FH Upper AustriaResearch & Development

Information and Communication Systems Research Center Hagenberg Campus

Publications

Riskanalysis of Physically Unclonable Functions

A. Kolberger, I. Schaumüller-Bichl, M. Deutschmann - Riskanalysis of Physically Unclonable Functions - Communications and Multimedia Security 2014, Aveiro, Portugal, 2014, pp. 136-139
Physically unclonable functions (PUFs) are an emerging technology that have been proposed as central building blocks in a variety of cryptographic application...   more
  • Proceedings
  • Information and Communication Systems

Managing the life-cycle of Java Card applets in other Java virtual machines

M. Roland, J. Langer, R. Mayrhofer - Managing the life-cycle of Java Card applets in other Java virtual machines - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 10, No. 3, 2014, pp. 291-312
Purpose: Today, for developers, it is difficult to get access to an NFC secure element in current smart phones. Moreover, the security constraints of...   more
  • Journal
  • Information and Communication Systems

Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel

M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel - Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung, Taiwan, China, 2014, pp. 10
With the increasing popularity of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or...   more
  • Proceedings
  • Information and Communication Systems

An architecture for secure mobile devices

R. Mayrhofer - An architecture for secure mobile devices - Security and Communication Networks, Vol. 8, No. 10, 2014, pp. 1958-1970
Mobile devices such as smart phones have become one of the preferred means of accessing digital services, both for consuming and creating content....   more
  • Journal
  • Information and Communication Systems

Security and trust in context-aware applications

R. Mayrhofer, H. Schmidtke, S. Sigg - Security and trust in context-aware applications - PERSONAL AND UBIQUITOUS COMPUTING, Vol. 18, No. 1, 2014, pp. 115-116
  • Journal
  • Information and Communication Systems

A Survey of User Interaction for Spontaneous Device Association

M. Chong, R. Mayrhofer, H. Gellersen - A Survey of User Interaction for Spontaneous Device Association - ACM COMPUTING SURVEYS, Vol. 47, No. 1, 2014, pp. 40
  • Journal
  • Information and Communication Systems

Indoor Localization

R. Neumeier, M. Hölzl, G. Ostermayer - Indoor Localization - Proceedings FFH 2013, Dornbirn, Austria, 2013, pp. 174-175
  • Proceedings
  • Information and Communication Systems

A Modular Simulation Framework for Analyzing Coexistence Issues in Wireless Radio Networks in Close Spatial Proximity

R. Neumeier, G. Ostermayer - A Modular Simulation Framework for Analyzing Coexistence Issues in Wireless Radio Networks in Close Spatial Proximity - Proceedings 36th mipro/CTI, Opatija, Croatia, 2013, pp. 503-506
  • Proceedings
  • Information and Communication Systems

Applied Fitness Landscape Analysis

E. Pitzer - Applied Fitness Landscape Analysis - Phd Thesis, Johannes Kepler Universität Linz, Austria, 2013, pp. 165
  • Report
  • Information and Communication Systems

Automatic Algorithm Selection for the Quadratic Assignment Problem Using Fitness Landscape Analysis

E. Pitzer, A. Beham, M. Affenzeller - Automatic Algorithm Selection for the Quadratic Assignment Problem Using Fitness Landscape Analysis - Evolutionary Computation in Combinatorial Optimization, Wien, Austria, 2013, pp. 109-120
In the last few years, fitness landscape analysis has seen an increase in interest due to the availability of large problem collections and research groups...   more
  • Proceedings
  • Information and Communication Systems

Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless

M. Roland, J. Langer - Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless - Proceedings of the 7th USENIX Workshop on Offensive Technologies (WOOT'13), Washington, D.C., United States of America, 2013, pp. 12
Recent roll-outs of contactless payment infrastructures -- particularly in Austria and Germany -- have raised concerns about the security of contactless...   more
  • Proceedings
  • Information and Communication Systems

Introduction of Very High Bit Rates for NFC and RFID technology

C. Saminger, M. Stark, M. Gebhart, S. Grünberger, J. Langer - Introduction of Very High Bit Rates for NFC and RFID technology - e & i Electrical Engineering and Information Technology, Vol. 130, No. 7, 2013, pp. 218-223
This article gives a detailed insight into the very high bit rates (VHBR) technology. In the first part enhancements and changes to the ISO/IEC 14443 and...   more
  • Journal
  • Information and Communication Systems

Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices

M. Roland, J. Langer - Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices - e & i Electrical Engineering and Information Technology, Vol. 130, No. 7, 2013, pp. 201-206
This paper highlights the benefits and drawbacks of NFC's different operating modes with regard to their usability and security. Based on an analysis of both...   more
  • Journal
  • Information and Communication Systems

Debugging and Rapid Prototyping of NFC Secure Element Applications

M. Roland - Debugging and Rapid Prototyping of NFC Secure Element Applications - Mobile Computing, Applications and Services, Paris, France, 2013, pp. 298-313
The ecosystem behind secure elements is complex and prevents average developers from creating secure element applications. In this paper we introduce concepts...   more
  • Proceedings
  • Information and Communication Systems

(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines

M. Roland, J. Langer, R. Mayrhofer - (Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines - Proceedings of the 11th International Conference on Advances in Mobile Computing and Multimedia (MoMM2013), Vienna, Austria, 2013, pp. 286-292
Creating Java Card applications for Near Field Communication's card emulation mode requires access to a secure smartcard chip (the secure element). Today, even...   more
  • Proceedings
  • Information and Communication Systems

Environmental-sensitive Generation of Street Networks for Traffic Simulations

M. Lindorfer, C. Backfrieder, C. Kieslich, J. Kroesche, G. Ostermayer - Environmental-sensitive Generation of Street Networks for Traffic Simulations - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, United Kingdom of Great Britain and Northern Ireland, 2013, pp. 430-435
  • Proceedings
  • Information and Communication Systems

TraffSim - A Traffic Simulator for Investigating Benefits Ensuing from Intelligent Traffic Management

C. Backfrieder, C. Mecklenbräuker, G. Ostermayer - TraffSim - A Traffic Simulator for Investigating Benefits Ensuing from Intelligent Traffic Management - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, United Kingdom of Great Britain and Northern Ireland, 2013, pp. 424-429
  • Proceedings
  • Information and Communication Systems

Applying Relay Attacks to Google Wallet

M. Roland, J. Langer, J. Scharinger - Applying Relay Attacks to Google Wallet - Proceedings of the 5th International Workshop on Near Field Communication, Zurich, Switzerland, 2013, pp. 1-6
The recent emergence of Near Field Communication (NFC) enabled smartphones resulted in an increasing interest in NFC security. Several new attack scenarios,...   more
  • Proceedings
  • Information and Communication Systems

Analyzing Coexistence Issues in Wireless Radio Networks - The Simulation Environment

R. Neumeier, G. Ostermayer - Analyzing Coexistence Issues in Wireless Radio Networks - The Simulation Environment - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, United Kingdom of Great Britain and Northern Ireland, 2013, pp. 563-568
  • Proceedings
  • Information and Communication Systems

Generating Driving Trajectories with Mobile Subscription Data for Mobile Network Simulations

C. Kieslich, G. Ostermayer - Generating Driving Trajectories with Mobile Subscription Data for Mobile Network Simulations - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, United Kingdom of Great Britain and Northern Ireland, 2013, pp. 542-547
  • Proceedings
  • Information and Communication Systems

Effects of SINR Estimation Errors on the DL Cell Throughput of an LTE System in Different Environments

G. Ostermayer, R. Neumeier, S. Eder - Effects of SINR Estimation Errors on the DL Cell Throughput of an LTE System in Different Environments - Proc. of the 11th IEEE Malaysia International Conference on Communications (MICC) 2013, Kuala Lumpur, Kuala Lumpur, Malaysia, 2013, pp. 6
  • Proceedings
  • Information and Communication Systems

Page 3 from 8
FH Oberösterreich Logo