Name
Affiliation
Papers
CHRISTINA PÖPPER
ETH Zurich
35
Collaborators
Citations 
PageRank 
45
476
33.27
Referers 
Referees 
References 
1067
662
346
Search Limit
1001000
Title
Citations
PageRank
Year
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor00.342021
Trust The Crowd: Wireless Witnessing To Detect Attacks On Ads-B-Based Air-Traffic Surveillance00.342021
High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security00.342021
5G SUCI-catchers: still catching them all?00.342021
Exploring user perceptions of deletion in mobile instant messaging applications.00.342020
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors00.342020
DeepSIM - GPS Spoofing Detection on UAVs using Satellite Imagery Matching.10.362020
IMP4GT: IMPersonation Attacks in 4G NeTworks20.352020
Protecting wi-fi beacons from outsider forgeries00.342020
LTE security disabled: misconfiguration in commercial networks10.352019
Towards Contractual Agreements For Revocation Of Online Data00.342019
Breaking LTE on Layer Two50.432019
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two10.352019
On the Challenges of Geographical Avoidance for Tor.00.342019
On Security Research towards Future Mobile Network Generations.20.402018
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting.00.342018
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks50.452018
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers.00.342017
POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.00.342017
POSTER: Traffic Analysis Attacks in Anonymity Networks.20.372017
SkypeLine: Robust Hidden Data Transmission for VoIP.20.362016
Multi-receiver GPS spoofing detection: error models and realization.50.492016
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data.60.452016
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness.30.432016
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness.00.342016
A practical investigation of identity theft vulnerabilities in Eduroam50.702015
On the requirements for successful GPS spoofing attacks845.792011
Investigation of signal and message manipulations on the wireless channel221.532011
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques723.332010
Keeping data secret under full compromise using porter devices70.662010
Attacks on public WLAN-based positioning systems543.602009
Efficient uncoordinated FHSS anti-jamming communication692.802009
Jamming-resistant broadcast communication without shared keys90.832009
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping703.362008
Secure Time Synchronization in Sensor Networks491.502008