Follow
Benessa Defend
Benessa Defend
Ahold Delhaize
No verified email
Title
Cited by
Cited by
Year
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
D Halperin, TS Heydt-Benjamin, B Ransford, SS Clark, B Defend, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 129-142, 2008
10252008
Privacy for public transportation
TS Heydt-Benjamin, HJ Chae, B Defend, K Fu
International Workshop on Privacy Enhancing Technologies, 1-19, 2006
1342006
Cryptanalysis of two lightweight RFID authentication schemes
B Defend, K Fu, A Juels
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
582007
Implementation of privacy-friendly aggregation for the smart grid
B Defend, K Kursawe
Proceedings of the first ACM workshop on Smart energy grid security, 65-74, 2013
342013
Nonesuch: a mix network with sender unobservability
TS Heydt-Benjamin, A Serjantov, B Defend
Proceedings of the 5th ACM workshop on Privacy in electronic society, 1-8, 2006
222006
Protecting global medical telemetry infrastructure
B Defend, M Salajegheh, K Fu, S Inoue
University of Massachusetts Amherst and Kyushu University, Trustees of …, 2008
162008
Establishment of Upper Bounds for Internet Round Trip Message Latency
J Shamsi, M Brockmeyer, B Defend
Technical Report. Department of Computer Science Wayne State University, 2005
12005
Second Smart Energy Grid Security Workshop (SEGS 2014)
K Kursawe, B Defend
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2014
Smart energy grid security workshop (SEGS'13)
K Kursawe, B Defend
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2013
Espresspay: A Platform for Experiments in RFID Authentication
HJ Chae, B Defend, T Heydt-Benjamin
2005
3.2 EV Smart Charging Security Architectures
B Defend
Privacy and Security in Smart Energy Grids, 102, 0
The system can't perform the operation now. Try again later.
Articles 1–11