René Mayrhofer
Orcid: 0000-0003-1566-4646Affiliations:
- University of Linz, Austria
According to our database1,
René Mayrhofer
authored at least 107 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation.
IEEE Trans. Dependable Secur. Comput., 2024
On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ.
CoRR, 2024
Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2024
Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
BioDSSL: A Domain Specific Sensor Language for Global, Distributed, Biometric Identification Systems.
Proceedings of the 12th IEEE International Conference on Intelligent Systems, 2024
2023
A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers.
IEEE Internet Things J., August, 2023
Proc. Priv. Enhancing Technol., July, 2023
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023
Digitale Identitäten in der physischen Welt: Eine Abwägung von Privatsphäreschutz und Praktikabilität.
HMD Prax. Wirtsch., April, 2023
Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings.
Adv. Artif. Intell. Mach. Learn., 2023
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2023
Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2023
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
Efficient aggregation of face embeddings for decentralized face recognition deployments (extended version).
CoRR, 2022
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022
2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet, 2021
Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics, 2021
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation.
Int. J. Inf. Sec., 2020
IEEE Access, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
2019
CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019
CORMORANT: On Implementing Risk-Aware Multi-Modal Biometric Cross-Device Authentication For Android.
Proceedings of the MoMM 2019: The 17th International Conference on Advances in Mobile Computing & Multimedia, 2019
Proceedings of the E-Business and Telecommunications - 16th International Conference, 2019
2018
Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics.
IEEE Trans. Mob. Comput., 2018
Art Sci. Eng. Program., 2018
Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks.
Int. J. Crit. Infrastructure Prot., 2018
Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Sulong, and Thanks for All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Mob. Comput., 2017
Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags.
Inf., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Accurate clock synchronization for power systems protection devices over packet switched networks.
Comput. Sci. Res. Dev., 2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016
2015
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices.
Pers. Ubiquitous Comput., 2015
Optimal derotation of shared acceleration time series by determining relative spatial alignment.
Int. J. Pervasive Comput. Commun., 2015
Int. J. Pervasive Comput. Commun., 2015
Towards device-to-user authentication: protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns.
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30, 2015
Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015
Proceedings of the Computer Aided Systems Theory - EUROCAST 2015, 2015
2014
Int. J. Pervasive Comput. Commun., 2014
ACM Comput. Surv., 2014
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014
Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014
Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
2013
IEEE Trans. Mob. Comput., 2013
Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices.
Int. J. Pervasive Comput. Commun., 2013
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013
2012
Int. J. Pervasive Comput. Commun., 2012
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012
Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Unify localization using user interface description languages and a navigation context-aware translation tool.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2012
2011
Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components.
Proceedings of the MoMM'2011, 2011
A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice.
Proceedings of the Model Driven Engineering Languages and Systems, 2011
Private notes: encrypted XML notes synchronization and sharing with untrusted web services.
Proceedings of the iiWAS'2011, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
2009
IEEE Trans. Mob. Comput., 2009
On Structural Identification of 2D Regression Functions for Indoor Bluetooth Localization.
Proceedings of the Computer Aided Systems Theory, 2009
2008
Inf. Secur. Tech. Rep., 2008
EURASIP J. Embed. Syst., 2008
Towards alternative user interfaces for capturing and managing tasks with mobile devices.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008
2007
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections.
J. Mobile Multimedia, 2007
Proceedings of the Pervasive Computing, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007
Proceedings of the Computer Aided Systems Theory, 2007
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the The Second International Conference on Availability, 2007
2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
Proceedings of the Ausgezeichnete Informatikdissertationen 2004, 2004
An architecture for context prediction.
PhD thesis, 2004
2003
Proceedings of the First International Workshop on Security Issues in Coordination Models, 2003
Proceedings of the Mobile and Wireless Communications Networks, 2003