René Mayrhofer

Orcid: 0000-0003-1566-4646

Affiliations:
  • University of Linz, Austria


According to our database1, René Mayrhofer authored at least 102 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers.
IEEE Internet Things J., August, 2023

Practical Delegatable Anonymous Credentials From Equivalence Class Signatures.
Proc. Priv. Enhancing Technol., July, 2023

Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics.
IEEE Trans. Mob. Comput., April, 2023

Digitale Identitäten in der physischen Welt: Eine Abwägung von Privatsphäreschutz und Praktikabilität.
HMD Prax. Wirtsch., April, 2023

INFRASPEC - Automated Inspection of Critical Infrastructure.
ERCIM News, 2023

Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings.
Adv. Artif. Intell. Mach. Learn., 2023

Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Anonymously Publishing Liveness Signals with Plausible Deniability.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2023

Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2023

Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Decentralized, Privacy-Preserving, Single Sign-On.
Secur. Commun. Networks, 2022

Adversary Models for Mobile Device Authentication.
ACM Comput. Surv., 2022

Efficient aggregation of face embeddings for decentralized face recognition deployments (extended version).
CoRR, 2022

Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings.
IEEE Access, 2022

2021
The Android Platform Security Model.
ACM Trans. Priv. Secur., 2021

On the feasibility of short-lived dynamic onion services.
Proceedings of the IEEE Security and Privacy Workshops, 2021

On the state of V3 onion services.
Proceedings of the FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet, 2021

Importance of different facial parts for face detection networks.
Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics, 2021

Analyzing inconsistencies in the Tor consensus.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021

Experiences and Recommendations from Operating a Tor Exit Node at a University.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation.
Int. J. Inf. Sec., 2020

Adversary Models for Mobile Device Authentication.
CoRR, 2020

Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport.
IEEE Access, 2020

DAMFA: Decentralized Anonymous Multi-Factor Authentication.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

KinPhy: a kinetic in-band channel for millimetre-wave networks.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

CORMORANT: On Implementing Risk-Aware Multi-Modal Biometric Cross-Device Authentication For Android.
Proceedings of the MoMM 2019: The 17th International Conference on Advances in Mobile Computing & Multimedia, 2019

Dynamic Taint Tracking Simulation.
Proceedings of the E-Business and Telecommunications - 16th International Conference, 2019

2018
Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics.
IEEE Trans. Mob. Comput., 2018

Introspection for C and its Applications to Library Robustness.
Art Sci. Eng. Program., 2018

Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks.
Int. J. Crit. Infrastructure Prot., 2018

Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Sulong, and Thanks for All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Smartphone-Based Gait Recognition: From Authentication to Imitation.
IEEE Trans. Mob. Comput., 2017

ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices.
IEEE Trans. Mob. Comput., 2017

Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags.
Inf., 2017

A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Accurate clock synchronization for power systems protection devices over packet switched networks.
Comput. Sci. Res. Dev., 2017

Real-World Identification for an Extensible and Privacy-Preserving Mobile eID.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Traffic Statistics of a High-Bandwidth Tor Exit Node.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
DAMN: A Debugging and Manipulation Tool for Android Applications.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

Location-based risk assessment for mobile authentication.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

2015
An architecture for secure mobile devices.
Secur. Commun. Networks, 2015

Only play in your comfort zone: interaction methods for improving security awareness on mobile devices.
Pers. Ubiquitous Comput., 2015

Optimal derotation of shared acceleration time series by determining relative spatial alignment.
Int. J. Pervasive Comput. Commun., 2015

A password-authenticated secure channel for App to Java Card applet communication.
Int. J. Pervasive Comput. Commun., 2015

Towards device-to-user authentication: protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns.
Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, Linz, Austria, November 30, 2015

Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

Cormorant: towards continuous risk-aware multi-modal cross-device authentication.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Cross Pocket Gait Authentication Using Mobile Phone Based Accelerometer Sensor.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2015, 2015

2014
Security and trust in context-aware applications.
Pers. Ubiquitous Comput., 2014

Managing the life cycle of Java Card applets in other Java virtual machines.
Int. J. Pervasive Comput. Commun., 2014

A Survey of User Interaction for Spontaneous Device Association.
ACM Comput. Surv., 2014

Orientation Independent Cell Phone Based Gait Authentication.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices.
Proceedings of the Information Security - 17th International Conference, 2014

Diversity in locked and unlocked mobile device usage.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
UACAP: A Unified Auxiliary Channel Authentication Protocol.
IEEE Trans. Mob. Comput., 2013

Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices.
Int. J. Pervasive Comput. Commun., 2013

(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Visualizations and Switching Mechanisms for Security Zones.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Range Face Segmentation: Face Detection and Segmentation for Authentication in Mobile Device Range Images.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Towards Secure Personal Device Unlock Using Stereo Camera Pan Shots.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

2012
Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging.
Int. J. Pervasive Comput. Commun., 2012

SAPHE: simple accelerometer based wireless pairing with heuristic trees.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012

Towards face unlock: on the difficulty of reliably detecting faces on mobile phones.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012

Towards a Practical, Scalable Self-Localization System for Android Phones Based on WLAN Fingerprinting.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Unify localization using user interface description languages and a navigation context-aware translation tool.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2012

2011
Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform components.
Proceedings of the MoMM'2011, 2011

A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice.
Proceedings of the Model Driven Engineering Languages and Systems, 2011

Private notes: encrypted XML notes synchronization and sharing with untrusted web services.
Proceedings of the iiWAS'2011, 2011

Evaluation of Descriptive User Interface Methodologies for Mobile Devices.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Friends Radar: Towards a Private P2P Location Sharing Platform.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Mobile Platform Architecture Review: Android, iPhone, Qt.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

2009
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices.
IEEE Trans. Mob. Comput., 2009

On Structural Identification of 2D Regression Functions for Indoor Bluetooth Localization.
Proceedings of the Computer Aided Systems Theory, 2009

2008
Peer-it: Stick-on solutions for networks of things.
Pervasive Mob. Comput., 2008

Spontaneous mobile device authentication based on sensor data.
Inf. Secur. Tech. Rep., 2008

Building Flexible Manufacturing Systems Based on Peer-Its.
EURASIP J. Embed. Syst., 2008

Towards alternative user interfaces for capturing and managing tasks with mobile devices.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008

2007
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections.
J. Mobile Multimedia, 2007

Shake Well Before Use: Authentication Based on Accelerometer Data.
Proceedings of the Pervasive Computing, 2007

Towards an Open Source Toolkit for Ubiquitous Device Authentication.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

On the Security of Ultrasound as Out-of-band Channel.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007

Extending the Growing Neural Gas Classifier for Context Recognition.
Proceedings of the Computer Aided Systems Theory, 2007

The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

A Human-Verifiable Authentication Protocol Using Visible Laser Light.
Proceedings of the The Second International Conference on Availability, 2007

2004
A Light-Weight Component Model for Peer-to-Peer Applications.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Eine Architektur zur Kontextvorhersage.
Proceedings of the Ausgezeichnete Informatikdissertationen 2004, 2004

An architecture for context prediction.
PhD thesis, 2004

2003
Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks.
Proceedings of the First International Workshop on Security Issues in Coordination Models, 2003

Feature Extraction in Wireless Personal and Local Area Networks.
Proceedings of the Mobile and Wireless Communications Networks, 2003


  Loading...