Srđjan Čapkun
#139,611
Most Influential Person Now
Srđjan Čapkun's AcademicInfluence.com Rankings
Srđjan Čapkunengineering Degrees
Engineering
#5156
World Rank
#6400
Historical Rank
Electrical Engineering
#1404
World Rank
#1497
Historical Rank

Srđjan Čapkuncomputer-science Degrees
Computer Science
#6615
World Rank
#6973
Historical Rank
Database
#3693
World Rank
#3845
Historical Rank

Download Badge
Engineering Computer Science
Srđjan Čapkun's Degrees
- PhD Computer Science ETH Zurich
- Masters Electrical Engineering University of Zagreb
- Bachelors Electrical Engineering University of Zagreb
Similar Degrees You Can Earn
Why Is Srđjan Čapkun Influential?
(Suggest an Edit or Addition)Srđjan Čapkun's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- GPS-free Positioning in Mobile Ad Hoc Networks (2001) (1464)
- On the Security and Performance of Proof of Work Blockchains (2016) (1171)
- The quest for security in mobile ad hoc networks (2001) (974)
- The security and privacy of smart vehicles (2004) (861)
- Self-Organized Public-Key Management for Mobile Ad Hoc Networks (2003) (803)
- Evaluating User Privacy in Bitcoin (2013) (612)
- Secure positioning of wireless devices with application to sensor networks (2005) (586)
- SECTOR: secure tracking of node encounters in multi-hop wireless networks (2003) (532)
- Double-spending fast payments in bitcoin (2012) (502)
- Software Grand Exposure: SGX Cache Attacks Are Practical (2017) (482)
- Self-organization in mobile ad hoc networks: the approach of Terminodes (2001) (460)
- On the requirements for successful GPS spoofing attacks (2011) (455)
- Secure positioning in wireless networks (2006) (451)
- Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (2010) (395)
- Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping (2008) (326)
- ROPE: robust position estimation in wireless sensor networks (2005) (306)
- Mobility helps security in ad hoc networks (2003) (302)
- Is Bitcoin a Decentralized Currency? (2014) (291)
- Implications of radio fingerprinting on the security of sensor networks (2007) (278)
- On physical-layer identification of wireless devices (2012) (242)
- Realization of RF Distance Bounding (2010) (235)
- Key Agreement in Peer-to-Peer Wireless Networks (2006) (229)
- Secure time synchronization service for sensor networks (2005) (227)
- Attacks on physical-layer identification (2010) (226)
- Anti-jamming broadcast communication using uncoordinated spread spectrum techniques (2010) (224)
- Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin (2012) (222)
- Proximity-based access control for implantable medical devices (2009) (215)
- Transient-based identification of wireless sensor nodes (2009) (213)
- Tampering with the Delivery of Blocks and Transactions in Bitcoin (2015) (203)
- Secure Localization with Hidden and Mobile Base Stations (2006) (199)
- Distance Hijacking Attacks on Distance Bounding Protocols (2012) (188)
- Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound (2015) (183)
- Home is safer than the cloud!: privacy concerns for consumer cloud storage (2011) (177)
- Wormhole-Based Anti-Jamming Techniques in Sensor Networks (2007) (174)
- Misbehavior in Bitcoin: A Study of Double-Spending and Accountability (2015) (173)
- Analysis of the communication between colluding applications on modern smartphones (2012) (171)
- Wormhole-Based Antijamming Techniques in Sensor Networks (2007) (171)
- Physical-layer Identification of RFID Devices (2009) (169)
- Jamming-resistant Broadcast Communication without Shared Keys (2009) (169)
- Mobility helps peer-to-peer security (2006) (166)
- ROTE: Rollback Protection for Trusted Execution (2017) (166)
- Detection of reactive jamming in sensor networks (2010) (166)
- Efficient uncoordinated FHSS anti-jamming communication (2009) (162)
- Secure neighborhood discovery: a fundamental element for mobile ad hoc networking (2008) (160)
- Secure Location Verification with Hidden and Mobile Base Stations (2008) (156)
- Secure Time Synchronization in Sensor Networks (2008) (146)
- Physical-layer identification of UHF RFID tags (2010) (145)
- SoK: Secure Data Deletion (2013) (143)
- Attacks on public WLAN-based positioning systems (2009) (124)
- Thermal Covert Channels on Multi-core Platforms (2015) (121)
- On the privacy provisions of Bloom filters in lightweight bitcoin clients (2014) (119)
- Enabling secure VM-vTPM migration in private clouds (2011) (112)
- Small worlds in security systems: an analysis of the PGP certificate graph (2002) (104)
- Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems (2010) (95)
- On Limitations of Friendly Jamming for Confidentiality (2013) (90)
- Investigation of Signal and Message Manipulations on the Wireless Channel (2011) (87)
- Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory (2012) (87)
- Location privacy of distance bounding protocols (2008) (86)
- Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in Switzerland (2020) (83)
- ID-Based Secure Distance Bounding and Localization (2009) (83)
- Design Choices for Central Bank Digital Currency: Policy and Technical Considerations (2020) (81)
- Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels (2006) (79)
- SPREE: a spoofing resistant GPS receiver (2016) (78)
- Smartphones as Practical and Secure Location Verification Tokens for Payments (2014) (78)
- BITE: Bitcoin Lightweight Client Privacy using Trusted Execution (2018) (71)
- Integrity Regions: Authentication through Presence in Wireless Networks (2006) (69)
- Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks (2004) (68)
- BISS: building secure routing out of an incomplete set of security associations (2003) (67)
- On Secure Data Deletion (2016) (62)
- Secure data deletion from persistent media (2013) (58)
- μchain: How to Forget without Hard Forks (2017) (56)
- Influence of user perception, security needs, and social factors on device pairing method choices (2010) (54)
- DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization (2017) (53)
- Verena: End-to-End Integrity Protection for Web Applications (2016) (52)
- SecNav: secure broadcast localization and time synchronization in wireless networks (2007) (52)
- Quantifying Web-Search Privacy (2014) (49)
- Formal Reasoning about Physical Properties of Security Protocols (2011) (48)
- Short paper: detection of GPS spoofing attacks in power grids (2014) (47)
- Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks (2009) (47)
- Blockchain Security and Privacy (2018) (46)
- Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System (2012) (45)
- Secure Positioning in Sensor Networks (2004) (44)
- Privacy-preserving clone detection for RFID-enabled supply chains (2010) (43)
- TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation (2017) (43)
- Privacy-preserving clone detection for RFID-enabled supply chains (2010) (43)
- DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization (2019) (42)
- Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures (2016) (41)
- Are We Really Close? Verifying Proximity in Wireless Systems (2017) (41)
- Low-Cost Client Puzzles Based on Modular Exponentiation (2010) (41)
- On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications (2014) (41)
- Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception (2017) (40)
- Tailing RFID Tags for Clone Detection (2013) (39)
- UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks (2018) (37)
- TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing (2018) (35)
- Quantifying Web Adblocker Privacy (2017) (35)
- 1 Security of Distance-Bounding : A Survey (2017) (33)
- 1 Security of Distance-Bounding : A Survey (2017) (33)
- Securing position and distance verification in wireless networks (2004) (33)
- On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? (2011) (32)
- Security of Distance-Bounding (2018) (31)
- Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms (2015) (31)
- For some eyes only: protecting online information sharing (2013) (30)
- UWB rapid-bit-exchange system for distance bounding (2015) (28)
- Let's Get Physical: Models and Methods for Real-World Security Protocols (2009) (27)
- Towards Practical Identification of HF RFID Devices (2012) (27)
- User-level secure deletion on log-structured file systems (2012) (27)
- ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts (2020) (27)
- Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications (2016) (25)
- A formal analysis of Syverson's rational exchange protocol (2002) (25)
- Enforcing Location and Time-Based Access Control on Cloud-Stored Data (2014) (25)
- A formal model of rational exchange and its application to the analysis of Syverson's protocol (2004) (24)
- Physical-layer attacks on chirp-based ranging systems (2012) (24)
- PRCash: Fast, Private and Regulated Transactions for Digital Currencies (2019) (24)
- Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking (2016) (24)
- iPhone and iPod Location Spoofing: Attacks on Public WLAN-based Positioning Systems (2012) (24)
- Secure enrollment and practical migration for mobile trusted execution environments (2013) (23)
- Integrity (I) codes: message integrity protection and authentication over insecure channels (2008) (23)
- Mobile Application Impersonation Detection Using Dynamic User Interface Extraction (2016) (22)
- An architecture for concurrent execution of secure environments in clouds (2013) (21)
- Securing Cloud Data Under Key Exposure (2019) (21)
- DelegaTEE: Brokered Delegation Using Trusted Execution Environments (2018) (21)
- UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband (2019) (21)
- BAP: Broadcast Authentication Using Cryptographic Puzzles (2007) (20)
- Secure Remote Execution of Sequential Computations (2009) (20)
- Distance enlargement and reduction attacks on ultrasound ranging (2005) (19)
- ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution (2019) (19)
- Pay as you browse: microcomputations as micropayments in web-based services (2011) (18)
- Toward Shared Ownership in the Cloud (2018) (18)
- Secure Deletion on Log-structured File Systems (2011) (17)
- Extended Abstract: SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks (2007) (17)
- Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement (2019) (16)
- On the Security of Carrier Phase-Based Ranging (2016) (16)
- Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions (2008) (15)
- Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement (2021) (14)
- ProtectIOn: Root-of-Trust for IO in Compromised Platforms (2019) (14)
- Keeping data secret under full compromise using porter devices (2010) (14)
- Snappy: Fast On-chain Payments with Practical Collaterals (2020) (13)
- On the Security of Bottleneck Bandwidth Estimation Techniques (2009) (13)
- Secure RSS-based localization in sensor networks (2011) (13)
- On Information Leakage in Deduplicated Storage Systems (2016) (12)
- Assisted deletion of related content (2014) (12)
- Proximity Verification for Contactless Access Control and Authentication Systems (2015) (12)
- Exploring the Physical-layer Identification of GSM Devices (2012) (12)
- 2FA-PP: 2nd factor phishing prevention (2019) (11)
- ProximiTEE: Hardened SGX Attestation by Proximity Verification (2020) (11)
- On the Security of End-to-End Measurements Based on Packet-Pair Dispersions (2013) (11)
- Commune: Shared Ownership in an Agnostic Cloud (2013) (11)
- Enabling trusted scheduling in embedded systems (2012) (11)
- Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend (2020) (10)
- Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging (2021) (10)
- I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks (2018) (10)
- Digital radio signal cancellation attacks: an experimental evaluation (2019) (9)
- Digital Contact Tracing (2020) (9)
- Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols (2020) (8)
- Securing Timing Synchronization in Sensor Networks (2007) (8)
- Privacy-preserving outsourcing of brute-force key searches (2011) (8)
- Phishing in Organizations: Findings from a Large-Scale and Long-Term Study (2021) (8)
- PRCash: Centrally-Issued Digital Currency with Privacy and Regulation (2018) (7)
- Isolated Execution on Many-core Architectures (2014) (7)
- Low-power Distance Bounding (2014) (7)
- Composite Enclaves: Towards Disaggregated Trusted Execution (2020) (6)
- Secure Ranging With Message Temporal Integrity (2009) (6)
- Group Distance Bounding Protocols - (Short Paper) (2011) (6)
- Physical-layer integrity for wireless messages (2016) (6)
- Types and Origins of Fingerprints (2016) (6)
- Protecting Sensitive Business Information While Sharing Serial-Level Data (2008) (6)
- LTrack: Stealthy Tracking of Mobile Phones in LTE (2021) (6)
- The research value of publishing attacks (2012) (6)
- SALVE: server authentication with location verification (2016) (6)
- ROSEN (2021) (5)
- Quantifying Location Privacy Leakage from Transaction Prices (2016) (5)
- ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification (2018) (5)
- Secure RSS-based localization in sensor networks; ; Technical report; (2006) (5)
- Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation (2022) (5)
- Using hover to compromise the confidentiality of user input on Android (2016) (5)
- V-Range: Enabling Secure Ranging in 5G Wireless Networks (2022) (5)
- IntegriKey: End-to-End Integrity Protection of User Input (2017) (5)
- Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads (2009) (4)
- Proceedings of the 2012 ACM Workshop on Cloud computing security workshop (2012) (4)
- Exploring Website Location as a Security Indicator (2016) (4)
- Dedicated Security Chips in the Age of Secure Enclaves (2020) (4)
- Physical-layer identification of wireless sensor nodes (2012) (4)
- SoK: Hardware-supported Trusted Execution Environments (2022) (4)
- Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies (2019) (4)
- Integrity (I) codes: Message Integrity Protection Over Insecure Channels (2005) (3)
- AdaptOver: adaptive overshadowing attacks in cellular networks (2021) (3)
- Jamming-resistant Broadcast Communication without Shared Keys; ; ETH Zurich D-INFK Technical Report; (2008) (3)
- Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 (2009) (3)
- iPhone and iPod Location Spoofing (2008) (3)
- Therefore I Leak : Information Leakage in Low-Power Wide Area Networks (2018) (3)
- AdaptOver : Adaptive Overshadowing of LTE signals (2021) (3)
- Logical Partitions on Many-Core Platforms (2015) (2)
- Bitcontracts: Supporting Smart Contracts in Legacy Blockchains (2021) (2)
- Security : Threats and Countermeasures (2016) (2)
- Misbehaviour Detection using Network Topology and Route Information (2004) (2)
- SOWER: self-organizing wireless network for messaging (2004) (2)
- Secure Time Synchronization in Sensor 1 Networks 2 (2008) (2)
- On the Security of End-to-End Network Measurements; ; Technical Reports; (2009) (2)
- Simulation of Self-Organized Public-Key Management for Ad Hoc Networks (2011) (2)
- 2FE: Two-Factor Encryption for Cloud Storage (2020) (2)
- Enabling Short Fragments for Uncoordinated Spread Spectrum Communication (2014) (2)
- Efficient Client Puzzles based on Repeated-Squaring (2009) (2)
- TEEvil: Identity Lease via Trusted Execution Environments (2019) (2)
- CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks (2017) (2)
- Secure Brokered Delegation Through DelegaTEE (2019) (2)
- IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients (2020) (2)
- Securing Cloud Data in the New Attacker Model (2014) (2)
- PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment (2020) (1)
- Jamming Resistance (2011) (1)
- Introduction to the Issue on Signal and Information Processing for Privacy (2015) (1)
- Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations) (2007) (1)
- Cyber-Risks in Paper Voting (2019) (1)
- Software-Based Attestation (2011) (1)
- GDB: Group Distance Bounding Protocols (2010) (1)
- W-SPS: Designing a Wide-Area Secure Positioning System (2015) (1)
- Microcomputations as Micropayments in Web-based Services (2014) (1)
- Physical Layer & Telecommunications Security Knowledge Area Issue 1 . 0 (2019) (1)
- Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones (2021) (1)
- Security of Multicarrier Time-of-Flight Ranging (2021) (1)
- Security of Distance Bounding Protocols (2011) (1)
- Secure Positioning and Location-Based Security for IoT and Beyond (2018) (1)
- Towards Secure End-to-End Network Measurements (2009) (1)
- PIE: A Platform-wide TEE (2021) (1)
- Session details: Ad hoc networks and RFID (work in progress) (2005) (0)
- iPhone and iPod Location Spoofing; ; Technical Reports; (2008) (0)
- Physical-layer Identification of Wireless Sensor Nodes; ; Technical Report; (2008) (0)
- Uncoordinated Direct Sequence Spread Spectrum (2011) (0)
- Cryptology and Network Security (2017) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- Physical Layer & Telecommunications Security Knowledge Area Version 1 . 0 . 1 (2021) (0)
- Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks (2017) (0)
- Rigol’s ASK / FSK Test System for Keyless Entry (2017) (0)
- PHYSICAL LAYER & TELECOMMUNICATIONS SECURITY KNOWLEDGE AREA ( DRAFT FOR COMMENT ) (2019) (0)
- Empowering Data Centers for Next Generation Trusted Computing (2022) (0)
- Uncoordinated Frequency Hopping Spread Spectrum (2011) (0)
- Deniable Upload and Download via Passive Participation (2019) (0)
- ROSEN: RObust and SElective Non-repudiation (for TLS) (2021) (0)
- From securing navigation systems to securing wireless communication through location-awareness (2007) (0)
- On (the Lack of) Code Confidentiality in Trusted Execution Environments (2022) (0)
- AdaptOver (2022) (0)
- It's TEEtime: Bringing User Sovereignty to Smartphones (2022) (0)
- Trust and Trustworthy Computing (2013) (0)
- On the practicality of UHF RFID fingerprinting (2011) (0)
- For Some Eyes Only (2012) (0)
- An improved privacy-preserving clone detection mechanism against realistic adversaries (2010) (0)
- System and method for generating and maintaining a relative positioning system without GPS (2001) (0)
- EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems (2023) (0)
- Session details: Storage (2013) (0)
- Subgroup Cryptosystems (2011) (0)
- ADC 0 90 Σ Digital Demod . Digital Modulator Control Logic Voltage Regulator Oscillator (2011) (0)
- Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals (2016) (0)
- Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies (2022) (0)
- Root Previous Hash Block Header i Smart Contract Root Account RootNonce Timestamp Transaction Root Previous Hash Block Header i-1 Smart Contract Root Account RootNonce Timestamp Transaction Root Previous Hash Block Header i + 1 Smart Contract Root (2017) (0)
- Mutable Blockchain: How to Forget without Hard Forks (2017) (0)
- Jamming-resistant Broadcast Communication without Shared Keys; ; Technical Report ; (2008) (0)
- Securing Information in Peer-to-Peer Environment (2020) (0)
- Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks (2007) (0)
- 4th cloud computing security workshop (CCSW 2012) (2012) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Srđjan Čapkun?
Srđjan Čapkun is affiliated with the following schools: