The SCEAS System
Navigation Menu

Search the dblp DataBase


Markus G. Kuhn: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Markus G. Kuhn
    Security Limits for Compromising Emanations. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:265-279 [Conf]
  2. Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore
    So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:83-97 [Conf]
  3. Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr.
    Low-threat security patches and tools. [Citation Graph (0, 0)][DBLP]
    ICSM, 1997, pp:306-313 [Conf]
  4. Markus G. Kuhn
    An Asymmetric Security Mechanism for Navigation Signals. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:239-252 [Conf]
  5. Markus G. Kuhn, Ross J. Anderson
    Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:124-142 [Conf]
  6. Richard Clayton, George Danezis, Markus G. Kuhn
    Real World Patterns of Failure in Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:230-244 [Conf]
  7. Andrew D. McDonald, Markus G. Kuhn
    StegFS: A Steganographic File System for Linux. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:462-477 [Conf]
  8. Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn
    Attacks on Copyright Marking Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:218-238 [Conf]
  9. Markus G. Kuhn
    Electromagnetic Eavesdropping Risks of Flat-Panel Displays. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:88-107 [Conf]
  10. Markus G. Kuhn
    Optical Time-Domain Eavesdropping Risks of CRT Displays. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:3-18 [Conf]
  11. Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni
    Analysis of a Denial of Service Attack on TCP. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:208-223 [Conf]
  12. Ross J. Anderson, Markus G. Kuhn
    Low Cost Attacks on Tamper Resistant Devices. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:125-136 [Conf]
  13. Markus G. Kuhn
    Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:10, pp:1153-1157 [Journal]

  14. A Protocol for Secure Remote Updates of FPGA Configurations. [Citation Graph (, )][DBLP]

  15. Attacks on time-of-flight distance bounding channels. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002