Shake well before use: Authentication based on accelerometer data R Mayrhofer, H Gellersen International Conference on Pervasive Computing, 144-161, 2007 | 350 | 2007 |
Shake well before use: Intuitive and secure pairing of mobile devices R Mayrhofer, H Gellersen IEEE Transactions on Mobile Computing 8 (6), 792-806, 2009 | 322 | 2009 |
Smartphone-based gait recognition: From authentication to imitation M Muaaz, R Mayrhofer IEEE Transactions on Mobile Computing 16 (11), 3209-3221, 2017 | 206 | 2017 |
An architecture for context prediction R Mayrhofer Trauner Verlag, 2005 | 198 | 2005 |
Recognizing and predicting context by learning from user behavior R Mayrhofer, H Radi, A Ferscha na, 2003 | 113 | 2003 |
The Android Platform Security Model R Mayrhofer, JV Stoep, C Brubaker, N Kralevich ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-35, 2021 | 104 | 2021 |
An analysis of different approaches to gait recognition using cell phone based accelerometers M Muaaz, R Mayrhofer Proceedings of International Conference on Advances in Mobile Computing …, 2013 | 101 | 2013 |
A human-verifiable authentication protocol using visible laser light R Mayrhofer, M Welch The Second International Conference on Availability, Reliability and …, 2007 | 83 | 2007 |
A survey of user interaction for spontaneous device association MK Chong, R Mayrhofer, H Gellersen ACM Computing Surveys (CSUR) 47 (1), 1-40, 2014 | 82 | 2014 |
Context prediction based on context histories: Expected benefits, issues and current state-of-the-art R Mayrhofer Cognitive science research paper-University of Sussex CSRP 577, 31, 2005 | 72 | 2005 |
A large-scale, long-term analysis of mobile device usage characteristics D Hintze, P Hintze, RD Findling, R Mayrhofer Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2017 | 67 | 2017 |
A light-weight component model for peer-to-peer applications A Ferscha, M Hechinger, R Mayrhofer, R Oberhauser 24th International Conference on Distributed Computing Systems Workshops …, 2004 | 64 | 2004 |
Digital aura A Ferscha, M Hechinger, R Mayrhofer, M dos Santos Rocha, M Franz, ... Hochschule Aalen, 2004 | 60 | 2004 |
The candidate key protocol for generating secret shared keys from similar sensor data streams R Mayrhofer Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop …, 2007 | 59 | 2007 |
Orientation independent cell phone based gait authentication M Muaaz, R Mayrhofer Proceedings of the 12th International Conference on Advances in Mobile …, 2014 | 57 | 2014 |
Mobile device usage characteristics: The effect of context and form factor on locked and unlocked usage D Hintze, RD Findling, S Scholz, R Mayrhofer Proceedings of the 12th international conference on advances in mobile …, 2014 | 52 | 2014 |
A framework for on-device privilege escalation exploit execution on Android S Höbarth, R Mayrhofer Proceedings of IWSSI/SPMU, 2011 | 47 | 2011 |
On the Security of Ultrasound as Out-of-band Channel R Mayrhofer, H Gellersen 2007 IEEE International Parallel and Distributed Processing Symposium, 1-6, 2007 | 47 | 2007 |
SAPHE: simple accelerometer based wireless pairing with heuristic trees B Groza, R Mayrhofer Proceedings of the 10th International Conference on Advances in Mobile …, 2012 | 45 | 2012 |
Towards face unlock: on the difficulty of reliably detecting faces on mobile phones RD Findling, R Mayrhofer Proceedings of the 10th International Conference on Advances in Mobile …, 2012 | 44 | 2012 |