Search Results - "Capkun, S."

Refine Results
  1. 1

    Secure positioning in wireless networks by Capkun, S., Hubaux, J.-P.

    “…So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of…”
    Get full text
    Journal Article
  2. 2

    Key Agreement in Peer-to-Peer Wireless Networks by Cagalj, M., Capkun, S., Hubaux, J.-P.

    Published in Proceedings of the IEEE (01-02-2006)
    “…We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellmankey…”
    Get full text
    Journal Article
  3. 3

    Secure positioning of wireless devices with application to sensor networks by Capkun, S., Hubaux, J.-P.

    “…So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of…”
    Get full text
    Conference Proceeding
  4. 4

    Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels by Capkun, S., Cagalj, M., Rengaswamy, R., Tsigkogiannis, I., Hubaux, J.-P., Srivastava, M.

    “…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
    Get full text
    Journal Article
  5. 5

    ROPE: robust position estimation in wireless sensor networks by Lazos, L., Radha Poovendran, Capkun, S.

    “…We address the problem of secure location determination, known as secure localization, and the problem of verifying the location claim of a node, known as…”
    Get full text
    Conference Proceeding
  6. 6

    SoK: Secure Data Deletion by Reardon, J., Basin, D., Capkun, S.

    “…Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead,…”
    Get full text
    Conference Proceeding
  7. 7

    Distance Hijacking Attacks on Distance Bounding Protocols by Cremers, C., Rasmussen, K. B., Schmidt, B., Capkun, S.

    “…After several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These…”
    Get full text
    Conference Proceeding
  8. 8

    GPS-free positioning in mobile ad-hoc networks by Capkun, S., Hamdi, M., Hubaux, J.-P.

    “…We consider the problem of node positioning in ad-hoc networks. We propose a distributed, infrastructure-free positioning algorithm that does not rely on…”
    Get full text
    Conference Proceeding
  9. 9

    On Limitations of Friendly Jamming for Confidentiality by Tippenhauer, N. O., Malisa, L., Ranganathan, A., Capkun, S.

    “…Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works…”
    Get full text
    Conference Proceeding
  10. 10
  11. 11

    On the Security of End-to-End Measurements Based on Packet-Pair Dispersions by Karame, G. O., Danev, B., Bannwart, C., Capkun, S.

    “…The packet-pair technique is a widely adopted method to estimate the capacity of a path. The use of the packet-pair technique has been suggested in numerous…”
    Get full text
    Journal Article
  12. 12

    Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks by Schaller, P., Schmidt, B., Basin, D., Capkun, S.

    “…We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a…”
    Get full text
    Conference Proceeding
  13. 13

    Self-organized public-key management for mobile ad hoc networks by Capkun, S., Buttyan, L., Hubaux, J.-P.

    Published in IEEE transactions on mobile computing (01-01-2003)
    “…In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they…”
    Get full text
    Magazine Article
  14. 14

    Transient-based identification of wireless sensor nodes by Danev, Boris, Capkun, Srdjan

    “…Identification of wireless sensor nodes based on the characteristics of their radio transmissions can provide an additional layer of security in all-wireless…”
    Get full text
    Conference Proceeding
  15. 15

    Protecting Sensitive Business Information While Sharing Serial-Level Data by Zanetti, D., Capkun, S.

    “…Within supply chains, the adoption of RFID technology promises to have a beneficial impact: by sharing serial-level data, supply chain partners can optimize…”
    Get full text
    Conference Proceeding
  16. 16

    Secure Location Verification with Hidden and Mobile Base Stations by Capkun, S., Rasmussen, K.B., Cagalj, M., Srivastava, M.

    Published in IEEE transactions on mobile computing (01-04-2008)
    “…In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base…”
    Get full text
    Magazine Article
  17. 17

    Wormhole-Based Antijamming Techniques in Sensor Networks by Cagalj, M., Capkun, S., Hubaux, J.-P.

    Published in IEEE transactions on mobile computing (01-01-2007)
    “…Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to "radio channel jamming"-based…”
    Get full text
    Magazine Article
  18. 18

    Integrity (I) codes: message integrity protection and authentication over insecure channels by Cagalj, M., Capkun, S., Rengaswamy, R., Tsigkogiannis, I., Srivastava, M., Hubaux, J.-P.

    “…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
    Get full text
    Conference Proceeding
  19. 19

    Mobility helps peer-to-peer security by Capkun, S., Hubaux, J.P., Buttyan, L.

    Published in IEEE transactions on mobile computing (01-01-2006)
    “…We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to…”
    Get full text
    Magazine Article
  20. 20

    The security and privacy of smart vehicles by Hubaux, J.P., Capkun, S., Jun Luo

    Published in IEEE security & privacy (01-05-2004)
    “…Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this…”
    Get full text
    Magazine Article