Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Denis Foo Kune
@inproceedings{DBLP:conf/hipeac/SaraswatFKD14, author = {Vishal Saraswat and Daniel Feldman and Denis Foo Kune and Satyajit Das}, editor = {Jens Knoop and Valentina Salapura and Israel Koren and Gerardo Pelosi}, title = {Remote cache-timing attacks against {AES}}, booktitle = {Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014}, pages = {45--48}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556315.2556322}, doi = {10.1145/2556315.2556322}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hipeac/SaraswatFKD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GoJWKKP14, author = {Younghwan Go and Eunyoung Jeong and Jongil Won and Yongdae Kim and Denis Foo Kune and KyoungSoo Park}, title = {Gaining Control of Cellular Traffic Accounting by Spurious {TCP} Retransmission}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/gaining-control-cellular-traffic-accounting-spurious-tcp-retransmission}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GoJWKKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RushananRKS14, author = {Michael Rushanan and Aviel D. Rubin and Denis Foo Kune and Colleen M. Swanson}, title = {SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {524--539}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.40}, doi = {10.1109/SP.2014.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RushananRKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangTCMKHK13, author = {Peng Wang and James Tyra and Eric Chan{-}Tin and Tyson Malchow and Denis Foo Kune and Nicholas Hopper and Yongdae Kim}, title = {Attacking the kad network - real world evaluation and high fidelity simulation using {DVN}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1556--1575}, year = {2013}, url = {https://doi.org/10.1002/sec.172}, doi = {10.1002/SEC.172}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WangTCMKHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohaisenKVKK13, author = {Abedelaziz Mohaisen and Denis Foo Kune and Eugene Y. Vasserman and Myungsun Kim and Yongdae Kim}, title = {Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {380--393}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.19}, doi = {10.1109/TDSC.2013.19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MohaisenKVKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KuneBCKRFKX13, author = {Denis Foo Kune and John D. Backes and Shane S. Clark and Daniel B. Kramer and Matthew R. Reynolds and Kevin Fu and Yongdae Kim and Wenyuan Xu}, title = {Ghost Talk: Mitigating {EMI} Signal Injection Attacks against Analog Sensors}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {145--159}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.20}, doi = {10.1109/SP.2013.20}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KuneBCKRFKX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/GoKWPK13, author = {Younghwan Go and Denis Foo Kune and Shinae Woo and KyoungSoo Park and Yongdae Kim}, editor = {Sharad Agarwal and Alexander Varshavsky}, title = {Towards accurate accounting of cellular data for {TCP} retransmission}, booktitle = {14th Workshop on Mobile Computing Systems and Applications, HotMobile '13, Jekyll Island, GA, USA, February 26-27, 2013}, pages = {2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2444776.2444779}, doi = {10.1145/2444776.2444779}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/GoKWPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LinKH12, author = {Zi Lin and Denis Foo Kune and Nicholas Hopper}, editor = {Angelos D. Keromytis}, title = {Efficient Private Proximity Testing with {GSM} Location Sketches}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {73--88}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_7}, doi = {10.1007/978-3-642-32946-3\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LinKH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KuneKHK12, author = {Denis Foo Kune and John K{\"{o}}lndorfer and Nicholas Hopper and Yongdae Kim}, title = {Location leaks over the {GSM} air interface}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/location-leaks-over-gsm-air-interface}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KuneKHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SchuchardMKHKV11, author = {Max Schuchard and Abedelaziz Mohaisen and Denis Foo Kune and Nicholas Hopper and Yongdae Kim and Eugene Y. Vasserman}, title = {Losing Control of the Internet: Using the Data Plane to Attack the Control Plane}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/losing-control-internet-using-data-plane-attack-control-plane}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SchuchardMKHKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KuneK10, author = {Denis Foo Kune and Yongdae Kim}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Timing attacks on {PIN} input devices}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {678--680}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866395}, doi = {10.1145/1866307.1866395}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KuneK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohaisenVSKK10, author = {Abedelaziz Mohaisen and Eugene Y. Vasserman and Max Schuchard and Denis Foo Kune and Yongdae Kim}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Secure encounter-based social networks: requirements, challenges, and designs}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {717--719}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866408}, doi = {10.1145/1866307.1866408}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohaisenVSKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchuchardMKHKV10, author = {Max Schuchard and Abedelaziz Mohaisen and Denis Foo Kune and Nicholas Hopper and Yongdae Kim and Eugene Y. Vasserman}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Losing control of the internet: using the data plane to attack the control plane}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {726--728}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866411}, doi = {10.1145/1866307.1866411}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchuchardMKHKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangTCMKHK08, author = {Peng Wang and James Tyra and Eric Chan{-}Tin and Tyson Malchow and Denis Foo Kune and Nicholas Hopper and Yongdae Kim}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Attacking the Kad network}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {23}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460907}, doi = {10.1145/1460877.1460907}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WangTCMKHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.