Campus HagenbergResearch Center

Informations- und Kommunikationssysteme Research Center Hagenberg

Publikationen

Riskanalysis of Physically Unclonable Functions

A. Kolberger, I. Schaumüller-Bichl, M. Deutschmann - Riskanalysis of Physically Unclonable Functions - Communications and Multimedia Security 2014, Aveiro, Portugal, 2014, pp. 136-139
  • Tagungsband
  • Informations und Kommunikationssysteme

Managing the life-cycle of Java Card applets in other Java virtual machines

M. Roland, J. Langer, R. Mayrhofer - Managing the life-cycle of Java Card applets in other Java virtual machines - International Journal of Pervasive Computing and Communications (IJPCC), Vol. 10, No. 3, 2014, pp. 291-312
Purpose: Today, for developers, it is difficult to get access to an NFC secure element in current smart phones. Moreover, the security constraints of...   mehr
  • Journal
  • Informations und Kommunikationssysteme

Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel

M. Hölzl, E. Asnake, R. Mayrhofer, M. Roland - Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel - Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2014), Kaohsiung, Taiwan, China, 2014, pp. 10
With the increasing popularity of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

An architecture for secure mobile devices

R. Mayrhofer - An architecture for secure mobile devices - Security and Communication Networks, Vol. 8, No. 10, 2014, pp. 1958-1970
Mobile devices such as smart phones have become one of the preferred means of accessing digital services, both for consuming and creating content....   mehr
  • Journal
  • Informations und Kommunikationssysteme

Security and trust in context-aware applications

R. Mayrhofer, H. Schmidtke, S. Sigg - Security and trust in context-aware applications - PERSONAL AND UBIQUITOUS COMPUTING, Vol. 18, No. 1, 2014, pp. 115-116
  • Journal
  • Informations und Kommunikationssysteme

A Survey of User Interaction for Spontaneous Device Association

M. Chong, R. Mayrhofer, H. Gellersen - A Survey of User Interaction for Spontaneous Device Association - ACM COMPUTING SURVEYS, Vol. 47, No. 1, 2014, pp. 40
  • Journal
  • Informations und Kommunikationssysteme

Indoor Localization

R. Neumeier, M. Hölzl, G. Ostermayer - Indoor Localization - Tagungsband des 7. Forschungsforums der Österreichischen Fachhochschulen, Dornbirn, Österreich, 2013, pp. 174-175
  • Tagungsband
  • Informations und Kommunikationssysteme

A Modular Simulation Framework for Analyzing Coexistence Issues in Wireless Radio Networks in Close Spatial Proximity

R. Neumeier, G. Ostermayer - A Modular Simulation Framework for Analyzing Coexistence Issues in Wireless Radio Networks in Close Spatial Proximity - Proceedings 36th mipro/CTI, Opatija, Kroatien, 2013, pp. 503-506
  • Tagungsband
  • Informations und Kommunikationssysteme

Applied Fitness Landscape Analysis

E. Pitzer - Applied Fitness Landscape Analysis - Phd Thesis, Johannes Kepler Universität Linz, Österreich, 2013, pp. 165
  • Bericht
  • Informations und Kommunikationssysteme

Automatic Algorithm Selection for the Quadratic Assignment Problem Using Fitness Landscape Analysis

E. Pitzer, A. Beham, M. Affenzeller - Automatic Algorithm Selection for the Quadratic Assignment Problem Using Fitness Landscape Analysis - Evolutionary Computation in Combinatorial Optimization, Wien, Österreich, 2013, pp. 109-120
  • Tagungsband
  • Informations und Kommunikationssysteme

Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless

M. Roland, J. Langer - Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless - Proceedings of the 7th USENIX Workshop on Offensive Technologies (WOOT'13), Washington, D.C., Vereinigte Staaten von Amerika, 2013, pp. 12
Recent roll-outs of contactless payment infrastructures -- particularly in Austria and Germany -- have raised concerns about the security of contactless...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

Introduction of Very High Bit Rates for NFC and RFID technology

C. Saminger, M. Stark, M. Gebhart, S. Grünberger, J. Langer - Introduction of Very High Bit Rates for NFC and RFID technology - e & i Elektrotechnik und Informationstechnik, Vol. 130, No. 7, 2013, pp. 218-223
Dieser Artikel bietet einen detaillierten Einblick in die sehr hohen Bitraten (VHBR). Einerseits werden Änderungen und Verbesserungen zum ISO/IEC 14443 und der...   mehr
  • Journal
  • Informations und Kommunikationssysteme

Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices

M. Roland, J. Langer - Comparison of the Usability and Security of NFC's Different Operating Modes in Mobile Devices - e & i Elektrotechnik und Informationstechnik, Vol. 130, No. 7, 2013, pp. 201-206
Dieser Artikel zeigt die Vor- und Nachteil der unterschiedlichen Betriebsmodi von NFC in Bezug auf deren Benutzbarkeit und Sicherheit auf. Ausgehend von einer...   mehr
  • Journal
  • Informations und Kommunikationssysteme

Debugging and Rapid Prototyping of NFC Secure Element Applications

M. Roland - Debugging and Rapid Prototyping of NFC Secure Element Applications - Mobile Computing, Applications and Services, Paris, Frankreich, 2013, pp. 298-313
The ecosystem behind secure elements is complex and prevents average developers from creating secure element applications. In this paper we introduce concepts...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines

M. Roland, J. Langer, R. Mayrhofer - (Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines - Proceedings of the 11th International Conference on Advances in Mobile Computing and Multimedia (MoMM2013), Vienna, Österreich, 2013, pp. 286-292
Creating Java Card applications for Near Field Communication's card emulation mode requires access to a secure smartcard chip (the secure element). Today, even...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

Environmental-sensitive Generation of Street Networks for Traffic Simulations

M. Lindorfer, C. Backfrieder, C. Kieslich, J. Kroesche, G. Ostermayer - Environmental-sensitive Generation of Street Networks for Traffic Simulations - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, Vereinigtes Königreich von Großbritannien und Nordirland, 2013, pp. 430-435
  • Tagungsband
  • Informations und Kommunikationssysteme

TraffSim - A Traffic Simulator for Investigating Benefits Ensuing from Intelligent Traffic Management

C. Backfrieder, C. Mecklenbräuker, G. Ostermayer - TraffSim - A Traffic Simulator for Investigating Benefits Ensuing from Intelligent Traffic Management - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, Vereinigtes Königreich von Großbritannien und Nordirland, 2013, pp. 424-429
  • Tagungsband
  • Informations und Kommunikationssysteme

Applying Relay Attacks to Google Wallet

M. Roland, J. Langer, J. Scharinger - Applying Relay Attacks to Google Wallet - Proceedings of the 5th International Workshop on Near Field Communication, Zurich, Schweiz, 2013, pp. 1-6
The recent emergence of Near Field Communication (NFC) enabled smartphones resulted in an increasing interest in NFC security. Several new attack scenarios,...   mehr
  • Tagungsband
  • Informations und Kommunikationssysteme

Analyzing Coexistence Issues in Wireless Radio Networks - The Simulation Environment

R. Neumeier, G. Ostermayer - Analyzing Coexistence Issues in Wireless Radio Networks - The Simulation Environment - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, Vereinigtes Königreich von Großbritannien und Nordirland, 2013, pp. 563-568
  • Tagungsband
  • Informations und Kommunikationssysteme

Generating Driving Trajectories with Mobile Subscription Data for Mobile Network Simulations

C. Kieslich, G. Ostermayer - Generating Driving Trajectories with Mobile Subscription Data for Mobile Network Simulations - Proc. of the 7th European Symposium on Computer Modeling and Simulation, Manchester, Manchester, Vereinigtes Königreich von Großbritannien und Nordirland, 2013, pp. 542-547
  • Tagungsband
  • Informations und Kommunikationssysteme

Effects of SINR Estimation Errors on the DL Cell Throughput of an LTE System in Different Environments

G. Ostermayer, R. Neumeier, S. Eder - Effects of SINR Estimation Errors on the DL Cell Throughput of an LTE System in Different Environments - Proc. of the 11th IEEE Malaysia International Conference on Communications (MICC) 2013, Kuala Lumpur, Kuala Lumpur, Malaysien, 2013, pp. 6
  • Tagungsband
  • Informations und Kommunikationssysteme

Seite 3 von 8
FH Oberösterreich Logo