Kasper Rasmussen
Title
Cited by
Cited by
Year
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the 18th ACM conference on Computer and communications …, 2011
4632011
Implications of radio fingerprinting on the security of sensor networks
KB Rasmussen, S Capkun
2007 Third International Conference on Security and Privacy in …, 2007
2992007
Proximity-based access control for implantable medical devices
KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2492009
Realization of RF Distance Bounding.
KB Rasmussen, S Capkun
USENIX Security Symposium, 389-402, 2010
2262010
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE symposium on security and privacy, 113-127, 2012
1812012
Secure location verification with hidden and mobile base stations
S Capkun, K Rasmussen, M Cagalj, M Srivastava
IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008
1582008
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the 7th international conference on Mobile systems …, 2009
1432009
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
1312014
Location privacy of distance bounding protocols
KB Rasmussen, S Čapkun
Proceedings of the 15th ACM conference on Computer and communications …, 2008
982008
On the security of password manager database formats
P Gasti, KB Rasmussen
European Symposium on Research in Computer Security, 770-787, 2012
792012
Secnav: secure broadcast localization and time synchronization in wireless networks
KB Rasmussen, S Capkun, M Cagalj
Proceedings of the 13th annual ACM international conference on Mobile …, 2007
682007
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
662016
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
582017
Authentication Using Pulse− Response Biometrics
KB Rasmussen, M Roeschlin, I Martinovic, G Tsudik
582014
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Internet Society, 2015
542015
Remote attestation for low-end embedded devices: the prover's perspective
F Brasser, KB Rasmussen, AR Sadeghi, G Tsudik
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
462016
Leaky wires: Information leakage and covert communication between FPGA long wires
I Giechaskiel, KB Rasmussen, K Eguro
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
452018
On bitcoin security in the presence of broken cryptographic primitives
I Giechaskiel, C Cremers, KB Rasmussen
European Symposium on Research in Computer Security, 201-222, 2016
422016
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
392018
S. ˇCapkun. Realization of RF distance bounding
KB Rasmussen
Proceedings of the USENIX Security Symposium, 2010
392010
The system can't perform the operation now. Try again later.
Articles 1–20