| 2009 |
| 29 | EE | Jared Cordasco,
Susanne Wetzel:
An attacker model for MANET routing security.
WISEC 2009: 87-94 |
| 2008 |
| 28 | EE | Markus Jakobsson,
Erik Stolterman,
Susanne Wetzel,
Liu Yang:
Love and authentication.
CHI 2008: 197-200 |
| 27 | EE | Markus Jakobsson,
Liu Yang,
Susanne Wetzel:
Quantifying the security of preference-based authentication.
Digital Identity Management 2008: 61-70 |
| 26 | EE | Jared Cordasco,
Susanne Wetzel:
Cryptographic Versus Trust-based Methods for MANET Routing Security.
Electr. Notes Theor. Comput. Sci. 197(2): 131-140 (2008) |
| 2007 |
| 25 | EE | Werner Backes,
Susanne Wetzel:
An Efficient LLL Gram Using Buffered Transformations.
CASC 2007: 31-44 |
| 24 | EE | Ulrike Meyer,
Susanne Wetzel,
Sotiris Ioannidis:
Distributed Privacy-Preserving Policy Reconciliation.
ICC 2007: 1342-1349 |
| 23 | EE | Jonathan Voris,
Sotiris Ioannidis,
Susanne Wetzel,
Ulrike Meyer:
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols.
POLICY 2007: 221-228 |
| 2006 |
| 22 | EE | Ulrike Meyer,
Susanne Wetzel:
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover.
PerCom Workshops 2006: 277-282 |
| 21 | EE | Alex Tsow,
Markus Jakobsson,
Liu Yang,
Susanne Wetzel:
Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digital Forensic Practice 1(3): 179-192 (2006) |
| 2005 |
| 20 | | Susanne Wetzel:
Biometrics and cryptography.
ICETE 2005 |
| 19 | | Seny Kamara,
Breno de Medeiros,
Susanne Wetzel:
Secret locking: Exploring new approaches to biometric key encapsulation.
ICETE 2005: 254-261 |
| 18 | EE | Jong Youl Choi,
Markus Jakobsson,
Susanne Wetzel:
Balancing auditability and privacy in vehicular networks.
Q2SWinet 2005: 79-87 |
| 17 | EE | Ulrike Meyer,
Jared Cordasco,
Susanne Wetzel:
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.
WMASH 2005: 1-13 |
| 2004 |
| 16 | EE | Markus Jakobsson,
XiaoFeng Wang,
Susanne Wetzel:
Stealth attacks in vehicular technologies.
VTC Fall (2) 2004: 1218-1222 |
| 15 | EE | Markus Jakobsson,
Susanne Wetzel:
Efficient attribute authentication with applications to ad hoc networks.
Vehicular Ad Hoc Networks 2004: 38-46 |
| 14 | EE | Ulrike Meyer,
Susanne Wetzel:
A man-in-the-middle attack on UMTS.
Workshop on Wireless Security 2004: 90-97 |
| 2002 |
| 13 | EE | Werner Backes,
Susanne Wetzel:
Heuristics on Lattice Basis Reduction in Practice.
ACM Journal of Experimental Algorithmics 7: 1 (2002) |
| 12 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password hardening based on keystroke dynamics.
Int. J. Inf. Sec. 1(2): 69-83 (2002) |
| 2001 |
| 11 | EE | Markus Jakobsson,
Susanne Wetzel:
Security Weaknesses in Bluetooth.
CT-RSA 2001: 176-191 |
| 10 | EE | Fabian Monrose,
Michael K. Reiter,
Qi Li,
Susanne Wetzel:
Cryptographic Key Generation from Voice.
IEEE Symposium on Security and Privacy 2001: 202-213 |
| 9 | EE | Markus Jakobsson,
Susanne Wetzel:
Secure Server-Aided Signature Generation.
Public Key Cryptography 2001: 383-401 |
| 2000 |
| 8 | | Werner Backes,
Susanne Wetzel:
New Results on Lattice Basis Reduction in Practice.
ANTS 2000: 135-152 |
| 7 | EE | Werner Backes,
Susanne Wetzel:
Lattice Basis Reduction with Dynamic Approximation.
Algorithm Engineering 2000: 63-73 |
| 1999 |
| 6 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password Hardening Based on Keystroke Dynamics.
ACM Conference on Computer and Communications Security 1999: 73-82 |
| 1998 |
| 5 | EE | Susanne Wetzel:
An Efficient Parallel Block-Reduction Algorithm.
ANTS 1998: 323-337 |
| 4 | | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Visual Cryptography - How to Use Images to Share a Secret.
GI Jahrestagung 1998: 3-12 |
| 3 | EE | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Ensuring the Integrity of Agent-Based Computations by Short Proofs.
Mobile Agents 1998: 183-194 |
| 1997 |
| 2 | | Ingrid Biehl,
Susanne Wetzel:
Traceable visual cryptography.
ICICS 1997: 61-71 |
| 1 | EE | Patrick Theobald,
Susanne Wetzel,
Werner Backes:
Design concepts for matrices and lattices in LiDIA.
SAC 1997: 532-536 |