Secure positioning in wireless networks
Capkun, S., Hubaux, J.-P.
Published in IEEE journal on selected areas in communications (01.02.2006)
Published in IEEE journal on selected areas in communications (01.02.2006)
Get full text
Journal Article
SoK: Secure Data Deletion
Reardon, J., Basin, D., Capkun, S.
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Get full text
Conference Proceeding
Distance Hijacking Attacks on Distance Bounding Protocols
Cremers, C., Rasmussen, K. B., Schmidt, B., Capkun, S.
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Get full text
Conference Proceeding
GPS-free positioning in mobile ad-hoc networks
Capkun, S., Hamdi, M., Hubaux, J.-P.
Published in Proceedings of the 34th Annual Hawaii International Conference on System Sciences (2001)
Published in Proceedings of the 34th Annual Hawaii International Conference on System Sciences (2001)
Get full text
Conference Proceeding
On Limitations of Friendly Jamming for Confidentiality
Tippenhauer, N. O., Malisa, L., Ranganathan, A., Capkun, S.
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Get full text
Conference Proceeding
Secure Localization with Hidden and Mobile Base Stations
Capkun, S., Cagalj, M., Srivastava, M.
Published in Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications (01.04.2006)
Published in Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications (01.04.2006)
Get full text
Conference Proceeding
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
Karame, G. O., Danev, B., Bannwart, C., Capkun, S.
Published in IEEE transactions on information forensics and security (01.01.2013)
Published in IEEE transactions on information forensics and security (01.01.2013)
Get full text
Journal Article
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
Schaller, P., Schmidt, B., Basin, D., Capkun, S.
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01.07.2009)
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01.07.2009)
Get full text
Conference Proceeding
Self-organized public-key management for mobile ad hoc networks
Capkun, S., Buttyan, L., Hubaux, J.-P.
Published in IEEE transactions on mobile computing (01.01.2003)
Published in IEEE transactions on mobile computing (01.01.2003)
Get full text
Magazine Article
Transient-based identification of wireless sensor nodes
Danev, Boris, Capkun, Srdjan
Published in 2009 International Conference on Information Processing in Sensor Networks (13.04.2009)
Published in 2009 International Conference on Information Processing in Sensor Networks (13.04.2009)
Get full text
Conference Proceeding
Protecting Sensitive Business Information While Sharing Serial-Level Data
Zanetti, D., Capkun, S.
Published in 2008 12th Enterprise Distributed Object Computing Conference Workshops (01.09.2008)
Published in 2008 12th Enterprise Distributed Object Computing Conference Workshops (01.09.2008)
Get full text
Conference Proceeding
Secure Location Verification with Hidden and Mobile Base Stations
Capkun, S., Rasmussen, K.B., Cagalj, M., Srivastava, M.
Published in IEEE transactions on mobile computing (01.04.2008)
Published in IEEE transactions on mobile computing (01.04.2008)
Get full text
Magazine Article
Wormhole-Based Antijamming Techniques in Sensor Networks
Cagalj, M., Capkun, S., Hubaux, J.-P.
Published in IEEE transactions on mobile computing (01.01.2007)
Published in IEEE transactions on mobile computing (01.01.2007)
Get full text
Magazine Article
Mobility helps peer-to-peer security
Capkun, S., Hubaux, J.P., Buttyan, L.
Published in IEEE transactions on mobile computing (01.01.2006)
Published in IEEE transactions on mobile computing (01.01.2006)
Get full text
Magazine Article