BibTeX records: Denis Foo Kune

download as .bib file

@inproceedings{DBLP:conf/hipeac/SaraswatFKD14,
  author       = {Vishal Saraswat and
                  Daniel Feldman and
                  Denis Foo Kune and
                  Satyajit Das},
  editor       = {Jens Knoop and
                  Valentina Salapura and
                  Israel Koren and
                  Gerardo Pelosi},
  title        = {Remote cache-timing attacks against {AES}},
  booktitle    = {Proceedings of the First Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014},
  pages        = {45--48},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556315.2556322},
  doi          = {10.1145/2556315.2556322},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hipeac/SaraswatFKD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GoJWKKP14,
  author       = {Younghwan Go and
                  Eunyoung Jeong and
                  Jongil Won and
                  Yongdae Kim and
                  Denis Foo Kune and
                  KyoungSoo Park},
  title        = {Gaining Control of Cellular Traffic Accounting by Spurious {TCP} Retransmission},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/gaining-control-cellular-traffic-accounting-spurious-tcp-retransmission},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GoJWKKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RushananRKS14,
  author       = {Michael Rushanan and
                  Aviel D. Rubin and
                  Denis Foo Kune and
                  Colleen M. Swanson},
  title        = {SoK: Security and Privacy in Implantable Medical Devices and Body
                  Area Networks},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {524--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.40},
  doi          = {10.1109/SP.2014.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RushananRKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangTCMKHK13,
  author       = {Peng Wang and
                  James Tyra and
                  Eric Chan{-}Tin and
                  Tyson Malchow and
                  Denis Foo Kune and
                  Nicholas Hopper and
                  Yongdae Kim},
  title        = {Attacking the kad network - real world evaluation and high fidelity
                  simulation using {DVN}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1556--1575},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.172},
  doi          = {10.1002/SEC.172},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WangTCMKHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenKVKK13,
  author       = {Abedelaziz Mohaisen and
                  Denis Foo Kune and
                  Eugene Y. Vasserman and
                  Myungsun Kim and
                  Yongdae Kim},
  title        = {Secure Encounter-Based Mobile Social Networks: Requirements, Designs,
                  and Tradeoffs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {380--393},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.19},
  doi          = {10.1109/TDSC.2013.19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohaisenKVKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KuneBCKRFKX13,
  author       = {Denis Foo Kune and
                  John D. Backes and
                  Shane S. Clark and
                  Daniel B. Kramer and
                  Matthew R. Reynolds and
                  Kevin Fu and
                  Yongdae Kim and
                  Wenyuan Xu},
  title        = {Ghost Talk: Mitigating {EMI} Signal Injection Attacks against Analog
                  Sensors},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {145--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.20},
  doi          = {10.1109/SP.2013.20},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KuneBCKRFKX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/GoKWPK13,
  author       = {Younghwan Go and
                  Denis Foo Kune and
                  Shinae Woo and
                  KyoungSoo Park and
                  Yongdae Kim},
  editor       = {Sharad Agarwal and
                  Alexander Varshavsky},
  title        = {Towards accurate accounting of cellular data for {TCP} retransmission},
  booktitle    = {14th Workshop on Mobile Computing Systems and Applications, HotMobile
                  '13, Jekyll Island, GA, USA, February 26-27, 2013},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2444776.2444779},
  doi          = {10.1145/2444776.2444779},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/GoKWPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LinKH12,
  author       = {Zi Lin and
                  Denis Foo Kune and
                  Nicholas Hopper},
  editor       = {Angelos D. Keromytis},
  title        = {Efficient Private Proximity Testing with {GSM} Location Sketches},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_7},
  doi          = {10.1007/978-3-642-32946-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LinKH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KuneKHK12,
  author       = {Denis Foo Kune and
                  John K{\"{o}}lndorfer and
                  Nicholas Hopper and
                  Yongdae Kim},
  title        = {Location leaks over the {GSM} air interface},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/location-leaks-over-gsm-air-interface},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KuneKHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SchuchardMKHKV11,
  author       = {Max Schuchard and
                  Abedelaziz Mohaisen and
                  Denis Foo Kune and
                  Nicholas Hopper and
                  Yongdae Kim and
                  Eugene Y. Vasserman},
  title        = {Losing Control of the Internet: Using the Data Plane to Attack the
                  Control Plane},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/losing-control-internet-using-data-plane-attack-control-plane},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SchuchardMKHKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KuneK10,
  author       = {Denis Foo Kune and
                  Yongdae Kim},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Timing attacks on {PIN} input devices},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {678--680},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866395},
  doi          = {10.1145/1866307.1866395},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KuneK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohaisenVSKK10,
  author       = {Abedelaziz Mohaisen and
                  Eugene Y. Vasserman and
                  Max Schuchard and
                  Denis Foo Kune and
                  Yongdae Kim},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Secure encounter-based social networks: requirements, challenges,
                  and designs},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {717--719},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866408},
  doi          = {10.1145/1866307.1866408},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohaisenVSKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchuchardMKHKV10,
  author       = {Max Schuchard and
                  Abedelaziz Mohaisen and
                  Denis Foo Kune and
                  Nicholas Hopper and
                  Yongdae Kim and
                  Eugene Y. Vasserman},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Losing control of the internet: using the data plane to attack the
                  control plane},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {726--728},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866411},
  doi          = {10.1145/1866307.1866411},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchuchardMKHKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangTCMKHK08,
  author       = {Peng Wang and
                  James Tyra and
                  Eric Chan{-}Tin and
                  Tyson Malchow and
                  Denis Foo Kune and
                  Nicholas Hopper and
                  Yongdae Kim},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Attacking the Kad network},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460907},
  doi          = {10.1145/1460877.1460907},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangTCMKHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics