Kasper Rasmussen
Titel
Geciteerd door
Geciteerd door
Jaar
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the 18th ACM conference on Computer and communications …, 2011
4392011
Implications of radio fingerprinting on the security of sensor networks
KB Rasmussen, S Capkun
2007 Third International Conference on Security and Privacy in …, 2007
2952007
Proximity-based access control for implantable medical devices
KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2482009
Realization of RF Distance Bounding.
KB Rasmussen, S Capkun
USENIX Security Symposium, 389-402, 2010
2212010
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
1812012
Secure location verification with hidden and mobile base stations
S Capkun, K Rasmussen, M Cagalj, M Srivastava
IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008
1562008
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the 7th international conference on Mobile systems …, 2009
1382009
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
1282014
Location privacy of distance bounding protocols
KB Rasmussen, S Čapkun
Proceedings of the 15th ACM conference on Computer and communications …, 2008
972008
On the security of password manager database formats
P Gasti, KB Rasmussen
European Symposium on Research in Computer Security, 770-787, 2012
772012
Secnav: secure broadcast localization and time synchronization in wireless networks
KB Rasmussen, S Capkun, M Cagalj
Proceedings of the 13th annual ACM international conference on Mobile …, 2007
672007
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
602016
Authentication Using Pulse− Response Biometrics
KB Rasmussen, M Roeschlin, I Martinovic, G Tsudik
562014
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
552017
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Internet Society, 2015
512015
Remote attestation for low-end embedded devices: the prover's perspective
F Brasser, KB Rasmussen, AR Sadeghi, G Tsudik
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
452016
On bitcoin security in the presence of broken cryptographic primitives
I Giechaskiel, C Cremers, KB Rasmussen
European Symposium on Research in Computer Security, 201-222, 2016
422016
Leaky wires: Information leakage and covert communication between FPGA long wires
I Giechaskiel, KB Rasmussen, K Eguro
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
412018
S. ˇCapkun. Realization of RF distance bounding
KB Rasmussen
Proceedings of the USENIX Security Symposium, 2010
392010
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
352018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20