Srdjan Capkun

Affiliations:
  • ETH Zurich


According to our database1, Srdjan Capkun authored at least 211 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 2019, "For contributions to systems and wireless network security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Time for Change: How Clocks Break UWB Secure Ranging.
Proceedings of the 32nd USENIX Security Symposium, 2023

EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

On Location Privacy and Security of Positioning in Modern Systems.
Proceedings of the 8th International Conference on Internet of Things, 2023

2022
Composite Enclaves: Towards Disaggregated Trusted Execution.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

On (the Lack of) Code Confidentiality in Trusted Execution Environments.
CoRR, 2022

It's TEEtime: Bringing User Sovereignty to Smartphones.
CoRR, 2022

Empowering Data Centers for Next Generation Trusted Computing.
CoRR, 2022

SoK: Hardware-supported Trusted Execution Environments.
CoRR, 2022

Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
Proceedings of the 31st USENIX Security Symposium, 2022

LTrack: Stealthy Tracking of Mobile Phones in LTE.
Proceedings of the 31st USENIX Security Symposium, 2022

Phishing in Organizations: Findings from a Large-Scale and Long-Term Study.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

V-Range: Enabling Secure Ranging in 5G Wireless Networks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

AdaptOver: adaptive overshadowing attacks in cellular networks.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation.
IACR Cryptol. ePrint Arch., 2021

AdaptOver : Adaptive Overshadowing of LTE signals.
CoRR, 2021

Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones.
CoRR, 2021

Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend.
Proceedings of the 30th USENIX Security Symposium, 2021

Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

ROSEN: RObust and SElective Non-repudiation (for TLS).
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

Security of Multicarrier Time-of-Flight Ranging.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Dedicated Security Chips in the Age of Secure Enclaves.
IEEE Secur. Priv., 2020

Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
IACR Cryptol. ePrint Arch., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020

2FE: Two-Factor Encryption for Cloud Storage.
CoRR, 2020

PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment.
CoRR, 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

Digital Contact Tracing.
Proceedings of the 29th USENIX Security Symposium, 2020

Snappy: Fast On-chain Payments with Practical Collaterals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

ProximiTEE: Hardened SGX Attestation by Proximity Verification.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Securing Cloud Data Under Key Exposure.
IEEE Trans. Cloud Comput., 2019

Secure Brokered Delegation Through DelegaTEE.
IEEE Secur. Priv., 2019

ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.
IACR Cryptol. ePrint Arch., 2019

Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband.
IACR Cryptol. ePrint Arch., 2019

Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement.
IACR Cryptol. ePrint Arch., 2019

ProtectIOn: Root-of-Trust for IO in Compromised Platforms.
IACR Cryptol. ePrint Arch., 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

Cyber-Risks in Paper Voting.
CoRR, 2019

TEEvil: Identity Lease via Trusted Execution Environments.
CoRR, 2019

2FA-PP: 2nd factor phishing prevention.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Digital radio signal cancellation attacks: an experimental evaluation.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Deniable Upload and Download via Passive Participation.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

PRCash: Fast, Private and Regulated Transactions for Digital Currencies.
Proceedings of the Financial Cryptography and Data Security, 2019

DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Toward Shared Ownership in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Blockchain Security and Privacy.
IEEE Secur. Priv., 2018

PRCash: Centrally-Issued Digital Currency with Privacy and Regulation.
IACR Cryptol. ePrint Arch., 2018

ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution.
IACR Cryptol. ePrint Arch., 2018

BITE: Bitcoin Lightweight Client Privacy using Trusted Execution.
IACR Cryptol. ePrint Arch., 2018

DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2018

ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification.
IACR Cryptol. ePrint Arch., 2018

I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Secure Positioning and Location-Based Security for IoT and Beyond.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Are We Really Close? Verifying Proximity in Wireless Systems.
IEEE Secur. Priv., 2017

CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks.
IACR Cryptol. ePrint Arch., 2017

UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks.
IACR Cryptol. ePrint Arch., 2017

TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation.
IACR Cryptol. ePrint Arch., 2017

Towards Shared Ownership in the Cloud.
IACR Cryptol. ePrint Arch., 2017

μchain: How to Forget without Hard Forks.
IACR Cryptol. ePrint Arch., 2017

On the Security of Carrier Phase-based Ranging.
IACR Cryptol. ePrint Arch., 2017

ROTE: Rollback Protection for Trusted Execution.
IACR Cryptol. ePrint Arch., 2017

Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
IACR Cryptol. ePrint Arch., 2017

IntegriKey: End-to-End Integrity Protection of User Input.
IACR Cryptol. ePrint Arch., 2017

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Using hover to compromise the confidentiality of user input on Android.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2016
On the Security and Performance of Proof of Work Blockchains.
IACR Cryptol. ePrint Arch., 2016

Quantifying Web Adblocker Privacy.
IACR Cryptol. ePrint Arch., 2016

Exploring Website Location as a Security Indicator.
CoRR, 2016

Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
CoRR, 2016

Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals.
CoRR, 2016

Physical-layer integrity for wireless messages.
Comput. Networks, 2016

Verena: End-to-End Integrity Protection for Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

SALVE: server authentication with location verification.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

SPREE: a spoofing resistant GPS receiver.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Mobile Application Impersonation Detection Using Dynamic User Interface Extraction.
Proceedings of the Computer Security - ESORICS 2016, 2016

Quantifying Location Privacy Leakage from Transaction Prices.
Proceedings of the Computer Security - ESORICS 2016, 2016

Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

On Information Leakage in Deduplicated Storage Systems.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

Types and Origins of Fingerprints.
Proceedings of the Digital Fingerprinting, 2016

2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability.
ACM Trans. Inf. Syst. Secur., 2015

Introduction to the Issue on Signal and Information Processing for Privacy.
IEEE J. Sel. Top. Signal Process., 2015

W-SPS: Designing a Wide-Area Secure Positioning System.
IACR Cryptol. ePrint Arch., 2015

Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception.
IACR Cryptol. ePrint Arch., 2015

Quantifying Location Privacy Leakage from Transaction Prices.
IACR Cryptol. ePrint Arch., 2015

Tampering with the Delivery of Blocks and Transactions in Bitcoin.
IACR Cryptol. ePrint Arch., 2015

Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015

UWB rapid-bit-exchange system for distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Thermal Covert Channels on Multi-core Platforms.
Proceedings of the 24th USENIX Security Symposium, 2015

Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.
Proceedings of the 24th USENIX Security Symposium, 2015

Commune: Shared Ownership in an Agnostic Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Proximity Verification for Contactless Access Control and Authentication Systems.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Logical Partitions on Many-Core Platforms.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Microcomputations as Micropayments in Web-based Services.
ACM Trans. Internet Techn., 2014

On Secure Data Deletion.
IEEE Secur. Priv., 2014

Is Bitcoin a Decentralized Currency?
IEEE Secur. Priv., 2014

Isolated Execution on Many-core Architectures.
IACR Cryptol. ePrint Arch., 2014

Securing Cloud Data in the New Attacker Model.
IACR Cryptol. ePrint Arch., 2014

On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients.
IACR Cryptol. ePrint Arch., 2014

Low-power Distance Bounding.
CoRR, 2014

Short paper: detection of GPS spoofing attacks in power grids.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Smartphones as Practical and Secure Location Verification Tokens for Payments.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Enforcing Location and Time-Based Access Control on Cloud-Stored Data.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Enabling Short Fragments for Uncoordinated Spread Spectrum Communication.
Proceedings of the Computer Security - ESORICS 2014, 2014

Quantifying Web-Search Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Assisted deletion of related content.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions.
IEEE Trans. Inf. Forensics Secur., 2013

On Limitations of Friendly Jamming for Confidentiality.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SoK: Secure Data Deletion.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Tailing RFID Tags for Clone Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

For some eyes only: protecting online information sharing.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Secure data deletion from persistent media.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

An architecture for concurrent execution of secure environments in clouds.
Proceedings of the CCSW'13, 2013

Secure enrollment and practical migration for mobile trusted execution environments.
Proceedings of the SPSM'13, 2013

2012
Towards Practical Identification of HF RFID Devices.
ACM Trans. Inf. Syst. Secur., 2012

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.
IACR Cryptol. ePrint Arch., 2012

Evaluating User Privacy in Bitcoin.
IACR Cryptol. ePrint Arch., 2012

On physical-layer identification of wireless devices.
ACM Comput. Surv., 2012

The research value of publishing attacks.
Commun. ACM, 2012

Physical-layer attacks on chirp-based ranging systems.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Distance Hijacking Attacks on Distance Bounding Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Proceedings of the Computer Security - ESORICS 2012, 2012

User-level secure deletion on log-structured file systems.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Double-spending fast payments in bitcoin.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

4th cloud computing security workshop (CCSW 2012).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Enabling trusted scheduling in embedded systems.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Analysis of the communication between colluding applications on modern smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Uncoordinated Frequency Hopping Spread Spectrum.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Uncoordinated Direct Sequence Spread Spectrum.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Distance Bounding Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Jamming Resistance.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Formal Reasoning about Physical Properties of Security Protocols.
ACM Trans. Inf. Syst. Secur., 2011

Distance Hijacking Attacks on Distance Bounding Protocols.
IACR Cryptol. ePrint Arch., 2011

Secure Deletion on Log-structured File Systems
CoRR, 2011

Pay as you browse: microcomputations as micropayments in web-based services.
Proceedings of the 20th International Conference on World Wide Web, 2011

Group Distance Bounding Protocols - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Home is safer than the cloud!: privacy concerns for consumer cloud storage.
Proceedings of the Symposium On Usable Privacy and Security, 2011

On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Investigation of Signal and Message Manipulations on the Wireless Channel.
Proceedings of the Computer Security - ESORICS 2011, 2011

On the requirements for successful GPS spoofing attacks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Privacy-preserving outsourcing of brute-force key searches.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Enabling secure VM-vTPM migration in private clouds.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Detection of reactive jamming in sensor networks.
ACM Trans. Sens. Networks, 2010

Integrity Regions: Authentication through Presence in Wireless Networks.
IEEE Trans. Mob. Comput., 2010

Anti-jamming broadcast communication using uncoordinated spread spectrum techniques.
IEEE J. Sel. Areas Commun., 2010

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
IACR Cryptol. ePrint Arch., 2010

GDB: Group Distance Bounding Protocols
CoRR, 2010

Attacks on physical-layer identification.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Realization of RF Distance Bounding.
Proceedings of the 19th USENIX Security Symposium, 2010

Influence of user perception, security needs, and social factors on device pairing method choices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Physical-layer identification of UHF RFID tags.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

Low-Cost Client Puzzles Based on Modular Exponentiation.
Proceedings of the Computer Security, 2010

Keeping data secret under full compromise using porter devices.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Secure Ranging With Message Temporal Integrity.
IACR Cryptol. ePrint Arch., 2009

Jamming-resistant Broadcast Communication without Shared Keys.
Proceedings of the 18th USENIX Security Symposium, 2009

Physical-layer Identification of RFID Devices.
Proceedings of the 18th USENIX Security Symposium, 2009

Let's Get Physical: Models and Methods for Real-World Security Protocols.
Proceedings of the Theorem Proving in Higher Order Logics, 22nd International Conference, 2009

On the Security of Bottleneck Bandwidth Estimation Techniques.
Proceedings of the Security and Privacy in Communication Networks, 2009

Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Attacks on public WLAN-based positioning systems.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Efficient uncoordinated FHSS anti-jamming communication.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Transient-based identification of wireless sensor nodes.
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009

Secure Remote Execution of Sequential Computations.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

ID-Based Secure Distance Bounding and Localization.
Proceedings of the Computer Security, 2009

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Proximity-based access control for implantable medical devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Secure Location Verification with Hidden and Mobile Base Stations.
IEEE Trans. Mob. Comput., 2008

Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
ACM Trans. Inf. Syst. Secur., 2008

Secure Time Synchronization in Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels.
IEEE Trans. Dependable Secur. Comput., 2008

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.
IEEE Commun. Mag., 2008

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Protecting Sensitive Business Information While Sharing Serial-Level Data.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Location privacy of distance bounding protocols.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Securing Timing Synchronization in Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Securing Localization in Wireless Networks <i>(using Verifiable Multilateration and Covert Base Stations)</i>.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Wormhole-Based Antijamming Techniques in Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Implications of radio fingerprinting on the security of sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

SecNav: secure broadcast localization and time synchronization in wireless networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

BAP: Broadcast Authentication Using Cryptographic Puzzles.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Mobility Helps Peer-to-Peer Security.
IEEE Trans. Mob. Comput., 2006

Key Agreement in Peer-to-Peer Wireless Networks.
Proc. IEEE, 2006

Secure positioning in wireless networks.
IEEE J. Sel. Areas Commun., 2006

Integrity regions: authentication through presence in wireless networks.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Secure Localization with Hidden and Mobile Base Stations.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Secure time synchronization service for sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Distance enlargement and reduction attacks on ultrasound ranging.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

Rope: robust position estimation in wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

Secure positioning of wireless devices with application to sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
J. Comput. Secur., 2004

The Security and Privacy of Smart Vehicles.
IEEE Secur. Priv., 2004

SOWER: self-organizing wireless network for messaging.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

2003
Self-Organized Public-Key Management for Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2003

BISS: building secure routing out of an incomplete set of security associations.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

SECTOR: secure tracking of node encounters in multi-hop wireless networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Mobility helps security in ad hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

2002
GPS-free Positioning in Mobile Ad Hoc Networks.
Clust. Comput., 2002

Small worlds in security systems: an analysis of the PGP certificate graph.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

A Formal Analysis of Syverson?s Rational Exchange Protocol.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Self-organization in mobile ad hoc networks: the approach of Terminodes.
IEEE Commun. Mag., 2001

The quest for security in mobile ad hoc networks.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001


  Loading...