dblp.uni-trier.dewww.uni-trier.de

Susanne Wetzel

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EEJared Cordasco, Susanne Wetzel: An attacker model for MANET routing security. WISEC 2009: 87-94
2008
28EEMarkus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang: Love and authentication. CHI 2008: 197-200
27EEMarkus Jakobsson, Liu Yang, Susanne Wetzel: Quantifying the security of preference-based authentication. Digital Identity Management 2008: 61-70
26EEJared Cordasco, Susanne Wetzel: Cryptographic Versus Trust-based Methods for MANET Routing Security. Electr. Notes Theor. Comput. Sci. 197(2): 131-140 (2008)
2007
25EEWerner Backes, Susanne Wetzel: An Efficient LLL Gram Using Buffered Transformations. CASC 2007: 31-44
24EEUlrike Meyer, Susanne Wetzel, Sotiris Ioannidis: Distributed Privacy-Preserving Policy Reconciliation. ICC 2007: 1342-1349
23EEJonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer: Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. POLICY 2007: 221-228
2006
22EEUlrike Meyer, Susanne Wetzel: Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover. PerCom Workshops 2006: 277-282
21EEAlex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel: Warkitting: The Drive-by Subversion of Wireless Home Routers. J. Digital Forensic Practice 1(3): 179-192 (2006)
2005
20 Susanne Wetzel: Biometrics and cryptography. ICETE 2005
19 Seny Kamara, Breno de Medeiros, Susanne Wetzel: Secret locking: Exploring new approaches to biometric key encapsulation. ICETE 2005: 254-261
18EEJong Youl Choi, Markus Jakobsson, Susanne Wetzel: Balancing auditability and privacy in vehicular networks. Q2SWinet 2005: 79-87
17EEUlrike Meyer, Jared Cordasco, Susanne Wetzel: An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. WMASH 2005: 1-13
2004
16EEMarkus Jakobsson, XiaoFeng Wang, Susanne Wetzel: Stealth attacks in vehicular technologies. VTC Fall (2) 2004: 1218-1222
15EEMarkus Jakobsson, Susanne Wetzel: Efficient attribute authentication with applications to ad hoc networks. Vehicular Ad Hoc Networks 2004: 38-46
14EEUlrike Meyer, Susanne Wetzel: A man-in-the-middle attack on UMTS. Workshop on Wireless Security 2004: 90-97
2002
13EEWerner Backes, Susanne Wetzel: Heuristics on Lattice Basis Reduction in Practice. ACM Journal of Experimental Algorithmics 7: 1 (2002)
12EEFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1(2): 69-83 (2002)
2001
11EEMarkus Jakobsson, Susanne Wetzel: Security Weaknesses in Bluetooth. CT-RSA 2001: 176-191
10EEFabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel: Cryptographic Key Generation from Voice. IEEE Symposium on Security and Privacy 2001: 202-213
9EEMarkus Jakobsson, Susanne Wetzel: Secure Server-Aided Signature Generation. Public Key Cryptography 2001: 383-401
2000
8 Werner Backes, Susanne Wetzel: New Results on Lattice Basis Reduction in Practice. ANTS 2000: 135-152
7EEWerner Backes, Susanne Wetzel: Lattice Basis Reduction with Dynamic Approximation. Algorithm Engineering 2000: 63-73
1999
6EEFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password Hardening Based on Keystroke Dynamics. ACM Conference on Computer and Communications Security 1999: 73-82
1998
5EESusanne Wetzel: An Efficient Parallel Block-Reduction Algorithm. ANTS 1998: 323-337
4 Ingrid Biehl, Bernd Meyer, Susanne Wetzel: Visual Cryptography - How to Use Images to Share a Secret. GI Jahrestagung 1998: 3-12
3EEIngrid Biehl, Bernd Meyer, Susanne Wetzel: Ensuring the Integrity of Agent-Based Computations by Short Proofs. Mobile Agents 1998: 183-194
1997
2 Ingrid Biehl, Susanne Wetzel: Traceable visual cryptography. ICICS 1997: 61-71
1EEPatrick Theobald, Susanne Wetzel, Werner Backes: Design concepts for matrices and lattices in LiDIA. SAC 1997: 532-536

Coauthor Index

1Werner Backes [1] [7] [8] [13] [25]
2Ingrid Biehl [2] [3] [4]
3Jong Youl Choi [18]
4Jared Cordasco [17] [26] [29]
5Sotiris Ioannidis [23] [24]
6Markus Jakobsson [9] [11] [15] [16] [18] [21] [27] [28]
7Seny Kamara [19]
8Qi Li [10]
9Breno de Medeiros [19]
10Bernd Meyer [3] [4]
11Ulrike Meyer [14] [17] [22] [23] [24]
12Fabian Monrose [6] [10] [12]
13Michael K. Reiter [6] [10] [12]
14Erik Stolterman [28]
15Patrick Theobald [1]
16Alex Tsow [21]
17Jonathan Voris [23]
18XiaoFeng Wang [16]
19Liu Yang [21] [27] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)