2009 |
29 | EE | Jared Cordasco,
Susanne Wetzel:
An attacker model for MANET routing security.
WISEC 2009: 87-94 |
2008 |
28 | EE | Markus Jakobsson,
Erik Stolterman,
Susanne Wetzel,
Liu Yang:
Love and authentication.
CHI 2008: 197-200 |
27 | EE | Markus Jakobsson,
Liu Yang,
Susanne Wetzel:
Quantifying the security of preference-based authentication.
Digital Identity Management 2008: 61-70 |
26 | EE | Jared Cordasco,
Susanne Wetzel:
Cryptographic Versus Trust-based Methods for MANET Routing Security.
Electr. Notes Theor. Comput. Sci. 197(2): 131-140 (2008) |
2007 |
25 | EE | Werner Backes,
Susanne Wetzel:
An Efficient LLL Gram Using Buffered Transformations.
CASC 2007: 31-44 |
24 | EE | Ulrike Meyer,
Susanne Wetzel,
Sotiris Ioannidis:
Distributed Privacy-Preserving Policy Reconciliation.
ICC 2007: 1342-1349 |
23 | EE | Jonathan Voris,
Sotiris Ioannidis,
Susanne Wetzel,
Ulrike Meyer:
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols.
POLICY 2007: 221-228 |
2006 |
22 | EE | Ulrike Meyer,
Susanne Wetzel:
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover.
PerCom Workshops 2006: 277-282 |
21 | EE | Alex Tsow,
Markus Jakobsson,
Liu Yang,
Susanne Wetzel:
Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digital Forensic Practice 1(3): 179-192 (2006) |
2005 |
20 | | Susanne Wetzel:
Biometrics and cryptography.
ICETE 2005 |
19 | | Seny Kamara,
Breno de Medeiros,
Susanne Wetzel:
Secret locking: Exploring new approaches to biometric key encapsulation.
ICETE 2005: 254-261 |
18 | EE | Jong Youl Choi,
Markus Jakobsson,
Susanne Wetzel:
Balancing auditability and privacy in vehicular networks.
Q2SWinet 2005: 79-87 |
17 | EE | Ulrike Meyer,
Jared Cordasco,
Susanne Wetzel:
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.
WMASH 2005: 1-13 |
2004 |
16 | EE | Markus Jakobsson,
XiaoFeng Wang,
Susanne Wetzel:
Stealth attacks in vehicular technologies.
VTC Fall (2) 2004: 1218-1222 |
15 | EE | Markus Jakobsson,
Susanne Wetzel:
Efficient attribute authentication with applications to ad hoc networks.
Vehicular Ad Hoc Networks 2004: 38-46 |
14 | EE | Ulrike Meyer,
Susanne Wetzel:
A man-in-the-middle attack on UMTS.
Workshop on Wireless Security 2004: 90-97 |
2002 |
13 | EE | Werner Backes,
Susanne Wetzel:
Heuristics on Lattice Basis Reduction in Practice.
ACM Journal of Experimental Algorithmics 7: 1 (2002) |
12 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password hardening based on keystroke dynamics.
Int. J. Inf. Sec. 1(2): 69-83 (2002) |
2001 |
11 | EE | Markus Jakobsson,
Susanne Wetzel:
Security Weaknesses in Bluetooth.
CT-RSA 2001: 176-191 |
10 | EE | Fabian Monrose,
Michael K. Reiter,
Qi Li,
Susanne Wetzel:
Cryptographic Key Generation from Voice.
IEEE Symposium on Security and Privacy 2001: 202-213 |
9 | EE | Markus Jakobsson,
Susanne Wetzel:
Secure Server-Aided Signature Generation.
Public Key Cryptography 2001: 383-401 |
2000 |
8 | | Werner Backes,
Susanne Wetzel:
New Results on Lattice Basis Reduction in Practice.
ANTS 2000: 135-152 |
7 | EE | Werner Backes,
Susanne Wetzel:
Lattice Basis Reduction with Dynamic Approximation.
Algorithm Engineering 2000: 63-73 |
1999 |
6 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password Hardening Based on Keystroke Dynamics.
ACM Conference on Computer and Communications Security 1999: 73-82 |
1998 |
5 | EE | Susanne Wetzel:
An Efficient Parallel Block-Reduction Algorithm.
ANTS 1998: 323-337 |
4 | | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Visual Cryptography - How to Use Images to Share a Secret.
GI Jahrestagung 1998: 3-12 |
3 | EE | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Ensuring the Integrity of Agent-Based Computations by Short Proofs.
Mobile Agents 1998: 183-194 |
1997 |
2 | | Ingrid Biehl,
Susanne Wetzel:
Traceable visual cryptography.
ICICS 1997: 61-71 |
1 | EE | Patrick Theobald,
Susanne Wetzel,
Werner Backes:
Design concepts for matrices and lattices in LiDIA.
SAC 1997: 532-536 |