On the security and performance of proof of work blockchains A Gervais, GO Karame, K Wüst, V Glykantzis, H Ritzdorf, S Capkun Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 1961 | 2016 |
GPS-free positioning in mobile ad hoc networks S Čapkun, M Hamdi, JP Hubaux Cluster Computing 5, 157-167, 2002 | 1919 | 2002 |
Self-organized public-key management for mobile ad hoc networks S Capkun, L Buttyan, JP Hubaux IEEE Transactions on mobile computing 2 (1), 52-64, 2003 | 1378 | 2003 |
The quest for security in mobile ad hoc networks JP Hubaux, L Buttyán, S Capkun Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001 | 1255 | 2001 |
The security and privacy of smart vehicles JP Hubaux, S Capkun, J Luo IEEE Security & Privacy, 2004 | 1076 | 2004 |
Double-spending fast payments in bitcoin GO Karame, E Androulaki, S Capkun Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 995 | 2012 |
Evaluating user privacy in bitcoin E Androulaki, GO Karame, M Roeschlin, T Scherer, S Capkun Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 987 | 2013 |
Software grand exposure:{SGX} cache attacks are practical F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi 11th USENIX workshop on offensive technologies (WOOT 17), 2017 | 740 | 2017 |
On the requirements for successful GPS spoofing attacks NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 715 | 2011 |
Secure positioning of wireless devices with application to sensor networks S Capkun, JP Hubaux Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 651 | 2005 |
SECTOR: secure tracking of node encounters in multi-hop wireless networks S Čapkun, L Buttyán, JP Hubaux Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 617 | 2003 |
Self organization in mobile ad hoc networks: the approach of Terminodes L Blazevic, L Buttyan, S Capkun, S Giordano, JP Hubaux, JY Le Boudec IEEE Communications Magazine 39 (6), 166-174, 2001 | 596 | 2001 |
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. A Francillon, B Danev, S Capkun NDSS, 2011 | 584 | 2011 |
Secure positioning in wireless networks S Capkun, JP Hubaux IEEE Journal on Selected Areas in Communications 24 (2), 221-232, 2006 | 517 | 2006 |
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound N Karapanos, C Marforio, C Soriente, S Capkun 24th USENIX security symposium (USENIX security 15), 483-498, 2015 | 510* | 2015 |
Is bitcoin a decentralized currency? A Gervais, GO Karame, V Capkun, S Capkun IEEE security & privacy 12 (3), 54-60, 2014 | 463 | 2014 |
Mobility helps security in ad hoc networks S Čapkun, JP Hubaux, L Buttyan Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003 | 400 | 2003 |
Jamming-resistant key establishment using uncoordinated frequency hopping M Strasser, C Popper, S Capkun, M Cagalj 2008 IEEE Symposium on Security and Privacy (sp 2008), 64-78, 2008 | 379 | 2008 |
On physical-layer identification of wireless devices B Danev, D Zanetti, S Capkun ACM Computing Surveys (CSUR) 45 (1), 1-29, 2012 | 374 | 2012 |
ROPE: Robust position estimation in wireless sensor networks L Lazos, R Poovendran, S Capkun IPSN 2005. Fourth International Symposium on Information Processing in …, 2005 | 369 | 2005 |