Holzmann, Romana Koprivec:
Friends Radar: Towards a Private P2P Location Sharing Platform. EUROCAST (2) 2011: 527-535 - [c17]Michael Lettner, Michael Tschernuth, Rene Mayrhofer:
Mobile Platform Architecture Review: Android, iPhone, Qt. EUROCAST (2) 2011: 544-551 - [c16]Paul Klingelhuber, Rene Mayrhofer:
Private notes: encrypted XML notes synchronization and sharing with untrusted web services. iiWAS 2011: 254-261 - [c15]Michael Lettner, Michael Tschernuth, Rene Mayrhofer:
A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice. MoDELS 2011: 228-242 - [c14]Michael Lettner, Michael Tschernuth, Rene Mayrhofer:
Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components. MoMM 2011: 268-272 - 2010
- [c13]Rene Mayrhofer, Alexander Sommer, Sinan Saral:
Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging. iiWAS 2010: 183-191
2000 – 2009
- 2009
- [j5]Rene Mayrhofer, Hans Gellersen:
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices. IEEE Trans. Mob. Comput. 8(6): 792-806 (2009) - [c12]Rene Mayrhofer, Stephan M. Winkler, Helmut Hlavacs, Michael Affenzeller, Stefan Schneider:
On Structural Identification of 2D Regression Functions for Indoor Bluetooth Localization. EUROCAST 2009: 801-808 - 2008
- [j4]Alois Ferscha, Manfred Hechinger, Marcos dos Santos Rocha, René Mayrhofer, Andreas Zeidler, Andreas Riener, Marquart Franz:
Building Flexible Manufacturing Systems Based on Peer-Its. EURASIP J. Embed. Syst. 2008 (2008) - [j3]Rene Mayrhofer, Hans Gellersen:
Spontaneous mobile device authentication based on sensor data. Inf. Secur. Tech. Rep. 13(3): 136-150 (2008) - [j2]Alois Ferscha, Manfred Hechinger, Andreas Riener, Marcos dos Santos Rocha, Andreas Zeidler, Marquart Franz, René Mayrhofer:
Peer-it: Stick-on solutions for networks of things. Pervasive Mob. Comput. 4(3): 448-479 (2008) - [c11]Harald Radi, Rene Mayrhofer:
Towards alternative user interfaces for capturing and managing tasks with mobile devices. MoMM 2008: 272-275 - 2007
- [j1]Rene Mayrhofer, Roswitha Gostner:
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections. J. Mobile Multimedia 3(3): 198-217 (2007) - [c10]Rene Mayrhofer, Martyn Welch:
A Human-Verifiable Authentication Protocol Using Visible Laser Light. ARES 2007: 1143-1148 - [c9]Rene Mayrhofer:
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. ESAS 2007: 1-15 - [c8]Rene Mayrhofer, Harald Radi:
Extending the Growing Neural Gas Classifier for Context Recognition. EUROCAST 2007: 920-927 - [c7]Rene Mayrhofer, Hans Gellersen, Mike Hazas:
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. UbiComp 2007: 199-216 - [c6]Rene Mayrhofer, Hans Gellersen:
On the Security of Ultrasound as Out-of-band Channel. IPDPS 2007: 1-6 - [c5]Rene Mayrhofer:
Towards an Open Source Toolkit for Ubiquitous Device Authentication. PerCom Workshops 2007: 247-254 - [c4]Rene Mayrhofer, Hans Gellersen:
Shake Well Before Use: Authentication Based on Accelerometer Data. Pervasive 2007: 144-161 - 2004
- [b1]René Mayrhofer:
An architecture for context prediction. University of Linz, Austria, 2004, pp. I-IV, 1-134 - [c3]Alois Ferscha, Manfred Hechinger, René Mayrhofer, Roy Oberhauser:
A Light-Weight Component Model for Peer-to-Peer Applications. ICDCS Workshops 2004: 520-527 - [p1]Rene Mayrhofer:
Eine Architektur zur Kontextvorhersage. Ausgezeichnete Informatikdissertationen 2004: 125-134 - 2003
- [c2]Rene Mayrhofer, Harald Radi, Alois Ferscha:
Feature Extraction in Wireless Personal and Local Area Networks. MWCN 2003 - [c1]René Mayrhofer, Florian Ortner, Alois Ferscha, Manfred Hechinger:
Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks. SecCo 2003: 105-121
Coauthor Index
aka: Rainhard D. Findling
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint