2008 |
5 | EE | Alexei Czeskis,
Karl Koscher,
Joshua R. Smith,
Tadayoshi Kohno:
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.
ACM Conference on Computer and Communications Security 2008: 479-490 |
4 | EE | Alexei Czeskis,
David J. St. Hilaire,
Karl Koscher,
Steven D. Gribble,
Tadayoshi Kohno,
Bruce Schneier:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications.
HotSec 2008 |
3 | EE | Gaetano Borriello,
Carl Hartung,
Bruce Hemingway,
Karl Koscher,
Brian Mayton:
Multi-player soccer and wireless embedded systems.
SIGCSE 2008: 82-86 |
2 | EE | Tanzeem Choudhury,
Gaetano Borriello,
Sunny Consolvo,
Dirk Hähnel,
Beverly L. Harrison,
Bruce Hemingway,
Jeffrey Hightower,
Predrag V. Klasnja,
Karl Koscher,
Anthony LaMarca,
James A. Landay,
Louis LeGrand,
Jonathan Lester,
Ali Rahimi,
Adam Rea,
Danny Wyatt:
The Mobile Sensing Platform: An Embedded Activity Recognition System.
IEEE Pervasive Computing 7(2): 32-41 (2008) |
2007 |
1 | EE | Adrienne H. Andrew,
Yaw Anokwa,
Karl Koscher,
Jonathan Lester,
Gaetano Borriello:
Context to Make You More Aware.
ICDCS Workshops 2007: 49 |