Publications

Filter by type:

. Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation for a Privacy-Aware Mobile eID. Proceedings of SAC 2018: Symposium on Applied Computing, 2018.

PDF bibtex DOI

. Real-world Identification for an Extensible and Privacy-preserving Mobile eID. Privacy and Identity Management. The Smart World Revolution - 12th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, 2017.

PDF bibtex

. An Extensible and Privacy-preserving Mobile eID System for Real-world Identification and Offline Verification. The Smart World Revolution - 12th International IFIP Summer School on Privacy and Identity Management (Pre-proceedings), 2017.

bibtex

. Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags. Information, 2017.

PDF bibtex

. Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), 2016.

PDF bibtex DOI

. Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models. Proceedings of the 14th International Conference on Advances in Mobile Computing & Multimedia (MoMM2016), 2016.

PDF bibtex DOI

. DAMN - A Debugging and Manipulation Tool for Android Applications. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), 2016.

bibtex DOI

. A password-authenticated secure channel for App to Java Card applet communication. International Journal of Pervasive Computing and Communications (IJPCC), 2015.

PDF Source bibtex DOI

. Evaluation of Contactless Smartcard Antennas. 2015.

Link bibtex

. Localization in an industrial environment: a case study on the difficulties for positioning in a harsh environment. International Journal of Distributed Sensor Networks, 2015.

PDF bibtex DOI

. Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proceedings of the 12th International Conference on Advances in Mobile Computing & Multimedia (MoMM2014), 2014.

PDF Source bibtex DOI

. A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Proc. Information Security Conference 2014 (ISC), 2014.

PDF bibtex DOI

. Requirements Analysis for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Device. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), 2013.

PDF bibtex DOI

. An Adaptive and Book-Oriented Mobile Touch Screen User Interface Concept for Novice Senior Users. Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia (MoMM2013), 2013.

bibtex DOI

. Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices. Adjunct Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), 2013.

bibtex

. Analysis of Compass Sensor Accuracy on Several Mobile Devices in an Industrial Environment. Second International Workshop on Mobile Computing Platforms and Technologies (MCPT 2013), colocated with Eurocast 2013, 2013.

PDF bibtex