Matthias Trojahn

According to our database1, Matthias Trojahn authored at least 11 papers between 2012 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Sichere Multi-Faktor-Authentifizierung an Smartphones mithilfe des Tippverhaltens.
PhD thesis, 2016

2015
Adaptive Class Association Rule Mining for Human Activity Recognition.
Proceedings of the 6th International Workshop on Mining Ubiquitous and Social Environments (MUSE 2015) co-located with the 26th European Conference on Machine Learning / 19th European Conference on Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2015), 2015

2013
Designing an Enterprise Security Strategy for Mobile Intranet Access.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Using crowdsourced geographic information from OpenStreetMap for discrete event simulation of logistic systems.
Proceedings of the 46th Annual Simulation Symposium, 2013

Keystroke Authentication with a Capacitive Display using Different Mobile Devices.
Proceedings of the SECRYPT 2013, 2013

Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

Keystroke Authentication on Mobile Devices with a Capacitive Display.
Proceedings of the ICPRAM 2013, 2013

Emotion Recognition through Keystroke Dynamics on Touchscreen Keyboards.
Proceedings of the ICEIS 2013, 2013

Authentication with Time Features for Keystroke Dynamics on Touchscreens.
Proceedings of the Communications and Multimedia Security, 2013

Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Towards coupling user and device locations using biometrical authentication on smartphones.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012


  Loading...