- Campus Life
For a full list visit Google Scholar.
Jansen, Kai, and Christina Pöpper. "Opinion: Advancing Attacker Models of Satellite-based Localization Systems–The case of Multi-device Attackers" In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 156-159. ACM, 2017.
Jansen, Kai, Nils Ole Tippenhauer, and Christina Pöpper. "Multi-Receiver GPS Spoofing Detection: Error Models and Realization" In Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 237-250. ACM, 2016.
Rupprecht, David, Kai Jansen, and Christina Pöpper. "Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness." In WOOT. 2016.
Kohls, Katharina, Thorsten Holz, Dorothea Kolossa, and Christina Pöpper. "SkypeLine: Robust Hidden Data Transmission for VoIP." In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 877-888. ACM, 2016.
Zarras, Apostolis, Katharina Kohls, Markus Dürmuth, and Christina Pöpper. "Neuralyzer: Flexible Expiration Times for the Revocation of Online Data." In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 14-25. ACM, 2016.