Roeschlin, Marc
23  Ergebnisse:
Personensuche X
?
1

AdaptOver : adaptive overshadowing attacks in cellular n..:

, In: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking,
Erni, Simon ; Kotuliak, Martin ; Leu, Patrick.. - p. 743-755 , 2022
 
?
2

Security of Multicarrier Time-of-Flight Ranging:

, In: Annual Computer Security Applications Conference,
Leu, Patrick ; Kotuliak, Martin ; Roeschlin, Marc. - p. 887-899 , 2021
 
?
3

Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight ..:

, In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Singh, Mridula ; Roeschlin, Marc ; Zalzala, Ezzat.. - p. 227-237 , 2021
 
?
4

Message Time of Arrival Codes: A Fundamental Primitive for ..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Leu, Patrick ; Singh, Mridula ; Roeschlin, Marc.. - p. 500-516 , 2020
 
?
 
?
6

Analysis of Reflexive Eye Movements for Fast Replay-Resista..:

Sluganovic, Ivo ; Roeschlin, Marc ; Rasmussen, Kasper B..
ACM Transactions on Privacy and Security (TOPS).  22 (2018)  1 - p. 1-30 , 2018
 
?
 
?
 
?
9

Pulse-Response : Exploring Human Body Impedance for Biom..:

Martinovic, Ivan ; Rasmussen, Kasper B. ; Roeschlin, Marc.
ACM Transactions on Privacy and Security (TOPS).  20 (2017)  2 - p. 1-31 , 2017
 
?
 
?
11

Using Reflexive Eye Movements for Fast Challenge-Response A..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
 
?
12

Generating Secret Keys from Biometric Body Impedance Measur..:

, In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society,
 
?
13

Misbehavior in Bitcoin : A Study of Double-Spending and ..:

Karame, Ghassan O. ; Androulaki, Elli ; Roeschlin, Marc..
ACM Transactions on Information and System Security (TISSEC).  18 (2015)  1 - p. 1-32 , 2015
 
?
14

Misbehavior in Bitcoin: A Study of Double-Spending and Acco..:

Karame, Ghassan O. ; Androulaki, Elli ; Roeschlin, Marc..
ACM Transactions on Information and System Security.  18 (2015)  1 - p. 1-32 , 2015
 
1-15