Ivan Martinovic
Ivan Martinovic
Professor of Computer Science, University of Oxford, UK
Verified email at cs.ox.ac.uk - Homepage
Cited by
Cited by
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
M Frank, R Biedert, E Ma, I Martinovic, D Song
IEEE transactions on information forensics and security 8 (1), 136-148, 2012
Short paper: reactive jamming in wireless networks: how realistic is the threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011
Realities and challenges of nextgen air traffic management: the case of ADS-B
M Strohmeier, M Schafer, V Lenders, I Martinovic
IEEE Communications Magazine 52 (5), 111-118, 2014
On the security of the automatic dependent surveillance-broadcast protocol
M Strohmeier, V Lenders, I Martinovic
IEEE Communications Surveys & Tutorials 17 (2), 1066-1087, 2014
Bringing up OpenSky: A large-scale ADS-B sensor network for research
M Schäfer, M Strohmeier, V Lenders, I Martinovic, M Wilhelm
IPSN-14 Proceedings of the 13th International Symposium on Information …, 2014
On the feasibility of side-channel attacks with brain-computer interfaces
I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song
Presented as part of the 21st {USENIX} security symposium ({USENIX} Security …, 2012
Experimental analysis of attacks on next generation air traffic communication
M Schäfer, V Lenders, I Martinovic
International Conference on Applied Cryptography and Network Security, 253-271, 2013
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
Who do you sync you are? smartphone fingerprinting via application behaviour
T Stöber, M Frank, J Schmitt, I Martinovic
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
Secure key generation in sensor networks based on frequency-selective channels
M Wilhelm, I Martinovic, JB Schmitt
IEEE Journal on Selected Areas in Communications 31 (9), 1779-1790, 2013
On perception and reality in wireless air traffic communication security
M Strohmeier, M Schäfer, R Pinheiro, V Lenders, I Martinovic
IEEE transactions on intelligent transportation systems 18 (6), 1338-1357, 2016
Jamming for good: a fresh approach to authentic communication in WSNs
I Martinovic, P Pichota, JB Schmitt
Proceedings of the second ACM conference on Wireless network security, 161-168, 2009
Secret keys from entangled sensor motes: implementation and analysis
M Wilhelm, I Martinovic, JB Schmitt
Proceedings of the third ACM conference on Wireless network security, 139-144, 2010
A practical man-in-the-middle attack on signal-based key generation protocols
S Eberz, M Strohmeier, M Wilhelm, I Martinovic
European Symposium on Research in Computer Security, 235-252, 2012
Improving performance bounds in feed-forward networks by paying multiplexing only once
JB Schmitt, FA Zdarsky, I Martinovic
14th GI/ITG Conference-Measurement, Modelling and Evalutation of Computer …, 2008
A survey on dependable routing in sensor networks, ad hoc networks, and cellular networks
M Hollick, I Martinovic, T Krop, I Rimac
Proceedings. 30th Euromicro Conference, 2004., 495-502, 2004
Authentication Using Pulse− Response Biometrics
KB Rasmussen, M Roeschlin, I Martinovic, G Tsudik
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Internet Society, 2015
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20