The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Karl Koscher: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Adrienne Andrew, Yaw Anokwa, Karl Koscher, Jonathan Lester, Gaetano Borriello
    Context to Make You More Aware. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:49- [Conf]

  2. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. [Citation Graph (, )][DBLP]


  3. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. [Citation Graph (, )][DBLP]


  4. A spotlight on security and privacy risks with future household robots: attacks and lessons. [Citation Graph (, )][DBLP]


  5. Longitudinal study of a building-scale RFID ecosystem. [Citation Graph (, )][DBLP]


  6. Multi-player soccer and wireless embedded systems. [Citation Graph (, )][DBLP]


  7. Experimental Security Analysis of a Modern Automobile. [Citation Graph (, )][DBLP]


  8. Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. [Citation Graph (, )][DBLP]


  9. Following directions using statistical machine translation. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002