Publications

Below is my list of refereed publications and patent applications. Additionally, a number of informal technical notes on various system configuration and programming topics can be found here.

In Conferences Proceedings

  1. Volker Roth, Philipp Schmidt, and Benjamin Güldenring.
    The IR Ring: Authenticating users' touches on a multi-touch display.
    In Proc. UIST, 2010.
    [pdf] Search on Scholar
  2. Volker Roth and Thea Turner.
    Bezel swipe: Conflict-free scrolling and multiple selection on mobile touch screen devices.
    In Proc. CHI, 2009.
    [pdf] Search on Scholar
  3. Volker Roth, Wolfgang Polak, Eleanor Rieffel, and Thea Turner.
    Simple and effective defenses against evil twin access points.
    In Proc. ACM Conference on Wireless Network Security (WiSec), Alexandria, VA, USA, March 2008.
    [pdf] Search on Scholar
  4. Sherman S. Chow, Volker Roth, and Eleanor Rieffel.
    General certificateless encryption and timed-release encryption.
    In Proc. 6th Int'l Conference on Security and Cryptography for Networks (SCN), pages 126-143, Berlin, Heidelberg, 2008. Springer-Verlag.
    Search on Scholar
  5. Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, and Ion Stoica.
    Reliable broadcast in unknown fixed-identity networks.
    In PODC '05: Proceedings of the twenty-fourth annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, pages 342-351, New York, NY, USA, 2005. ACM Press.
    [pdf] Search on Scholar
  6. Volker Roth, Ulrich Pinsdorf, and Jan Peters.
    A distributed content-based search engine based on mobile code.
    In SAC '05: Proceedings of the 2005 ACM Symposium on Applied Computing, pages 66-73, New York, NY, USA, March 2005. ACM Press.
    [pdf] Search on Scholar
  7. Volker Roth, Kai Richter, and Rene Freidinger.
    A PIN entry method resilient against shoulder surfing.
    In Proc. 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, October 2004.
    [pdf] Search on Scholar
  8. Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker, and Randy Katz.
    Listen and Whisper - Security mechanisms for BGP.
    In Proc. Symposium on Networked Systems Design and Implementation (NSDI'04), San Francisco, CA, March 2004. USENIX/ACM.
    [pdf] Search on Scholar
  9. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth, and John Hynd.
    Macro-level attention to mobile agent security: Introducing the mobile agent secure hub infrastructure concept.
    In J. Lopez, S. Qing, and E. Okamoto, editors, Proc. Sixth International Conference on Information and Communications Security (ICICS), number 3269 in Lecture Notes in Computer Science. Springer Verlag, October 2004.
    [pdf] Search on Scholar
  10. Volker Roth.
    Empowering mobile software agents.
    In N. Suri, editor, Proc. 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47-63. Spinger Verlag, October 2002.
    ISBN 3-540-0085-2.
    [pdf] Search on Scholar
  11. Ulrich Pinsdorf and Volker Roth.
    Mobile agent interoperability patterns and practice.
    In Proc. 9th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, Lund, Sweden, April 2002.
    [pdf] Search on Scholar
  12. Walter Binder and Volker Roth.
    Secure mobile agent systems using Java - where are we heading?
    In Proc. 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002. ACM.
    [pdf] Search on Scholar
  13. Volker Roth and Michael Arnold.
    Improved key management for digital watermark monitoring.
    In Proc. SPIE, San Jose, CA, USA, January 2002.
    [pdf] Search on Scholar
  14. Volker Roth.
    On the robustness of some cryptographic protocols for mobile agent protection.
    In Proc. Mobile Agents 2001, volume 2240 of Lecture Notes in Computer Science. Springer Verlag, December 2001.
    [pdf] Search on Scholar
  15. Volker Roth and Jan Peters.
    A scalable and secure global tracking service for mobile agents.
    In Proc. Mobile Agents 2001, volume 2240 of Lecture Notes in Computer Science. Springer Verlag, December 2001.
    [pdf] Search on Scholar
  16. Volker Roth and Mehrdad Jalali.
    Concepts and architecture of a security-centric mobile agent server.
    In Proc. Fifth International Symposium on Autonomous Decentralized Systems (ISADS 2001), pages 435-442, Dallas, Texas, U.S.A., March 2001. IEEE Computer Society.
    ISBN 0-7695-1065-5.
    [pdf] Search on Scholar
  17. Volker Roth, Mehrdad Jalali, Roger Hartmann, and Christophe Roland.
    An application of mobile agents as personal assistants in electronic commerce.
    In Jeffrey Bradshaw and Geoff Arnold, editors, Proc. 5th Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM 2000), pages 121-132, Manchester, UK, April 2000.
    ISBN 1-902426-07-X.
    [pdf] Search on Scholar
  18. Volker Roth.
    Content-based image indexing and retrieval with mobile agents.
    In Proc. First International Symposium on Agent Systems and Applications, and Third International Symposium on Mobile Agents (ASA/MA '99), pages 260-261, Palm Springs, CA, USA, 1999.
    [pdf] Search on Scholar

In Journals

  1. Walter Binder and Volker Roth.
    Security risks in Java-based mobile code systems.
    Scalable Computing: Practice and Experience, 7(4):1-11, December 2006.
    ISSN 1895-1767. Revision of Binder & Roth (2002b).
    [Link] Search on Scholar
  2. Volker Roth and Jan Peters and Ulrich Pinsdorf.
    A distributed content-based search engine based on mobile code and web service technology.
    Scalable Computing: Practice and Experience, 7(4):101-117, December 2006.
    ISSN 1895-1767. Revision of Roth et al. (2005a).
    [Link] Search on Scholar
  3. Volker Roth and Kai Richter.
    How to fend off shoulder surfers.
    Journal of Banking and Finance, 30(6):1727-1751, June 2006.
    Issue on Frontiers in Payment and Settlement Systems. doi:10.1016/j.jbankfin.2005.09.010. Sumbitted November 2005.
    [pdf] Search on Scholar
  4. Volker Roth, Tobias Straub, and Kai Richter.
    Security and usability engineering with particular attention to electronic mail.
    International Journal of Human-Computer Studies, 63:51-73, July 2005.
    Special Issue HCI research in privacy and security.
    [pdf] Search on Scholar
  5. Volker Roth and Mehrdad Jalali.
    Access control and key management for mobile agents.
    Computers & Graphics, Special Issue on Data Security in Image Communication and Networks, 22(4):457-461, 1998.
    [pdf] Search on Scholar
  6. Volker Roth.
    Content-based retrieval from digital video.
    Image and Vision Computing, special issue on Content-Based Image Indexing and Retrieval, 17(7):531-540, May 1999.
    ISSN 0262-8856.
    [pdf] Search on Scholar

Monographs and Book Chapters

  1. Volker Roth.
    Sicherheit und Rechtsverbindlichkeit mobiler Agenten, chapter 6, pages 73-89.
    DuD Fachbeiträge. Deutscher Universitäts-Verlag, 2007.
    Search on Scholar
  2. Jan Peters, Ulrich Pinsdorf, and Volker Roth.
    Sicherheit und Rechtsverbindlichkeit mobiler Agenten, chapter 3, pages 21-39.
    DuD Fachbeiträge. Deutscher Universitäts-Verlag, 2007.
    Search on Scholar
  3. Kai Richter and Volker Roth.
    Encyclopedia of Human Computer Interaction, chapter Human-Computer Interaction and Security.
    Information Science Publishing, Idea Group, Inc., USA, December 2005.
    Search on Scholar
  4. Volker Roth.
    Sichere verteilte Indexierung und Suche von digitalen Bildern.
    Forschen und Wissen. GCA-Verlag, Herdecke, Germany, June 2001.
    ISBN 3-89863-051-X.
    Search on Scholar
  5. Volker Roth.
    Über die Bedeutung eines statischen Kernes für die Sicherheit Mobiler Software-Agenten.
    In Kommunikationssicherheit im Zeichen des Internet, DuD Fachbeiträge, pages 227-234. Vieweg-Verlag, March 2001.
    [pdf] Search on Scholar
  6. Volker Roth and Vania Conan.
    Encrypting Java Archives and its application to mobile agent security.
    In Frank Dignum and Carles Sierra, editors, Agent Mediated Electronic Commerce: A European Perspective, volume 1991 of Lecture Notes in Artifical Intelligence, pages 232-244. Springer Verlag, Berlin, 2001.
    [pdf] Search on Scholar
  7. Volker Roth.
    Mutual protection of co-operating agents.
    In Jan Vitek and Christian Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science, pages 275-285. Springer-Verlag Inc., New York, NY, USA, 1999.
    [pdf] Search on Scholar

In Peer-Reviewed Workshops

  1. Volker Roth.
    Programming Satan's agents.
    In Klaus Fischer and Dieter Hutter, editors, Proc 1st International Workshop on Secure Mobile Multi-Agent Systems (SEMAS 2001), volume 63 of Electronic Notes in Theoretical Computer Science. Elsevier Science Publishers, 2002.
    ISBN 0444512268.
    [pdf] Search on Scholar
  2. Volker Roth.
    Scalable and secure global name services for mobile agents.
    In 6th ECOOP Workshop on Mobile Object Systems: Operating System Support, Security and Programming Languages, Sophia Antipolis, France, June 2000.
    [pdf] Search on Scholar
  3. Volker Roth.
    Secure recording of itineraries through cooperating agents.
    In Proc. 4th ECOOP Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pages 147-154, Brussels, Belgium, July 1998. INRIA, Domaine de Voluceau, Rocquencourt, B.P. 105, 78153 Le Chesnay Cedex (France), Dépot légal 010598/150.
    [pdf] Search on Scholar
  4. Volker Roth.
    Distributed image indexing and retrieval with mobile agents.
    In IEE European Workshop on Distributed Imaging, number 1999/109 in IEE Electronics & Communications, pages 14/1-14/5, Savoy Place, London, WC2R 0BL, UK, November 1999. IEE.
    ISSN 0963-3308.
    [pdf] Search on Scholar

Invited Publications

  1. Volker Roth.
    Obstacles to the adoption of mobile agents.
    In Proc. IEEE Int'l Conference on Mobile Data Management, Berkeley, CA, January 2004. IEEE, ACM SIGMOBILE, ACM SIGMOD.
    Invited panel session.
    [pdf] Search on Scholar
  2. Volker Roth.
    Java Security Architecture and Extensions.
    Dr. Dobbs Journal, 2002(335), April 2002.
    [pdf] Search on Scholar
  3. Volker Roth.
    Mobile Agenten Sicherheit.
    Funkschau, 2000(6):48-50, 2000.
    [pdf] Search on Scholar
  4. Christoph Busch, Volker Roth, and Ralph Meister.
    Perspectives on electronic commerce with mobile agents.
    In S. Rodinov and M. Vinogradov, editors, Proc. 11th Amaldi Conference on Problems of Global Security, pages 89-101, Moscow, Russia, November 1998. Russian Academy of Sciences, Nauka Publishers, 1999.
    ISBN 5-02-022594-0, Invited paper.
    [pdf] Search on Scholar

Theses

  1. Volker Roth.
    Sichere verteilte Indexierung und Suche von digitalen Bildern.
    Forschen und Wissen. GCA-Verlag, Herdecke, Germany, June 2001.
    ISBN 3-89863-051-X.
    Search on Scholar
  2. Volker Roth.
    Content-based retrieval from digital video.
    Diplomarbeit, Technische Universität Darmstadt, Darmstadt, Germany, March 1995.
    Search on Scholar

Patent Applications

  1. Volker Roth, Laurent Denoue, Qiong Liu, and Scott Carter.
    Improving interactions on mobile devices using large displays.
    United states patent application, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, December 2008.
    Search on Scholar
  2. Volker Roth.
    Multiple selection on devices with many gestures.
    United states patent application, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, August 2008.
    Search on Scholar
  3. Bee Liew, Trista Chen, and Volker Roth.
    Passcollage for user authentication.
    United states patent application, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, August 2008.
    Search on Scholar
  4. Scott Carter, Maribeth Beck, and Volker Roth.
    Using mobile sensors to drive avatar actions automatically.
    United states patent application, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, April 2008.
    Search on Scholar
  5. Volker Roth.
    Text-reading support on handheld devices.
    United states patent application, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, September 2008.
    Search on Scholar
  6. Volker Roth and Thea Turner.
    Progress indicators to encourage more secure behaviors.
    United states patent application, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, September 2007.
    Search on Scholar
  7. Volker Roth, Wolfgang Polak, and Eleanor Rieffel.
    System and method for human assisted secure information exchange.
    United States Patent Application 20080195866, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, February 2007.
    Search on Scholar
  8. Volker Roth.
    System and method for providing secure disclosure of a secret.
    Canadian Patent application 2,511,109, OGM Laboratory LLC, 6825 Pine St., Omaha, NE 68106, USA, February 2005.
    Search on Scholar
  9. Volker Roth.
    System and method for providing secure disclosure of a secret.
    United States Patent application 20060179471, OGM Laboratory LLC, 6825 Pine St., Omaha, NE 68106, USA, February 2005.
    Search on Scholar