We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor | 0 | 0.34 | 2021 |
Trust The Crowd: Wireless Witnessing To Detect Attacks On Ads-B-Based Air-Traffic Surveillance | 0 | 0.34 | 2021 |
High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security | 0 | 0.34 | 2021 |
5G SUCI-catchers: still catching them all? | 0 | 0.34 | 2021 |
Exploring user perceptions of deletion in mobile instant messaging applications. | 0 | 0.34 | 2020 |
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors | 0 | 0.34 | 2020 |
DeepSIM - GPS Spoofing Detection on UAVs using Satellite Imagery Matching. | 1 | 0.36 | 2020 |
IMP4GT: IMPersonation Attacks in 4G NeTworks | 2 | 0.35 | 2020 |
Protecting wi-fi beacons from outsider forgeries | 0 | 0.34 | 2020 |
LTE security disabled: misconfiguration in commercial networks | 1 | 0.35 | 2019 |
Towards Contractual Agreements For Revocation Of Online Data | 0 | 0.34 | 2019 |
Breaking LTE on Layer Two | 5 | 0.43 | 2019 |
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two | 1 | 0.35 | 2019 |
On the Challenges of Geographical Avoidance for Tor. | 0 | 0.34 | 2019 |
On Security Research towards Future Mobile Network Generations. | 2 | 0.40 | 2018 |
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting. | 0 | 0.34 | 2018 |
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks | 5 | 0.45 | 2018 |
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers. | 0 | 0.34 | 2017 |
POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System. | 0 | 0.34 | 2017 |
POSTER: Traffic Analysis Attacks in Anonymity Networks. | 2 | 0.37 | 2017 |
SkypeLine: Robust Hidden Data Transmission for VoIP. | 2 | 0.36 | 2016 |
Multi-receiver GPS spoofing detection: error models and realization. | 5 | 0.49 | 2016 |
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. | 6 | 0.45 | 2016 |
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. | 3 | 0.43 | 2016 |
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. | 0 | 0.34 | 2016 |
A practical investigation of identity theft vulnerabilities in Eduroam | 5 | 0.70 | 2015 |
On the requirements for successful GPS spoofing attacks | 84 | 5.79 | 2011 |
Investigation of signal and message manipulations on the wireless channel | 22 | 1.53 | 2011 |
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques | 72 | 3.33 | 2010 |
Keeping data secret under full compromise using porter devices | 7 | 0.66 | 2010 |
Attacks on public WLAN-based positioning systems | 54 | 3.60 | 2009 |
Efficient uncoordinated FHSS anti-jamming communication | 69 | 2.80 | 2009 |
Jamming-resistant broadcast communication without shared keys | 9 | 0.83 | 2009 |
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping | 70 | 3.36 | 2008 |
Secure Time Synchronization in Sensor Networks | 49 | 1.50 | 2008 |