Denis Foo Kune

According to our database1, Denis Foo Kune authored at least 13 papers between 2008 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Remote cache-timing attacks against AES.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

2013
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
IEEE Trans. Dependable Secur. Comput., 2013

Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
Secur. Commun. Networks, 2013

Towards accurate accounting of cellular data for TCP retransmission.
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, 2013

Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Location leaks over the GSM air interface.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Efficient Private Proximity Testing with GSM Location Sketches.
Proceedings of the Financial Cryptography and Data Security, 2012

2010
Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Timing attacks on PIN input devices.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2008
Attacking the Kad network.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008


  Loading...