Share This Author
On the Security and Performance of Proof of Work Blockchains
- Arthur Gervais, Ghassan O. Karame, K. Wüst, Vasileios Glykantzis, H. Ritzdorf, Srdjan Capkun
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 24 October 2016
This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.
GPS-free Positioning in Mobile Ad Hoc Networks
- Srdjan Capkun, M. Hamdi, J. Hubaux
- Computer ScienceProceedings of the 34th Annual Hawaii…
- 3 January 2001
A distributed, infrastructure-free positioning algorithm that does not rely on GPS is proposed, which uses the distances between the nodes to build a relative coordinate system in which the node positions are computed in two dimensions.
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
This work proposes a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services.
Secure positioning in wireless networks
- Srdjan Capkun, J. Hubaux
- Computer ScienceIEEE Journal on Selected Areas in Communications
- 1 September 2006
This paper proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks.
The security and privacy of smart vehicles
Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this evolution has deep implications for security…
Secure positioning of wireless devices with application to sensor networks
- Srdjan Capkun, J. Hubaux
- Computer ScienceProceedings IEEE 24th Annual Joint Conference of…
- 13 March 2005
This work proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks.
Evaluating User Privacy in Bitcoin
- Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, T. Scherer, Srdjan Capkun
- Computer Science, MathematicsFinancial Cryptography
- 1 April 2013
This research examines the use of pseudonymity in the Bitcoin network, and the role that it plays in the development of trust and confidence in the system.
SECTOR: secure tracking of node encounters in multi-hop wireless networks
SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks, is presented and it is shown that, due to their efficiency and simplicity, they are compliant with the limited resources of most mobile devices.
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
- N. Karapanos, Claudio Marforio, C. Soriente, Srdjan Capkun
- Computer ScienceUSENIX Security Symposium
- 12 March 2015
A usable and deployable two-factor authentication mechanism that can be easily deployed as it works with current phones and major browsers without plugins, and empirical evidence that ambient noise is a robust discriminant to determine the proximity of two devices both indoors and outdoors, and even if the phone is in a pocket or purse is provided.
On the requirements for successful GPS spoofing attacks
- Nils Ole Tippenhauer, C. Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
- Computer ScienceCCS '11
- 17 October 2011
This paper investigates the requirements for successful GPS spoofing attacks on individuals and groups of victims with civilian or military GPS receivers and finds the minimal precision of the attacker's spoofing signals required for covert satellite-lock takeover.