Rasmussen, Kasper B.
2208  results:
Search for persons X
?
1

SeCaS : Secure Capability Sharing Framework for IoT Devi..:

, In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy,
 
?
2

Leakier Wires: Exploiting FPGA Long Wires for Covert- and S..:

Giechaskiel, Ilias ; Eguro, Ken ; Rasmussen, Kasper B.
ACM Transactions on Reconfigurable Technology and Systems.  12 (2019)  3 - p. 1-29 , 2019
 
?
3

Leakier Wires : Exploiting FPGA Long Wires for Covert- a..:

Giechaskiel, Ilias ; Eguro, Ken ; Rasmussen, Kasper B.
ACM Transactions on Reconfigurable Technology and Systems (TRETS).  12 (2019)  3 - p. 1-29 , 2019
 
?
4

28 Blinks Later : Tackling Practical Challenges of Eye M..:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
 
?
5

A Framework for Evaluating Security in the Presence of Sign..:

, In: Lecture Notes in Computer Science; Computer Security – ESORICS 2019,
 
?
6

Leaky Wires : Information Leakage and Covert Communicati..:

, In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security,
 
?
7

Analysis of Reflexive Eye Movements for Fast Replay-Resista..:

Sluganovic, Ivo ; Roeschlin, Marc ; Rasmussen, Kasper B..
ACM Transactions on Privacy and Security (TOPS).  22 (2018)  1 - p. 1-30 , 2018
 
?
 
?
10

Pulse-Response : Exploring Human Body Impedance for Biom..:

Martinovic, Ivan ; Rasmussen, Kasper B. ; Roeschlin, Marc.
ACM Transactions on Privacy and Security (TOPS).  20 (2017)  2 - p. 1-31 , 2017
 
?
11

Evaluating Behavioral Biometrics for Continuous Authenticat..:

, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,
 
?
 
?
13

Remote attestation for low-end embedded devices : the pr..:

, In: Proceedings of the 53rd Annual Design Automation Conference,
 
?
14

Generating Secret Keys from Biometric Body Impedance Measur..:

, In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society,
 
?
15

Using Reflexive Eye Movements for Fast Challenge-Response A..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
 
1-15