Susanne Wetzel
Susanne Wetzel
Professor of Computer Science, Stevens Institute of Technology
Verifierad e-postadress på acm.org
Titel
Citeras av
Citeras av
År
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International Journal of Information Security 1 (2), 69-83, 2002
6762002
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
4982000
Security weaknesses in Bluetooth
M Jakobsson, S Wetzel
Cryptographers’ Track at the RSA Conference, 176-191, 2001
4232001
A man-in-the-middle attack on UMTS
U Meyer, S Wetzel
Proceedings of the 3rd ACM workshop on Wireless security, 90-97, 2004
2602004
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks
U Meyer, S Wetzel
2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio …, 2004
1382004
Balancing auditability and privacy in vehicular networks
JY Choi, M Jakobsson, S Wetzel
Proceedings of the 1st ACM international workshop on Quality of service …, 2005
1202005
Using voice to generate cryptographic keys
F Monrose, MK Reiter, Q Li, S Wetzel
2001: A Speaker Odyssey-The Speaker Recognition Workshop, 2001
1142001
Cryptographic versus trust-based methods for MANET routing security
J Cordasco, S Wetzel
Electronic Notes in Theoretical Computer Science 197 (2), 131-140, 2008
962008
Discount anonymous on demand routing for mobile ad hoc networks
L Yang, M Jakobsson, S Wetzel
2006 Securecomm and Workshops, 1-10, 2006
812006
Love and authentication
M Jakobsson, E Stolterman, S Wetzel, L Yang
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
722008
Stealth attacks on ad-hoc wireless networks
M Jakobsson, S Wetzel, B Yener
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No …, 2003
722003
Secure server-aided signature generation
M Jakobsson, S Wetzel
Public Key Cryptography, 383-401, 2001
612001
Warkitting: the drive-by subversion of wireless home routers
A Tsow, M Jakobsson, L Yang, S Wetzel
Journal of Digital Forensic Practice 1 (3), 179-192, 2006
512006
Ensuring the integrity of agent-based computations by short proofs
I Biehl, B Meyer, S Wetzel
Mobile Agents, 183-194, 1998
491998
Quantifying the security of preference-based authentication
M Jakobsson, L Yang, S Wetzel
Proceedings of the 4th ACM workshop on Digital identity management, 61-70, 2008
382008
Generation of repeatable cryptographic key based on varying parameters
PL Bohannon, BM Jakobsson, F Monrose, MK Reiter, SG Wetzel
US Patent 6,901,145, 2005
362005
Method and apparatus for ensuring security of users of bluetooth TM-enabled devices
BM Jakobsson, SG Wetzel
US Patent 6,574,455, 2003
362003
Towards information assurance (IA) curricular guidelines
S Cooper, C Nickell, LC Pérez, B Oldfield, J Brynielsson, AG Gökce, ...
Proceedings of the 2010 ITiCSE working group reports, 49-64, 2010
332010
Efficient attribute authentication with applications to ad hoc networks
M Jakobsson, S Wetzel
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
302004
Traceable visual cryptography
I Biehl, S Wetzel
International Conference on Information and Communications Security, 61-71, 1997
271997
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20