default search action
Michael Roland 0001
Person information
- affiliation: Johannes Kepler University, Linz, Austria
- affiliation (former): University of Applied Sciences Upper Austria, Hagenberg, Austria
- affiliation (former): NFC Research Lab Hagenberg, Austria
Other persons with the same name
- Michael Roland 0002 — Saarland University, Saarbrücken, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Philipp Hofer, Michael Roland, René Mayrhofer:
BioDSSL: A Domain Specific Sensor Language for Global, Distributed, Biometric Identification Systems. IS 2024: 1-7 - [i6]Mario Lins, René Mayrhofer, Michael Roland, Daniel Hofer, Martin Schwaighofer:
On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ. CoRR abs/2404.08987 (2024) - 2023
- [j9]Philipp Hofer, Michael Roland, René Mayrhofer, Philipp Schwarz:
Optimizing Distributed Face Recognition Systems through Efficient Aggregation of Facial Embeddings. Adv. Artif. Intell. Mach. Learn. 3(1): 693-711 (2023) - [j8]Michael Roland, Tobias Höller, René Mayrhofer:
Digitale Identitäten in der physischen Welt: Eine Abwägung von Privatsphäreschutz und Praktikabilität. HMD Prax. Wirtsch. 60(2): 283-307 (2023) - [c18]Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer:
Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments. ICISSP 2023: 279-286 - [c17]Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer:
Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices. MoMM 2023: 129-143 - [c16]Mario Lins, René Mayrhofer, Michael Roland, Alastair R. Beresford:
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems. NordSec 2023: 185-203 - 2022
- [j7]Omid Mir, Michael Roland, René Mayrhofer:
Decentralized, Privacy-Preserving, Single Sign-On. Secur. Commun. Networks 2022: 9983995:1-9983995:18 (2022) - [c15]Manuel Pöll, Michael Roland:
Automating the Quantitative Analysis of Reproducibility for Build Artifacts derived from the Android Open Source Project. WISEC 2022: 6-19 - [i5]Philipp Hofer, Michael Roland, Philipp Schwarz, René Mayrhofer:
Efficient aggregation of face embeddings for decentralized face recognition deployments (extended version). CoRR abs/2212.10108 (2022) - 2021
- [c14]Tobias Höller, Michael Roland, René Mayrhofer:
Analyzing inconsistencies in the Tor consensus. iiWAS 2021: 485-494 - [c13]Philipp Hofer, Michael Roland, Philipp Schwarz, Martin Schwaighofer, René Mayrhofer:
Importance of different facial parts for face detection networks. IWBF 2021: 1-6 - [c12]Tobias Höller, Michael Roland, René Mayrhofer:
On the state of V3 onion services. FOCI@SIGCOMM 2021: 50-56 - [c11]Tobias Höller, Thomas Raab, Michael Roland, René Mayrhofer:
On the feasibility of short-lived dynamic onion services. SP (Workshops) 2021: 25-30 - 2020
- [j6]Michael Hölzl, Michael Roland, Omid Mir, René Mayrhofer:
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. Int. J. Inf. Sec. 19(4): 401-417 (2020) - [c10]Omid Mir, Michael Roland, René Mayrhofer:
DAMFA: Decentralized Anonymous Multi-Factor Authentication. BSCI 2020: 10-19 - [e2]René Mayrhofer, Michael Roland:
WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020. ACM 2020, ISBN 978-1-4503-8006-5 [contents] - [e1]René Mayrhofer, Michael Roland:
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020. ACM 2020, ISBN 978-1-4503-8007-2 [contents]
2010 – 2019
- 2018
- [c9]Michael Hölzl, Michael Roland, Omid Mir, René Mayrhofer:
Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs. SAC 2018: 1601-1609 - 2017
- [j5]Fernando Kaway Carvalho Ota, Michael Roland, Michael Hölzl, René Mayrhofer, Aleardo Manacero:
Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags. Inf. 8(3): 81 (2017) - [c8]Michael Hölzl, Michael Roland, René Mayrhofer:
Real-World Identification for an Extensible and Privacy-Preserving Mobile eID. Privacy and Identity Management 2017: 354-370 - 2016
- [c7]Michael Hölzl, Michael Roland, René Mayrhofer:
Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification. MoMM 2016: 280-283 - [i4]Michael Roland, Michael Hölzl:
Open Mobile API: Accessing the UICC on Android Devices. CoRR abs/1601.03027 (2016) - [i3]Michael Roland:
Executing Arbitrary Code in the Context of the Smartcard System Service. CoRR abs/1601.05833 (2016) - 2015
- [j4]Michael Hölzl, Endalkachew Asnake, Rene Mayrhofer, Michael Roland:
A password-authenticated secure channel for App to Java Card applet communication. Int. J. Pervasive Comput. Commun. 11(4): 374-397 (2015) - [i2]Michael Roland, Michael Hölzl:
Evaluation of Contactless Smartcard Antennas. CoRR abs/1507.06427 (2015) - 2014
- [j3]Michael Roland, Josef Langer, Rene Mayrhofer:
Managing the life cycle of Java Card applets in other Java virtual machines. Int. J. Pervasive Comput. Commun. 10(3): 291-312 (2014) - [c6]Michael Hölzl, Endalkachew Asnake, René Mayrhofer, Michael Roland:
Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. MoMM 2014: 147-156 - 2013
- [j2]Michael Roland, Josef Langer:
Comparison of the usability and security of NFC's different operating modes in mobile devices. Elektrotech. Informationstechnik 130(7): 201-206 (2013) - [c5]Michael Roland:
Debugging and Rapid Prototyping of NFC Secure Element Applications. MobiCASE 2013: 298-313 - [c4]Michael Hölzl, René Mayrhofer, Michael Roland:
Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices. MoMM 2013: 249 - [c3]Michael Roland, Josef Langer, René Mayrhofer:
(Ab)using foreign VMs: Running Java Card Applets in non-Java Card Virtual Machines. MoMM 2013: 286 - [c2]Michael Roland, Josef Langer:
Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless. WOOT 2013 - 2012
- [c1]Michael Roland, Josef Langer, Josef Scharinger:
Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited. SEC 2012: 1-12 - [i1]Michael Roland:
Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack. CoRR abs/1209.0875 (2012)
2000 – 2009
- 2009
- [j1]Harald Witschnig, Michael Roland, Martin Gossar, Harald Enzinger:
Parameter characterisation and automatic impedance matching of 13.56 MHz NFC antennas. Elektrotech. Informationstechnik 126(11): 415-422 (2009)
Coauthor Index
aka: Rene Mayrhofer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint