Michael Roland

Orcid: 0000-0003-4675-0539

Affiliations:
  • Johannes Kepler University, Linz, Austria
  • University of Applied Sciences Upper Austria, Hagenberg, Austria (former)
  • NFC Research Lab Hagenberg, Austria (former)


According to our database1, Michael Roland authored at least 32 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Digitale Identitäten in der physischen Welt: Eine Abwägung von Privatsphäreschutz und Praktikabilität.
HMD Prax. Wirtsch., April, 2023

Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings.
Adv. Artif. Intell. Mach. Learn., 2023

Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2023

Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Decentralized, Privacy-Preserving, Single Sign-On.
Secur. Commun. Networks, 2022

Efficient aggregation of face embeddings for decentralized face recognition deployments (extended version).
CoRR, 2022

Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

2021
On the feasibility of short-lived dynamic onion services.
Proceedings of the IEEE Security and Privacy Workshops, 2021

On the state of V3 onion services.
Proceedings of the FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet, 2021

Importance of different facial parts for face detection networks.
Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics, 2021

Analyzing inconsistencies in the Tor consensus.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021

2020
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation.
Int. J. Inf. Sec., 2020

DAMFA: Decentralized Anonymous Multi-Factor Authentication.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2018
Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags.
Inf., 2017

Real-World Identification for an Extensible and Privacy-Preserving Mobile eID.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

2016
Executing Arbitrary Code in the Context of the Smartcard System Service.
CoRR, 2016

Open Mobile API: Accessing the UICC on Android Devices.
CoRR, 2016

Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

2015
A password-authenticated secure channel for App to Java Card applet communication.
Int. J. Pervasive Comput. Commun., 2015

Evaluation of Contactless Smartcard Antennas.
CoRR, 2015

2014
Managing the life cycle of Java Card applets in other Java virtual machines.
Int. J. Pervasive Comput. Commun., 2014

Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

2013
Comparison of the usability and security of NFC's different operating modes in mobile devices.
Elektrotech. Informationstechnik, 2013

Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Debugging and Rapid Prototyping of NFC Secure Element Applications.
Proceedings of the Mobile Computing, Applications, and Services, 2013

2012
Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
CoRR, 2012

Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited.
Proceedings of the Information Security and Privacy Research, 2012

2009
Parameter characterisation and automatic impedance matching of 13.56 MHz NFC antennas.
Elektrotech. Informationstechnik, 2009


  Loading...