Günther Lackner

According to our database1, Günther Lackner authored at least 10 papers between 2009 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX.
Int. J. Netw. Secur., 2013

2011
Knowledge Extraction from RDF Data with Activation Patterns.
J. Univers. Comput. Sci., 2011

On the Security of Location Determination and Verification Methods for Wireless Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Android Market Analysis with Activation Patterns.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Android Security Permissions - Can We Trust Them?
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
From NLP (Natural Language Processing) to MLP (Machine Language Processing).
Proceedings of the Computer Network Security, 2010

WLAN location determination without active client collaboration.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

User Tracking Based on Behavioral Fingerprints.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods.
Int. J. Netw. Secur., 2009


  Loading...