Information hiding-a survey FAP Petitcolas, RJ Anderson, MG Kuhn Proceedings of the IEEE 87 (7), 1062-1078, 1999 | 4111 | 1999 |
Tamper resistance-a cautionary note R Anderson, M Kuhn Proceedings of the second Usenix workshop on electronic commerce 2, 1-11, 1996 | 1635 | 1996 |
Attacks on copyright marking systems FAP Petitcolas, RJ Anderson, MG Kuhn International workshop on information hiding, 218-238, 1998 | 1516 | 1998 |
Low cost attacks on tamper resistant devices R Anderson, M Kuhn International Workshop on Security Protocols, 125-136, 1997 | 1017 | 1997 |
Design Principles for Tamper-Resistant Smartcard Processors. O Kömmerling, MG Kuhn Smartcard 99, 9-20, 1999 | 1016 | 1999 |
Analysis of a denial of service attack on TCP CL Schuba, IV Krsul, MG Kuhn, EH Spafford, A Sundaram, D Zamboni Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 830 | 1997 |
An RFID distance bounding protocol GP Hancke, MG Kuhn First international conference on security and privacy for emerging areas in …, 2005 | 686 | 2005 |
Soft tempest: Hidden data transmission using electromagnetic emanations MG Kuhn, RJ Anderson Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998 | 498 | 1998 |
Compromising emanations: eavesdropping risks of computer displays MG Kuhn University of Cambridge, Computer Laboratory, 2003 | 425 | 2003 |
Optical time-domain eavesdropping risks of CRT displays MG Kuhn Proceedings 2002 IEEE Symposium on Security and Privacy, 3-18, 2002 | 278 | 2002 |
Electromagnetic eavesdropping risks of flat-panel displays MG Kuhn International Workshop on Privacy Enhancing Technologies, 88-107, 2004 | 265 | 2004 |
Efficient template attacks O Choudary, MG Kuhn Smart Card Research and Advanced Applications: 12th International Conference …, 2014 | 255 | 2014 |
An asymmetric security mechanism for navigation signals MG Kuhn International workshop on information hiding, 239-252, 2004 | 229 | 2004 |
So near and yet so far: Distance-bounding attacks in wireless networks J Clulow, GP Hancke, MG Kuhn, T Moore Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop …, 2006 | 225 | 2006 |
StegFS: A steganographic file system for Linux AD McDonald, MG Kuhn Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000 | 208 | 2000 |
Information hiding-a survey AP Fabien, RJ Anderson, MG Kuhn Proceedings of the IEEE 87 (7), 1062-1078, 1999 | 159 | 1999 |
Network protection for denial of service attacks CL Schuba, IV Krsul, D Zamboni, EH Spafford, AM Sundaram, MG Kuhn US Patent 6,725,378, 2004 | 151 | 2004 |
Compromising emanations of LCD TV sets MG Kuhn IEEE Transactions on Electromagnetic Compatibility 55 (3), 564-570, 2013 | 142 | 2013 |
Cipher instruction search attack on the bus-encryption security microcontroller DS5002FP MG Kuhn IEEE Transactions on Computers 47 (10), 1153-1157, 1998 | 130 | 1998 |
Attacks on time-of-flight distance bounding channels GP Hancke, MG Kuhn Proceedings of the first ACM conference on Wireless network security, 194-202, 2008 | 127 | 2008 |