Kasper Rasmussen
제목
인용
인용
연도
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the 18th ACM conference on Computer and communications …, 2011
4442011
Implications of radio fingerprinting on the security of sensor networks
KB Rasmussen, S Capkun
2007 Third International Conference on Security and Privacy in …, 2007
2972007
Proximity-based access control for implantable medical devices
KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2482009
Realization of RF Distance Bounding.
KB Rasmussen, S Capkun
USENIX Security Symposium, 389-402, 2010
2222010
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
1822012
Secure location verification with hidden and mobile base stations
S Capkun, K Rasmussen, M Cagalj, M Srivastava
IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008
1572008
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the 7th international conference on Mobile systems …, 2009
1392009
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
1302014
Location privacy of distance bounding protocols
KB Rasmussen, S Čapkun
Proceedings of the 15th ACM conference on Computer and communications …, 2008
982008
On the security of password manager database formats
P Gasti, KB Rasmussen
European Symposium on Research in Computer Security, 770-787, 2012
772012
Secnav: secure broadcast localization and time synchronization in wireless networks
KB Rasmussen, S Capkun, M Cagalj
Proceedings of the 13th annual ACM international conference on Mobile …, 2007
672007
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
612016
Authentication Using Pulse− Response Biometrics
KB Rasmussen, M Roeschlin, I Martinovic, G Tsudik
572014
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
562017
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Internet Society, 2015
522015
Remote attestation for low-end embedded devices: the prover's perspective
F Brasser, KB Rasmussen, AR Sadeghi, G Tsudik
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
452016
On bitcoin security in the presence of broken cryptographic primitives
I Giechaskiel, C Cremers, KB Rasmussen
European Symposium on Research in Computer Security, 201-222, 2016
432016
Leaky wires: Information leakage and covert communication between FPGA long wires
I Giechaskiel, KB Rasmussen, K Eguro
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
412018
S. ˇCapkun. Realization of RF distance bounding
KB Rasmussen
Proceedings of the USENIX Security Symposium, 2010
392010
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
362018
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20