The SCEAS System
Navigation Menu

Search the dblp DataBase


Susanne Wetzel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Werner Backes, Susanne Wetzel
    New Results on Lattice Basis Reduction in Practice. [Citation Graph (0, 0)][DBLP]
    ANTS, 2000, pp:135-152 [Conf]
  2. Susanne Wetzel
    An Efficient Parallel Block-Reduction Algorithm. [Citation Graph (0, 0)][DBLP]
    ANTS, 1998, pp:323-337 [Conf]
  3. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password Hardening Based on Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:73-82 [Conf]
  4. Markus Jakobsson, Susanne Wetzel
    Security Weaknesses in Bluetooth. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:176-191 [Conf]
  5. Ingrid Biehl, Bernd Meyer, Susanne Wetzel
    Visual Cryptography - How to Use Images to Share a Secret. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 1998, pp:3-12 [Conf]
  6. Seny Kamara, Breno de Medeiros, Susanne Wetzel
    Secret locking: Exploring new approaches to biometric key encapsulation. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:254-261 [Conf]
  7. Susanne Wetzel
    Biometrics and cryptography. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:- [Conf]
  8. Ingrid Biehl, Susanne Wetzel
    Traceable visual cryptography. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:61-71 [Conf]
  9. Ingrid Biehl, Bernd Meyer, Susanne Wetzel
    Ensuring the Integrity of Agent-Based Computations by Short Proofs. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 1998, pp:183-194 [Conf]
  10. Markus Jakobsson, Susanne Wetzel
    Efficient attribute authentication with applications to ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Vehicular Ad Hoc Networks, 2004, pp:38-46 [Conf]
  11. Ulrike Meyer, Susanne Wetzel
    Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:277-282 [Conf]
  12. Markus Jakobsson, Susanne Wetzel
    Secure Server-Aided Signature Generation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:383-401 [Conf]
  13. Patrick Theobald, Susanne Wetzel, Werner Backes
    Design concepts for matrices and lattices in LiDIA. [Citation Graph (0, 0)][DBLP]
    SAC, 1997, pp:532-536 [Conf]
  14. Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel
    Cryptographic Key Generation from Voice. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:202-213 [Conf]
  15. Werner Backes, Susanne Wetzel
    Lattice Basis Reduction with Dynamic Approximation. [Citation Graph (0, 0)][DBLP]
    Algorithm Engineering, 2000, pp:63-73 [Conf]
  16. Ulrike Meyer, Jared Cordasco, Susanne Wetzel
    An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. [Citation Graph (0, 0)][DBLP]
    WMASH, 2005, pp:1-13 [Conf]
  17. Ulrike Meyer, Susanne Wetzel
    A man-in-the-middle attack on UMTS. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:90-97 [Conf]
  18. Markus Jakobsson, XiaoFeng Wang, Susanne Wetzel
    Stealth attacks in vehicular technologies. [Citation Graph (0, 0)][DBLP]
    VTC Fall (2), 2004, pp:1218-1222 [Conf]
  19. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password hardening based on keystroke dynamics. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:69-83 [Journal]
  20. Werner Backes, Susanne Wetzel
    Heuristics on Lattice Basis Reduction in Practice. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Experimental Algorithms, 2002, v:7, n:, pp:1- [Journal]
  21. Werner Backes, Susanne Wetzel
    An Efficient LLL Gram Using Buffered Transformations. [Citation Graph (0, 0)][DBLP]
    CASC, 2007, pp:31-44 [Conf]
  22. Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer
    Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:221-228 [Conf]

  23. Love and authentication. [Citation Graph (, )][DBLP]

  24. Quantifying the security of preference-based authentication. [Citation Graph (, )][DBLP]

  25. Parallel Lattice Basis Reduction Using a Multi-threaded Schnorr-Euchner LLL Algorithm. [Citation Graph (, )][DBLP]

  26. Distributed Privacy-Preserving Policy Reconciliation. [Citation Graph (, )][DBLP]

  27. Balancing auditability and privacy in vehicular networks. [Citation Graph (, )][DBLP]

  28. Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. [Citation Graph (, )][DBLP]

  29. An attacker model for MANET routing security. [Citation Graph (, )][DBLP]

  30. Cryptographic Versus Trust-based Methods for MANET Routing Security. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002