Anwendungen und Technik von Near Field Communication (NFC) J Langer, M Roland Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-05496-9, 2010 | 137 | 2010 |
Applying relay attacks to Google Wallet M Roland, J Langer, J Scharinger 2013 5th International Workshop on Near Field Communication (NFC), 1-6, 2013 | 113 | 2013 |
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? M Roland 4th International Workshop on Security and Privacy in Spontaneous …, 2012 | 83 | 2012 |
Security vulnerabilities of the NDEF signature record type M Roland, J Langer, J Scharinger 2011 Third International Workshop on Near Field Communication, 65-70, 2011 | 83 | 2011 |
Digital Signature Records for the NFC Data Exchange Format M Roland, J Langer Near Field Communication (NFC), 2010 Second International Workshop on, 71-76, 2010 | 83 | 2010 |
Practical attack scenarios on secure element-enabled mobile devices M Roland, J Langer, J Scharinger 2012 4th International Workshop on Near Field Communication, 19-24, 2012 | 71 | 2012 |
Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless M Roland, J Langer 7th USENIX Workshop on Offensive Technologies (WOOT '13), 1-12, 2013 | 59 | 2013 |
Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack M Roland Arxiv preprint arXiv:1209.0875, 2012 | 40 | 2012 |
Relay Attacks on Secure Element-Enabled Mobile Devices M Roland, J Langer, J Scharinger Information Security and Privacy Research, 1-12, 2012 | 30* | 2012 |
Security Issues in Mobile NFC Devices M Roland Springer International Publishing, ISBN 978-3-319-15487-9, 2015 | 29 | 2015 |
Automatic impedance matching for 13.56 MHz NFC antennas M Roland, H Witschnig, E Merlin, C Saminger Communication Systems, Networks and Digital Signal Processing, 2008. CNSDSP …, 2008 | 29 | 2008 |
Requirements for an open ecosystem for embedded tamper resistant hardware on mobile devices M Hölzl, R Mayrhofer, M Roland Proceedings of International Conference on Advances in Mobile Computing …, 2013 | 18 | 2013 |
Comparison of the usability and security of NFC's different operating modes in mobile devices. M Roland, J Langer Elektrotech. Inftech. 130 (7), 201-206, 2013 | 16 | 2013 |
Importance of different facial parts for face detection networks P Hofer, M Roland, P Schwarz, M Schwaighofer, R Mayrhofer 9th IEEE International Workshop on Biometrics and Forensics (IWBF 2021), 2021 | 10 | 2021 |
On the state of V3 onion services T Hoeller, M Roland, R Mayrhofer 11th Workshop on Free and Open Communications on the Internet (FOCI ‘21), 2021 | 9 | 2021 |
Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs M Hölzl, M Roland, O Mir, R Mayrhofer Proceedings of SAC 2018: Symposium on Applied Computing, Pau, France, April …, 2018 | 8 | 2018 |
Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification M Hölzl, M Roland, R Mayrhofer Proceedings of the 14th International Conference on Advances in Mobile …, 2016 | 8 | 2016 |
DAMFA: Decentralized Anonymous Multi-Factor Authentication O Mir, M Roland, R Mayrhofer Proceedings of the 2nd ACM International Symposium on Blockchain and Secure …, 2020 | 7 | 2020 |
Real-world Identification for an Extensible and Privacy-preserving Mobile eID M Hölzl, M Roland, R Mayrhofer 12th International IFIP Summer School on Privacy and Identity Management, 2017 | 7 | 2017 |
A password-authenticated secure channel for App to Java Card applet communication M Hölzl, E Asnake, R Mayrhofer, M Roland International Journal of Pervasive Computing and Communications, 2015 | 7 | 2015 |