{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound N Karapanos, C Marforio, C Soriente, S Capkun 24th USENIX security symposium (USENIX security 15), 483-498, 2015 | 506* | 2015 |
Smartphones as Practical and Secure Location Verification Tokens for Payments C Marforio, N Karapanos, C Soriente, K Kostiainen, C Srdjan 2014 Network and Distributed System Security Symposium (NDSS), 2014 | 99 | 2014 |
Verena: End-to-end integrity protection for web applications N Karapanos, A Filios, RA Popa, S Capkun 2016 IEEE Symposium on Security and Privacy (SP), 895-913, 2016 | 74 | 2016 |
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications N Karapanos, S Capkun 23rd USENIX Security Symposium, 2014 | 60 | 2014 |
Secure enrollment and practical migration for mobile trusted execution environments C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 32 | 2013 |
Assisted deletion of related content H Ritzdorf, N Karapanos, S Čapkun Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 12 | 2014 |
Strengthening Authentication and Integrity in Web Applications N Karapanos ETH Zurich, 2018 | | 2018 |