Campus HagenbergResearch Center

Informations- und Kommunikationssysteme Research Center Hagenberg

Publikationen

IoT als Herausforderung für die Informationssicherheit

I. Schaumüller-Bichl, A. Kolberger - IoT als Herausforderung für die Informationssicherheit - e & i Elektrotechnik und Informationstechnik, Vol. 133, No. 7, 2016, pp. 319-323
Sowohl Hersteller als auch die ganze Gesellschaft stehen durch das "Internet der Dinge" (Internet of Things, IoT) vor neuen Herausforderungen. Neue...   mehr
  • Journal
  • Informations und Kommunikationssysteme

Informations- und Kommunikationstechnologien: Fluch und Segen

B. Kubicek - Informations- und Kommunikationstechnologien: Fluch und Segen - Trendreport, 2016, pp. 15-17
  • Populärwissenschaftlich
  • Informations und Kommunikationssysteme

Executing Arbitrary Code in the Context of the Smartcard System Service

M. Roland - Executing Arbitrary Code in the Context of the Smartcard System Service - Computing Research Repository (CoRR), Vol. 1601, No. 5833, 2016, pp. 28
This report summarizes our findings regarding a severe weakness in implementations of the Open Mobile API deployed on several Android devices. The...   mehr
  • Journal
  • Informations und Kommunikationssysteme

Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models

M. Muaaz, R. Mayrhofer - Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapur, 2016, pp. 288-291
  • Tagungsband
  • Informations und Kommunikationssysteme

Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models

R. Findling, M. Hölzl, R. Mayrhofer - Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapur, 2016, pp. 250-260
Biometrics have become important for authentication on mobile devices, e.g. to unlock devices before using them. One way to protect biometric information...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

Location-based risk assessment for mobile authentication

D. Hintze, E. Koch, S. Scholz, R. Mayrhofer - Location-based risk assessment for mobile authentication - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (UbiComp '16), Heidelberg, Deutschland, 2016, pp. 85-88
Mobile devices offer access to our digital lives and thus need to be protected against the risk of unauthorized physical access by applying strong...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

DAMN - A Debugging and Manipulation Tool for Android Applications

G. Schoiber, R. Mayrhofer, M. Hölzl - DAMN - A Debugging and Manipulation Tool for Android Applications - Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), Singapore, Singapur, 2016, pp. 40-44
  • Tagungsband
  • Informations und Kommunikationssysteme

An Eye for an Eye: Gaze Input in Competitive Online Games and its Effects on Social Presence

M. Lankes, B. Maurer, B. Stiglbauer - An Eye for an Eye: Gaze Input in Competitive Online Games and its Effects on Social Presence - ACE2016: Proceedings of the 13th International Conference on Advances in Computer Entertainment Technology, Osaka, Japan, 2016, pp. 1-9
This paper investigates the effects of a shared gaze visualization regarding social presence in an online competitive game setting. We investigate if the...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

Trajectory Estimation based on Mobile Network Operator Data for Cellular Network Simulations

G. Ostermayer, C. Kieslich, M. Lindorfer - Trajectory Estimation based on Mobile Network Operator Data for Cellular Network Simulations - Journal on Wireless Communications and Networking, Vol. 2016, No. 1, 2016, pp. 18
  • Journal
  • Informations und Kommunikationssysteme

Analysis of an Adaptive Switching Point for LTE TDD by Dynamic System-Level Simulations

C. Backfrieder, G. Ostermayer - Analysis of an Adaptive Switching Point for LTE TDD by Dynamic System-Level Simulations - International Journal of Electronics and Telecommunications, Vol. 61, No. 2, 2015, pp. 171-178
  • Journal
  • Informations und Kommunikationssysteme

Security Issues in Mobile NFC Devices

M. Roland - Security Issues in Mobile NFC Devices - Springer Verlag, 2015, pp. 185
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and...   mehr
  • Buch/Buchbeitrag
  • Informations und Kommunikationssysteme

Evaluation of Contactless Smartcard Antennas

M. Roland, M. Hölzl - Evaluation of Contactless Smartcard Antennas - Computing Research Repository (CoRR), Vol. 1507, No. 6427, 2015, pp. 29
This report summarizes the results of our evaluation of antennas of contactless and dual interface smartcards and our ideas for user-switchable NFC antennas....   mehr
  • Journal
  • Informations und Kommunikationssysteme

Localization in an Industrial Environment: A Case Study on the Difficulties for Positioning in a Harsh Environment

M. Hölzl, R. Neumeier, G. Ostermayer - Localization in an Industrial Environment: A Case Study on the Difficulties for Positioning in a Harsh Environment - International Journal of Distributed Sensor Networks, Vol. 2015, No. 567976, 2015, pp. 11
  • Journal
  • Informations und Kommunikationssysteme

Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia

C. Holzmann, R. Mayrhofer, J. Häkkilä, E. Rukzio, M. Roland - Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia - ACM Press, 2015, pp. 442
On behalf of the organizing committee for MUM 2015, we would like to welcome you to this 14th edition of the International Conference on Mobile and Ubiquitous...   mehr
  • Buch/Buchbeitrag
  • Informations und Kommunikationssysteme

Integrated Imaging and Vision Techniques for Industrial Inspection

Z. Liu, H. Ukida, P. Ramuhalli, K. Niel - Integrated Imaging and Vision Techniques for Industrial Inspection - Springer, 2015, pp. 541
This pioneering text/reference presents a detailed focus on the use of machine vision techniques in industrial inspection applications. An internationally...   mehr
  • Buch/Buchbeitrag
  • Mess- und Prüftechnik
  • Informations und Kommunikationssysteme
  • Automatisierungstechnik und Simulationen

Industrial Inpsection with Open Eyes: Advance with Machine Vision Technology

Z. Liu, H. Ukida, K. Niel, P. Ramuhalli - Industrial Inpsection with Open Eyes: Advance with Machine Vision Technology in Integrated Imaging and Vision Techniques for Industrial Inspection (Contributions to Book: Part/Chapter/Section 1), (Editors: Z.Liu, H. Ukida, P. Ramuhalli, K. Niel) - Springer, 2015, pp. 1-37
Machine vision systems have evolved significantly with the technology advances to tackle the challenges from modern manufacturing industry. A wide range of...   mehr
  • Buch/Buchbeitrag
  • Mess- und Prüftechnik
  • Informations und Kommunikationssysteme
  • Automatisierungstechnik und Simulationen

A Password-authenticated Secure Channel for App to Java Card Applet Communication

M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - A Password-authenticated Secure Channel for App to Java Card Applet Communication - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 11, No. 4, 2015
Purpose The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing, or mobile...   mehr
  • Journal
  • Informations und Kommunikationssysteme

Understanding the everyday use of head-worn computers

A. Vogl, N. Louveton, R. McCall, M. Billinghurst, M. Haller - Understanding the everyday use of head-worn computers - HSI15: 8th International Conference on Human System Interaction, Warsaw, Polen, 2015, pp. 213-219
Early research on head-worn computers (HWCs) has focused on hardware and specific applications. However, there is little research about the everyday usage of...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

Modeling a Continuous and Accident-Free Intersection Control for Vehicular Traffic in TraffSim

C. Backfrieder, G. Ostermayer - Modeling a Continuous and Accident-Free Intersection Control for Vehicular Traffic in TraffSim - Proceedings of the 8th European Symposium on Computer Modeling and Simulation, Pisa, Italien, 2014, pp. 332-337
  • Tagungsband
  • Informations und Kommunikationssysteme

TraffSim - A Traffic Simulator for Investigations of Congestion Minimization through Dynamic Vehicle Rerouting

C. Backfrieder, G. Ostermayer, C. Mecklenbräuker - TraffSim - A Traffic Simulator for Investigations of Congestion Minimization through Dynamic Vehicle Rerouting - International Journal of Simulation Systems, Science and Technology, Vol. 15, No. 4, 2014, pp. 38-47
  • Journal
  • Informations und Kommunikationssysteme

Protection Profile for PUF-based Devices

A. Kolberger, I. Schaumüller-Bichl, V. Brunner, M. Deutschmann - Protection Profile for PUF-based Devices - ICT Systems Security and Privacy Protection, Marrakech, Marokko, 2014, pp. 91-98
  • Tagungsband
  • Informations und Kommunikationssysteme

Seite 2 von 8
FH Oberösterreich Logo