
Ivan Martinovic
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c91]Bushra A. AlAhmadi, Enrico Mariconti, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic:
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior. AsiaCCS 2020: 652-664 - [c90]Ivo Sluganovic, Mihael Liskij, Ante Derek, Ivan Martinovic:
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets. CODASPY 2020: 61-72 - [c89]Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic:
Seeing Red: PPG Biometrics Using Smartphone Cameras. CVPR Workshops 2020: 3565-3574 - [c88]Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. EuroS&P 2020: 184-197 - [c87]Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic:
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems. NDSS 2020 - [c86]James Pavur, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
A Tale of Sea and Sky On the Security of Maritime VSAT Communications. IEEE Symposium on Security and Privacy 2020: 1384-1400 - [i25]James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband. CoRR abs/2002.05091 (2020) - [i24]Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic:
Seeing Red: PPG Biometrics Using Smartphone Cameras. CoRR abs/2004.07088 (2020) - [i23]Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. CoRR abs/2007.04137 (2020) - [i22]Matthew Smith, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Understanding Realistic Attacks on Airborne Collision Avoidance Systems. CoRR abs/2010.01034 (2020) - [i21]James Pavur, Ivan Martinovic:
SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research. CoRR abs/2010.10872 (2020) - [i20]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020. CoRR abs/2010.13457 (2020) - [i19]Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic:
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients. CoRR abs/2011.13979 (2020)
2010 – 2019
- 2019
- [j22]Martin Strohmeier
, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
On the Applicability of Satellite-Based Air Traffic Control Communication for Security. IEEE Commun. Mag. 57(9): 79-85 (2019) - [j21]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication. ACM Trans. Priv. Secur. 22(1): 4:1-4:30 (2019) - [c85]Michal Piskozub, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks. MTD@CCS 2019: 1-12 - [c84]Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. CCS 2019: 1187-1199 - [c83]Simon Birnbach, Simon Eberz, Ivan Martinovic:
Peeves: Physical Event Verification in Smart Homes. CCS 2019: 1455-1467 - [c82]James Pavur, Ivan Martinovic:
The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space. CyCon 2019: 1-18 - [c81]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Attacking Speaker Recognition Systems with Phoneme Morphing. ESORICS (1) 2019: 471-492 - [c80]Richard Baker, Ivan Martinovic:
Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging. USENIX Security Symposium 2019: 407-424 - [c79]James Pavur, Daniel Moser, Vincent Lenders, Ivan Martinovic:
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband. WiSec 2019: 277-284 - [c78]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
CompactFlow: A Hybrid Binary Format for Network Flow Data. WISTP 2019: 185-201 - [i18]Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic:
Safety vs. Security: Attacking Avionic Systems with Humans in the Loop. CoRR abs/1905.08039 (2019) - [i17]Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. CoRR abs/1905.09162 (2019) - [i16]Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic:
Classi-Fly: Inferring Aircraft Categories from Open Data. CoRR abs/1908.01061 (2019) - [i15]Chris Xiaoxuan Lu, Bowen Du, Hongkai Wen, Sen Wang, Andrew Markham, Ivan Martinovic, Yiran Shen, Niki Trigoni:
Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning. CoRR abs/1912.04836 (2019) - 2018
- [j20]Matthew Smith, Daniel Moser, Martin Strohmeier
, Vincent Lenders, Ivan Martinovic:
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS). Proc. Priv. Enhancing Technol. 2018(3): 105-122 (2018) - [j19]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features. SIGMETRICS Perform. Evaluation Rev. 46(3): 151-154 (2018) - [j18]Martin Strohmeier
, Ivan Martinovic, Vincent Lenders:
A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks. IEEE Trans. Aerosp. Electron. Syst. 54(3): 1519-1529 (2018) - [j17]Vincent F. Taylor
, Riccardo Spolaor
, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. IEEE Trans. Inf. Forensics Secur. 13(1): 63-78 (2018) - [c77]Martin Strohmeier
, Matthew Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Utilizing air traffic communications for OSINT on state and government aircraft. CyCon 2018: 299-320 - [c76]Bushra A. AlAhmadi, Ivan Martinovic:
MalClassifier: Malware family classification using network flow sequence behaviour. eCrime 2018: 1-13 - [c75]Martin Strohmeier
, Anna K. Niedbala, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Surveying Aviation Professionals on the Security of the Air Traffic Control System. ISSA/CSITS@ESORICS 2018: 135-152 - [c74]Martin Strohmeier
, Matthew Smith, Vincent Lenders, Ivan Martinovic:
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication. EuroS&P 2018: 107-121 - [c73]Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic:
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. EuroS&P 2018: 199-213 - [c72]Vesna Mandic, Ivan Martinovic:
Biomedical signals reconstruction under the compressive sensing approach. MECO 2018: 1-4 - [c71]Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen:
Device Pairing at the Touch of an Electrode. NDSS 2018 - [c70]Richard Baker
, Ivan Martinovic:
EMPower: Detecting Malicious Power Line Networks from EM Emissions. SEC 2018: 108-121 - [c69]Simon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders, Ivan Martinovic:
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts. IEEE Symposium on Security and Privacy 2018: 889-905 - [c68]Marc Roeschlin, Christian Vaas, Kasper Bonne Rasmussen, Ivan Martinovic:
Bionyms: Driver-centric Message Authentication using Biometric Measurements. VNC 2018: 1-8 - [c67]Christian Vaas, Mohammad Khodaei
, Panos Papadimitratos, Ivan Martinovic:
Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles. VNC 2018: 1-8 - [c66]Christian Vaas, Marc Roeschlin, Panos Papadimitratos, Ivan Martinovic:
Poster: Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties. VNC 2018: 1-2 - [c65]Christian Vaas, Panos Papadimitratos, Ivan Martinovic:
Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages. WISEC 2018: 287-288 - [i14]Ivan Martinovic, Vesna Mandic:
Biomedical Signals Reconstruction Under the Compressive Sensing Approach. CoRR abs/1802.00337 (2018) - 2017
- [j16]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Authentication using pulse-response biometrics. Commun. ACM 60(2): 108-115 (2017) - [j15]Chris Xiaoxuan Lu, Bowen Du, Hongkai Wen
, Sen Wang, Andrew Markham, Ivan Martinovic, Yiran Shen, Niki Trigoni
:
Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 152:1-152:29 (2017) - [j14]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. ACM Trans. Priv. Secur. 20(2): 6:1-6:31 (2017) - [j13]Martin Strohmeier
, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic:
On Perception and Reality in Wireless Air Traffic Communication Security. IEEE Trans. Intell. Transp. Syst. 18(6): 1338-1357 (2017) - [c64]Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic:
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. ACSAC 2017: 250-261 - [c63]Jack Sturgess, Ivan Martinovic:
VisAuth: Authentication over a Visual Channel Using an Embedded Image. CANS 2017: 537-546 - [c62]Vincent F. Taylor, Ivan Martinovic:
To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution. AsiaCCS 2017: 45-57 - [c61]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. AsiaCCS 2017: 386-399 - [c60]Martin Strohmeier
, Matthew Smith, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Crowdsourcing security for wireless air traffic communications. CyCon 2017: 1-18 - [c59]Matthew Smith, Daniel Moser, Martin Strohmeier
, Vincent Lenders, Ivan Martinovic:
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS. Financial Cryptography 2017: 285-301 - [c58]Vincent F. Taylor, Ivan Martinovic:
Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store. Financial Cryptography 2017: 302-309 - [c57]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication Over the Wireless Channel. ICDCS 2017: 2294-2301 - [c56]Simon Birnbach, Richard Baker, Ivan Martinovic:
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. NDSS 2017 - [c55]Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic:
Broken Hearted: How To Attack ECG Biometrics. NDSS 2017 - [c54]Mika Juuti, Christian Vaas, Hans Liljestrand, Ivo Sluganovic, N. Asokan
, Ivan Martinovic:
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication. SECON 2017: 1-2 - [c53]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand
, N. Asokan
, Ivan Martinovic:
STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification. SECON 2017: 1-9 - [c52]Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:
There are many apps for that: quantifying the availability of privacy-preserving apps. WISEC 2017: 247-252 - [c51]Mario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song:
Using EEG-Based BCI Devices to Subliminally Probe for Private Information. WPES@CCS 2017: 133-136 - [i13]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis. CoRR abs/1704.06099 (2017) - [i12]Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS). CoRR abs/1705.07065 (2017) - [i11]Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:
Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones. CoRR abs/1708.03520 (2017) - 2016
- [j12]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics. ACM Trans. Priv. Secur. 19(1): 1:1-1:31 (2016) - [j11]Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic, Jens B. Schmitt:
Friendly Jamming on Access Points: Analysis and Real-World Measurements. IEEE Trans. Wirel. Commun. 15(9): 6189-6202 (2016) - [c50]Richard Baker, Ivan Martinovic:
Secure Location Verification with a Mobile Receiver. CPS-SPC@CCS 2016: 35-46 - [c49]Vincent F. Taylor, Ivan Martinovic:
SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis. SPSM@CCS 2016: 43-52 - [c48]Mai Ben-Adar Bessos, Simon Birnbach, Amir Herzberg, Ivan Martinovic:
Exposing Transmitters in Mobile Multi-Agent Games. CPS-SPC@CCS 2016: 125-136 - [c47]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Using Reflexive Eye Movements for Fast Challenge-Response Authentication. CCS 2016: 1056-1067 - [c46]Vincent F. Taylor, Ivan Martinovic:
DEMO: Starving Permission-Hungry Android Apps Using SecuRank. CCS 2016: 1850-1852 - [c45]Martin Strohmeier
, Matthias Schäfer, Matthew Smith, Vincent Lenders, Ivan Martinovic:
Assessing the impact of aviation security on cyber power. CyCon 2016: 223-241 - [c44]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. EuroS&P 2016: 439-454 - [c43]Marc Roeschlin, Ivo Sluganovic, Ivan Martinovic, Gene Tsudik, Kasper Bonne Rasmussen:
Generating Secret Keys from Biometric Body Impedance Measurements. WPES@CCS 2016: 59-69 - [i10]Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic:
On Perception and Reality in Wireless Air Traffic Communications Security. CoRR abs/1602.08777 (2016) - [i9]Vincent F. Taylor, Ivan Martinovic:
A Longitudinal Study of App Permission Usage across the Google Play Store. CoRR abs/1606.01708 (2016) - [i8]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic:
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition. CoRR abs/1610.02801 (2016) - [i7]Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
A Localization Approach for Crowdsourced Air Traffic Communication Networks. CoRR abs/1610.06754 (2016) - [i6]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication over the Wireless Channel. CoRR abs/1612.08593 (2016) - 2015
- [j10]Martin Strohmeier
, Vincent Lenders, Ivan Martinovic:
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Commun. Surv. Tutorials 17(2): 1066-1087 (2015) - [c42]Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick:
Using Channel State Information for Tamper Detection in the Internet of Things. ACSAC 2015: 131-140 - [c41]Martin Strohmeier
, Ivan Martinovic:
On Passive Data Link Layer Fingerprinting of Aircraft Transponders. CPS-SPC@CCS 2015: 1-9 - [c40]Martin Strohmeier
, Vincent Lenders, Ivan Martinovic:
Lightweight Location Verification in Air Traffic Surveillance Networks. CPSS@ASIACSS 2015: 49-60 - [c39]Martin Strohmeier
, Vincent Lenders, Ivan Martinovic:
Intrusion Detection for Airborne Communication Using PHY-Layer Information. DIMVA 2015: 67-77 - [c38]Andrew C. Simpson, Andrew P. Martin
, Cas J. F. Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [c37]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. NDSS 2015 - 2014
- [j9]Martin Strohmeier
, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Realities and challenges of nextgen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52(5): 111-118 (2014) - [c36]Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm:
Bringing up OpenSky: a large-scale ADS-B sensor network for research. IPSN 2014: 83-94 - [c35]Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm:
Demonstration abstract: OpenSky: a large-scale ADS-B sensor network for research. IPSN 2014: 313-314 - [c34]Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik:
Authentication Using Pulse-Response Biometrics. NDSS 2014 - [c33]Daniel S. Berger, Francesco Gringoli
, Nicolò Facchi, Ivan Martinovic, Jens B. Schmitt:
Gaining insight on friendly jamming in a real-world IEEE 802.11 network. WISEC 2014: 105-116 - [e1]Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents] - 2013
- [j8]Paolo Barsocchi
, Stefano Chessa
, Ivan Martinovic, Gabriele Oligeri:
A cyber-physical approach to secret key generation in smart environments. J. Ambient Intell. Humaniz. Comput. 4(1): 1-16 (2013) - [j7]Matthias Wilhelm
, Ivan Martinovic, Jens B. Schmitt:
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels. IEEE J. Sel. Areas Commun. 31(9): 1779-1790 (2013) - [j6]Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song:
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Trans. Inf. Forensics Secur. 8(1): 136-148 (2013) - [c32]Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Experimental Analysis of Attacks on Next Generation Air Traffic Communication. ACNS 2013: 253-271 - [c31]Martin Strohmeier
, Ivan Martinovic, Utz Roedig
, Karim El Defrawy, Jens B. Schmitt:
Neighborhood watch: On network coding throughput and key sharing. GLOBECOM 2013: 849-854 - [c30]Arman Boehm, Dongqu Chen, Mario Frank, Ling Huang, Cynthia Kuo, Tihomir Lolic, Ivan Martinovic, Dawn Song:
SAFE: Secure authentication with Face and Eyes. PRISMS 2013: 1-8 - [c29]Tim Stöber, Mario Frank, Jens B. Schmitt, Ivan Martinovic:
Who do you sync you are?: smartphone fingerprinting via application behaviour. WISEC 2013: 7-12 - [i5]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference. CoRR abs/1305.4038 (2013) - [i4]Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Security of ADS-B: State of the Art and Beyond. CoRR abs/1307.3664 (2013) - [i3]Mario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Dawn Song:
Subliminal Probing for Private Information via EEG-Based BCI Devices. CoRR abs/1312.6052 (2013) - 2012
- [c28]Simon Eberz, Martin Strohmeier
, Matthias Wilhelm
, Ivan Martinovic:
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. ESORICS 2012: 235-252 - [c27]Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song:
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. USENIX Security Symposium 2012: 143-158 - [i2]Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song:
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. CoRR abs/1207.6231 (2012) - 2011
- [j5]Hao Wang, Jens B. Schmitt, Ivan Martinovic:
Dynamic demultiplexing in network calculus - Theory and application. Perform. Evaluation 68(2): 201-219 (2011) - [j4]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
WiSec 2011 demo: RFReact - a real-time capable and channel-aware jamming platform. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 41-42 (2011) - [c26]Jens B. Schmitt, Nicos Gollan, Steffen Bondorf
, Ivan Martinovic:
Pay bursts only once holds for (some) non-FIFO systems. INFOCOM 2011: 1970-1978 - [c25]Matthias Wilhelm
, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
WiFire: a firewall for wireless networks. SIGCOMM 2011: 456-457 - [c24]Matthias Wilhelm
, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
Short paper: reactive jamming in wireless networks: how realistic is the threat? WISEC 2011: 47-52 - 2010
- [c23]Paolo Barsocchi
, Stefano Chessa
, Ivan Martinovic, Gabriele Oligeri:
AmbiSec: Securing Smart Spaces Using Entropy Harvesting. AmI 2010: 73-85 - [c22]Jens B. Schmitt, Hao Wang, Ivan Martinovic:
A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling. ISoLA (1) 2010: 169-183 - [c21]Sebastian Wille, Norbert Wehn, Ivan Martinovic, Simon Kunz, Peter Göhner:
AmICA - A Flexible, Compact, Easy-to-Program and Low-Power WSN Platform. MobiQuitous 2010: 381-382 - [c20]Dennis Christmann, Ivan Martinovic:
Experimental design and analysis of transmission properties in an indoor wireless sensor network. WiOpt 2010: 342-347 - [c19]Matthias Wilhelm
, Ivan Martinovic, Jens B. Schmitt:
Secret keys from entangled sensor motes: implementation and analysis. WISEC 2010: 139-144 - [i1]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt:
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis. CoRR abs/1005.0712 (2010)
2000 – 2009
- 2009
- [b1]Ivan Martinovic:
Security in wireless networks: a fresh approach. University of Kaiserslautern, 2009, pp. 1-136 - [j3]Ivan Martinovic, Paul Pichota, Matthias Wilhelm
, Frank A. Zdarsky, Jens B. Schmitt:
Bringing law and order to IEEE 802.11 networks - A case for DiscoSec. Pervasive Mob. Comput. 5(5): 510-525 (2009) - [j2]Ivan Martinovic, Nicos Gollan, Luc Cappellaro, Jens B. Schmitt:
Chaotic communication improves authentication: protecting WSNs against injection attacks. Secur. Commun. Networks 2(2): 117-132 (2009) - [j1]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
Minimizing contention through cooperation between densely deployed wireless LANs. Wirel. Networks 15(6): 741-754 (2009) - [c18]Ivan Martinovic:
Security by wireless: why play fairer than the attacker. AINTEC 2009: 33 - [c17]