FH Upper AustriaResearch & Development

Information and Communication Systems Research Center Hagenberg Campus

Publications

IoT as a challenge in information security

I. Schaumüller-Bichl, A. Kolberger - IoT as a challenge in information security - e & i Electrical Engineering and Information Technology, Vol. 133, No. 7, 2016, pp. 319-323
Both, manufacturers and the whole society face new challenges due to the upcoming of the "Internet of Things" (IoT). New attack targets arise and typical basic...   more
  • Journal
  • Information and Communication Systems

Information and communication technologies: A blessing and a curse

B. Kubicek - Information and communication technologies: A blessing and a curse - Trendreport, 2016, pp. 15-17
  • Non-scientific
  • Information and Communication Systems

Executing Arbitrary Code in the Context of the Smartcard System Service

M. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service - Computing Research Repository (CoRR), Vol. 1601, No. 5833, 2016, pp. 28
This report summarizes our findings regarding a severe weakness in implementations of the Open Mobile API deployed on several Android devices. The...   more
  • Journal
  • Information and Communication Systems

Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models

M. Muaaz, R. Mayrhofer - Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapore, 2016, pp. 288-291
  • Proceedings
  • Information and Communication Systems

Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models

R. Findling, M. Hölzl, R. Mayrhofer - Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapore, 2016, pp. 250-260
Biometrics have become important for authentication on mobile devices, e.g. to unlock devices before using them. One way to protect biometric information...   more
  • Proceedings
  • Information and Communication Systems

Location-based risk assessment for mobile authentication

D. Hintze, E. Koch, S. Scholz, R. Mayrhofer - Location-based risk assessment for mobile authentication - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (UbiComp '16), Heidelberg, Germany, 2016, pp. 85-88
Mobile devices offer access to our digital lives and thus need to be protected against the risk of unauthorized physical access by applying strong...   more
  • Proceedings
  • Information and Communication Systems

DAMN - A Debugging and Manipulation Tool for Android Applications

G. Schoiber, R. Mayrhofer, M. Hölzl - DAMN - A Debugging and Manipulation Tool for Android Applications - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapore, 2016, pp. 40-44
  • Proceedings
  • Information and Communication Systems

An Eye for an Eye: Gaze Input in Competitive Online Games and its Effects on Social Presence

M. Lankes, B. Maurer, B. Stiglbauer - An Eye for an Eye: Gaze Input in Competitive Online Games and its Effects on Social Presence - ACE2016: Proceedings of the 13th International Conference on Advances in Computer Entertainment Technology, Osaka, Japan, 2016, pp. 1-9
This paper investigates the effects of a shared gaze visualization regarding social presence in an online competitive game setting. We investigate if the...   more
  • Proceedings
  • Information and Communication Systems

Trajectory Estimation based on Mobile Network Operator Data for Cellular Network Simulations

G. Ostermayer, C. Kieslich, M. Lindorfer - Trajectory Estimation based on Mobile Network Operator Data for Cellular Network Simulations - Journal on Wireless Communications and Networking, Vol. 2016, No. 1, 2016, pp. 18
  • Journal
  • Information and Communication Systems

Analysis of an Adaptive Switching Point for LTE TDD by Dynamic System-Level Simulations

C. Backfrieder, G. Ostermayer - Analysis of an Adaptive Switching Point for LTE TDD by Dynamic System-Level Simulations - International Journal of Electronics and Telecommunications, Vol. 61, No. 2, 2015, pp. 171-178
  • Journal
  • Information and Communication Systems

Security Issues in Mobile NFC Devices

M. Roland - Security Issues in Mobile NFC Devices - Springer Verlag, 2015, pp. 185
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and...   more
  • Book
  • Information and Communication Systems

Evaluation of Contactless Smartcard Antennas

M. Roland, M. Hölzl - Evaluation of Contactless Smartcard Antennas - Computing Research Repository (CoRR), Vol. 1507, No. 6427, 2015, pp. 29
This report summarizes the results of our evaluation of antennas of contactless and dual interface smartcards and our ideas for user-switchable NFC antennas....   more
  • Journal
  • Information and Communication Systems

Localization in an Industrial Environment: A Case Study on the Difficulties for Positioning in a Harsh Environment

M. Hölzl, R. Neumeier, G. Ostermayer - Localization in an Industrial Environment: A Case Study on the Difficulties for Positioning in a Harsh Environment - International Journal of Distributed Sensor Networks, Vol. 2015, No. 567976, 2015, pp. 11
  • Journal
  • Information and Communication Systems

Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia

C. Holzmann, R. Mayrhofer, J. Häkkilä, E. Rukzio, M. Roland - Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia - ACM Press, 2015, pp. 442
On behalf of the organizing committee for MUM 2015, we would like to welcome you to this 14th edition of the International Conference on Mobile and Ubiquitous...   more
  • Book
  • Information and Communication Systems

Integrated Imaging and Vision Techniques for Industrial Inspection

Z. Liu, H. Ukida, P. Ramuhalli, K. Niel - Integrated Imaging and Vision Techniques for Industrial Inspection - Springer, 2015, pp. 541
This pioneering text/reference presents a detailed focus on the use of machine vision techniques in industrial inspection applications. An internationally...   more
  • Book
  • Measuring and Testing Technolgy
  • Information and Communication Systems
  • Automated Control Engineering and Simulation

Industrial Inpsection with Open Eyes: Advance with Machine Vision Technology

Z. Liu, H. Ukida, K. Niel, P. Ramuhalli - Industrial Inpsection with Open Eyes: Advance with Machine Vision Technology in Integrated Imaging and Vision Techniques for Industrial Inspection (Contributions to Book: Part/Chapter/Section 1), (Editors: Z.Liu, H. Ukida, P. Ramuhalli, K. Niel) - Springer, 2015, pp. 1-37
Machine vision systems have evolved significantly with the technology advances to tackle the challenges from modern manufacturing industry. A wide range of...   more
  • Book
  • Measuring and Testing Technolgy
  • Information and Communication Systems
  • Automated Control Engineering and Simulation

A Password-authenticated Secure Channel for App to Java Card Applet Communication

M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - A Password-authenticated Secure Channel for App to Java Card Applet Communication - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 11, No. 4, 2015
Purpose The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing, or mobile...   more
  • Journal
  • Information and Communication Systems

Understanding the everyday use of head-worn computers

A. Vogl, N. Louveton, R. McCall, M. Billinghurst, M. Haller - Understanding the everyday use of head-worn computers - HSI15: 8th International Conference on Human System Interaction, Warsaw, Poland, 2015, pp. 213-219
Early research on head-worn computers (HWCs) has focused on hardware and specific applications. However, there is little research about the everyday usage of...   more
  • Proceedings
  • Information and Communication Systems

Modeling a Continuous and Accident-Free Intersection Control for Vehicular Traffic in TraffSim

C. Backfrieder, G. Ostermayer - Modeling a Continuous and Accident-Free Intersection Control for Vehicular Traffic in TraffSim - Proceedings of the 8th European Symposium on Computer Modeling and Simulation, Pisa, Italy, 2014, pp. 332-337
  • Proceedings
  • Information and Communication Systems

TraffSim - A Traffic Simulator for Investigations of Congestion Minimization through Dynamic Vehicle Rerouting

C. Backfrieder, G. Ostermayer, C. Mecklenbräuker - TraffSim - A Traffic Simulator for Investigations of Congestion Minimization through Dynamic Vehicle Rerouting - International Journal of Simulation Systems, Science and Technology, Vol. 15, No. 4, 2014, pp. 38-47
  • Journal
  • Information and Communication Systems

Protection Profile for PUF-based Devices

A. Kolberger, I. Schaumüller-Bichl, V. Brunner, M. Deutschmann - Protection Profile for PUF-based Devices - ICT Systems Security and Privacy Protection, Marrakech, Morocco, 2014, pp. 91-98
Physically Unclonable Functions (PUFs) are a promising technology in cryptographic application areas. The idea of PUFs is to make use of the unique...   more
  • Proceedings
  • Information and Communication Systems

Page 2 from 8
FH Oberösterreich Logo