Seguir
Susanne Wetzel
Susanne Wetzel
Professor of Computer Science, Stevens Institute of Technology
Dirección de correo verificada de acm.org
Título
Citado por
Citado por
Año
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International Journal of Information Security 1 (2), 69-83, 2002
7562002
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
5552000
Security weaknesses in Bluetooth
M Jakobsson, S Wetzel
Cryptographers’ Track at the RSA Conference, 176-191, 2001
4912001
A man-in-the-middle attack on UMTS
U Meyer, S Wetzel
Proceedings of the 3rd ACM workshop on Wireless security, 90-97, 2004
3382004
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks
U Meyer, S Wetzel
2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio …, 2004
1702004
Balancing auditability and privacy in vehicular networks
JY Choi, M Jakobsson, S Wetzel
Proceedings of the 1st ACM international workshop on Quality of service …, 2005
1562005
Using voice to generate cryptographic keys
F Monrose, MK Reiter, Q Li, S Wetzel
2001: A Speaker Odyssey-The Speaker Recognition Workshop, 2001
1262001
Cryptographic versus trust-based methods for MANET routing security
J Cordasco, S Wetzel
Electronic Notes in Theoretical Computer Science 197 (2), 131-140, 2008
1142008
Discount anonymous on demand routing for mobile ad hoc networks
L Yang, M Jakobsson, S Wetzel
2006 Securecomm and Workshops, 1-10, 2006
942006
Stealth attacks on ad-hoc wireless networks
M Jakobsson, S Wetzel, B Yener
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No …, 2003
852003
Love and authentication
M Jakobsson, E Stolterman, S Wetzel, L Yang
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
832008
Secure server-aided signature generation
M Jakobsson, S Wetzel
Public Key Cryptography, 383-401, 2001
742001
Ensuring the integrity of agent-based computations by short proofs
I Biehl, B Meyer, S Wetzel
Mobile Agents, 183-194, 1998
651998
Warkitting: the drive-by subversion of wireless home routers
A Tsow, M Jakobsson, L Yang, S Wetzel
Journal of Digital Forensic Practice 1 (3), 179-192, 2006
582006
Quantifying the security of preference-based authentication
M Jakobsson, L Yang, S Wetzel
Proceedings of the 4th ACM workshop on Digital identity management, 61-70, 2008
472008
Method and apparatus for ensuring security of users of bluetooth TM-enabled devices
BM Jakobsson, SG Wetzel
US Patent 6,574,455, 2003
432003
Generation of repeatable cryptographic key based on varying parameters
PL Bohannon, BM Jakobsson, F Monrose, MK Reiter, SG Wetzel
US Patent 6,901,145, 2005
382005
Towards information assurance (IA) curricular guidelines
S Cooper, C Nickell, LC Pérez, B Oldfield, J Brynielsson, AG Gökce, ...
Proceedings of the 2010 ITiCSE working group reports, 49-64, 2010
342010
Traceable visual cryptography
I Biehl, S Wetzel
Information and Communications Security: First International Conference …, 1997
331997
Efficient attribute authentication with applications to ad hoc networks
M Jakobsson, S Wetzel
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
322004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20