Kasper Rasmussen
TitelGeciteerd doorJaar
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2772011
Implications of radio fingerprinting on the security of sensor networks
KB Rasmussen, S Capkun
2007 Third International Conference on Security and Privacy in …, 2007
2602007
Realization of RF Distance Bounding.
KB Rasmussen, S Capkun
USENIX Security Symposium, 389-402, 2010
1972010
Proximity-based access control for implantable medical devices
KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1902009
Secure location verification with hidden and mobile base stations
K Rasmussen, M Srivastava
IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008
1352008
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
1342012
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the 7th international conference on Mobile systems …, 2009
1182009
Location privacy of distance bounding protocols
KB Rasmussen, S Čapkun
Proceedings of the 15th ACM conference on Computer and communications …, 2008
832008
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
792014
Secnav: secure broadcast localization and time synchronization in wireless networks
KB Rasmussen, S Capkun, M Cagalj
Proceedings of the 13th annual ACM international conference on Mobile …, 2007
582007
Authentication Using Pulse− Response Biometrics
KB Rasmussen, M Roeschlin, I Martinovic, G Tsudik
452014
On the security of password manager database formats
P Gasti, KB Rasmussen
European Symposium on Research in Computer Security, 770-787, 2012
442012
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Internet Society, 2015
332015
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
232017
Remote attestation for low-end embedded devices: the prover's perspective
F Brasser, KB Rasmussen, AR Sadeghi, G Tsudik
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
232016
Mobility independent secret key generation for wearable health-care devices
G Revadigar, C Javali, HJ Asghar, KB Rasmussen, S Jha
Proceedings of the 10th EAI International Conference on Body Area Networks …, 2015
232015
Optimal routing with single backup path protection
T Stidsen, B Petersen, KB Rasmussen, S Spoorendonk, M Zachariasen, ...
232007
iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Capkun
Technical report/ETH Zürich, Department of Computer Science 599, 2012
222012
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Systematic Treatment of Remote Attestation.
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
IACR Cryptology ePrint Archive 2012, 713, 2012
192012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20