Michael Reiter
#90,600
Most Influential Person Now
American computer scientist
Michael Reiter 's AcademicInfluence.com Rankings
Michael Reiter computer-science Degrees
Computer Science
#3859
World Rank
#4056
Historical Rank
#1379
USA Rank
Operating Systems
#5
World Rank
#5
Historical Rank
#5
USA Rank
Database
#1174
World Rank
#1235
Historical Rank
#324
USA Rank

Download Badge
Computer Science
Michael Reiter 's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Michael Reiter Influential?
(Suggest an Edit or Addition)According to Wikipedia, Michael K. Reiter is a fellow of the Association for Computing Machinery and a James B. Duke Professor at Duke University. He was formerly the Lawrence M. Slifkin Distinguished Professor of Computer Science at the University of North Carolina at Chapel Hill. He was previously a professor of electrical and computer engineering and computer science at Carnegie Mellon University in Pittsburgh. Reiter's research interests are in computer and communications security and distributed computing.
Michael Reiter 's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Crowds: anonymity for Web transactions (1998) (2130)
- False data injection attacks against state estimation in electric power grids (2009) (1621)
- Stealing Machine Learning Models via Prediction APIs (2016) (1248)
- Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition (2016) (1232)
- False data injection attacks against state estimation in electric power grids (2011) (1092)
- The Design and Analysis of Graphical Passwords (1999) (979)
- Cross-VM side channels and their use to extract private keys (2012) (821)
- Flicker: an execution infrastructure for tcb minimization (2008) (778)
- Byzantine quorum systems (1997) (718)
- On User Choice in Graphical Password Schemes (2004) (600)
- Password hardening based on keystroke dynamics (1999) (596)
- Seeing-is-believing: using camera phones for human-verifiable authentication (2005) (564)
- HotStuff: BFT Consensus with Linearity and Responsiveness (2019) (492)
- Design and Implementation of a Consolidated Middlebox Architecture (2012) (450)
- Fault-scalable Byzantine fault-tolerant services (2005) (431)
- Cryptographic key generation from voice (2001) (373)
- Homeland Security (2004) (354)
- HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis (2011) (353)
- Cross-Tenant Side-Channel Attacks in PaaS Clouds (2014) (352)
- Anonymous Web transactions with Crowds (1999) (317)
- Secure agreement protocols: reliable and atomic group multicast in rampart (1994) (313)
- The design and implementation of a secure auction service (1995) (312)
- Timing Attacks in Low-Latency Mix Systems (Extended Abstract) (2004) (289)
- Fair Exchange with a Semi-Trusted Third Party (extended abstract) (1997) (261)
- The Rampart Toolkit for Building High-Integrity Services (1994) (249)
- Defending against denial-of-service attacks with puzzle auctions (2003) (240)
- BinHunt: Automatically Finding Semantic Differences in Binary Programs (2008) (239)
- Probabilistic quorum systems (1997) (228)
- Traffic Aggregation for Malware Detection (2008) (216)
- Efficient Byzantine-tolerant erasure-coded storage (2004) (215)
- SBFT: A Scalable and Decentralized Trust Infrastructure (2018) (213)
- Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud (2013) (213)
- The security of modern password expiration: an algorithmic framework and empirical analysis (2010) (195)
- Authentication metric analysis and design (1999) (179)
- cSamp: A System for Network-Wide Flow Monitoring (2008) (177)
- Low-Exponent RSA with Related Messages (1996) (177)
- Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu (2017) (168)
- A Secure Group Membership Protocol (1994) (167)
- Sol (2018) (165)
- Expandable grids for visualizing and authoring computer security policies (2008) (164)
- Tag, you can see it!: using tags for access control in photo sharing (2012) (163)
- Secure and scalable replication in Phalanx (1998) (162)
- Detection of denial-of-message attacks on sensor network broadcasts (2005) (161)
- Gray-box extraction of execution graphs for anomaly detection (2004) (157)
- Access Control for Home Data Sharing: Attitudes, Needs and Practices (2010) (156)
- The middlebox manifesto: enabling innovation in middlebox deployment (2011) (155)
- Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces (2007) (148)
- Low-overhead byzantine fault-tolerant storage (2007) (141)
- Networked cryptographic devices resilient to capture (2001) (135)
- HotStuff: BFT Consensus in the Lens of Blockchain (2018) (134)
- Unreliable intrusion detection in distributed computations (1997) (134)
- BEAT: Asynchronous BFT Made Practical (2018) (133)
- Device-Enabled Authorization in the Grey-System (2005) (131)
- Distributed proving in access-control systems (2005) (130)
- A Software Approach to Defeating Side Channels in Last-Level Caches (2016) (128)
- Two-party generation of DSA signatures (2001) (122)
- How to securely replicate services (1994) (122)
- Worm origin identification using random moonwalks (2005) (122)
- Space-Efficient Block Storage Integrity (2005) (116)
- A General Framework for Adversarial Examples with Objectives (2017) (113)
- The Practical Subtleties of Biometric Key Generation (2008) (112)
- GENI Design Principles (2006) (110)
- Selective private function evaluation with applications to private statistics (2001) (110)
- Mitigating bandwidth-exhaustion attacks using congestion puzzles (2004) (108)
- Behavioral Distance Measurement Using Hidden Markov Models (2006) (107)
- Toward acceptable metrics of authentication (1997) (107)
- On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples (2018) (107)
- On Challenges in Evaluating Malware Clustering (2010) (104)
- Behavioral Distance for Intrusion Detection (2005) (104)
- Using voice to generate cryptographic keys (2001) (103)
- On Gray-Box Program Tracking for Anomaly Detection (2004) (101)
- Verifying distributed erasure-coded data (2007) (101)
- Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart (2010) (100)
- On Web Browsing Privacy in Anonymized NetFlows (2007) (98)
- SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains (2018) (97)
- A high-throughput secure reliable multicast protocol (1996) (96)
- Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration (2015) (95)
- Resilient Authentication Using Path Independence (1998) (93)
- Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract) (2004) (89)
- An Architecture for Survivable Coordination in Large Distributed Systems (2000) (89)
- Distributing trust with the Rampart toolkit (1996) (89)
- Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition (2018) (88)
- The load and availability of Byzantine quorum systems (1997) (85)
- Gremlin: Systematic Resilience Testing of Microservices (2016) (84)
- Packet vaccine: black-box exploit detection and signature generation (2006) (83)
- Privacy-preserving genomic computation through program specialization (2009) (83)
- On the Security of Pay-per-Click and Other Web Advertising Schemes (1999) (82)
- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs (2007) (80)
- Detecting and resolving policy misconfigurations in access-control systems (2008) (79)
- Real life challenges in access-control management (2009) (78)
- Safe Passage for Passwords and Other Sensitive Data (2009) (77)
- User-Controllable Security and Privacy for Pervasive Computing (2007) (77)
- Secure execution of Java applets using a remote playground (1998) (77)
- Bump in the Ether: A Framework for Securing Sensitive User Input (2006) (76)
- Path independence for authentication in large-scale systems (1997) (73)
- A security architecture for fault-tolerant systems (1994) (71)
- A Linear Logic of Authorization and Knowledge (2006) (71)
- Simplifying Software-Defined Network Optimization Using SOL (2016) (70)
- Towards practical biometric key generation with randomized biometric templates (2008) (69)
- Fault detection for Byzantine quorum systems (1999) (69)
- How low can you go?: recommendations for hardware-supported minimal TCB code execution (2008) (69)
- Dynamic byzantine quorum systems (2000) (68)
- An Epidemiological Study of Malware Encounters in a Large Enterprise (2014) (66)
- Revisiting the case for a minimalist approach for network flow monitoring (2010) (66)
- A user study of policy creation in a flexible access-control system (2008) (64)
- Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices (2002) (64)
- Lessons learned from the deployment of a smartphone-based access-control system (2007) (64)
- Minimal TCB Code Execution (2007) (63)
- Persistent objects in the Fleet system (2001) (63)
- More than skin deep: measuring effects of the underlying model on access-control system usability (2011) (62)
- The post anachronism: the temporal dimension of facebook privacy (2013) (61)
- Toward a Framework for Internet Forensic Analysis (2004) (61)
- Taming the Devil: Techniques for Evaluating Anonymized Network Data (2008) (60)
- Integrating security in a group oriented distributed system (1992) (60)
- Detecting DDoS Attacks on ISP Networks (2003) (58)
- Privacy preserving interactive record linkage (PPIRL) (2014) (58)
- Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors (2006) (58)
- A Multi-Resolution Approach forWorm Detection and Containment (2006) (56)
- Verifiable Signature Sharing (1995) (55)
- On diffusing updates in a Byzantine environment (1999) (55)
- Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging (2012) (54)
- Detecting and resolving policy misconfigurations in access-control systems (2011) (53)
- Forensic Analysis for Epidemic Attacks in Federated Networks (2006) (53)
- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications (2009) (52)
- Crowdsourced Exploration of Security Configurations (2015) (52)
- Seurat: A Pointillist Approach to Anomaly Detection (2004) (52)
- Efficient update diffusion in byzantine environments (2001) (52)
- The Ω key management service (1996) (50)
- Mitigating access-driven timing channels in clouds using StopWatch (2013) (49)
- Discouraging Software Piracy Using Software Aging (2001) (48)
- Delegation of cryptographic servers for capture-resilient devices (2001) (47)
- Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance (2009) (45)
- An Execution Infrastructure for TCB Minimization (2007) (45)
- The Omega Key Management Service (1996) (44)
- Verifiable network function outsourcing: requirements, challenges, and roadmap (2013) (44)
- Backoff protocols for distributed mutual exclusion and ordering (2001) (43)
- StopWatch: A Cloud Architecture for Timing Channel Mitigation (2014) (43)
- Server-side verification of client behavior in online games (2011) (42)
- Rethinking Security in the Era of Cloud Computing (2017) (42)
- Zzyzx: Scalable fault tolerance through Byzantine locking (2010) (42)
- Mitigating Storage Side Channels Using Statistical Privacy Mechanisms (2015) (42)
- Efficient Proving for Practical Distributed Access-Control Systems (2007) (41)
- Diffusion without false rumors: on propagating updates in a Byzantine environment (2003) (41)
- Detecting Hit Shaving in Click-Through Payment Schemes (1998) (39)
- Network-wide deployment of intrusion detection and prevention systems (2010) (39)
- The Challenges of Effectively Anonymizing Network Data (2009) (38)
- Cryptographic Key Generation from Voice (Extended Abstract) (2001) (38)
- Automatic generation of two-party computations (2003) (37)
- Minimal TCB Code Execution (Extended Abstract) (2007) (37)
- New opportunities for load balancing in network-wide intrusion detection systems (2012) (37)
- On k-set consensus problems in asynchronous systems (1999) (36)
- Integrity Checking in Cryptographic File Systems with Constant Trusted Storage (2007) (36)
- Privacy-preserving global customization (2000) (35)
- Differentially Private Access Patterns for Searchable Symmetric Encryption (2018) (35)
- An empirical analysis of target-resident DoS filters (2004) (35)
- M2: Multicasting Mixes for Efficient and Anonymous Communication (2006) (34)
- BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems (2012) (34)
- Objects shared by Byzantine processes (2000) (33)
- Statistical Privacy for Streaming Traffic (2019) (31)
- Consumable Credentials in Linear-Logic-Based Access-Control Systems (2007) (31)
- Toward strong, usable access control for shared distributed data (2014) (31)
- Lazy verification in fault-tolerant distributed storage systems (2005) (30)
- Secure Causal Atomic Broadcast, Revisited (2017) (29)
- A multi-layer framework for puzzle-based denial-of-service defense (2008) (28)
- On Consistency of Encrypted Files (2006) (27)
- Censorship Resistance Revisited (2005) (25)
- Securing Causal Relationships in Distributed Systems (1995) (25)
- Out of sight, out of mind: Effects of displaying access-control information near the item it controls (2012) (24)
- Third-Party Private DFA Evaluation on Encrypted Files in the Cloud (2012) (24)
- How to end password reuse on the web (2018) (24)
- Time-Scoped Searching of Encrypted Audit Logs (2004) (23)
- Proceedings of the 8th ACM conference on Computer and Communications Security (1998) (23)
- Consumable Credentials in Logic-Based Access-Control Systems (2006) (23)
- Quorum placement in networks to minimize access delays (2005) (22)
- Using Web-Referral Architectures to Mitigate Denial-of-Service Threats (2010) (22)
- Private Keyword-Based Push and Pull with Applications to Anonymous Communication (2004) (22)
- Flow Reconnaissance via Timing Attacks on SDN Switches (2017) (22)
- Probabilistic Byzantine quorum systems (1998) (22)
- Preventing denial and forgery of causal relationships in distributed systems (1993) (21)
- Caesar: high-speed and memory-efficient forwarding engine for future internet architecture (2015) (19)
- Understanding domain registration abuses (2010) (19)
- HotStuff (2019) (19)
- Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols (2019) (19)
- Advanced concurrency control in Java (2002) (19)
- Distributed construction of a fault-tolerant network from a tree (2005) (19)
- Reducing the trusted computing base for applications on commodity systems (2009) (19)
- Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes (2019) (18)
- An authorization model for a public key management service (2001) (18)
- Intent-driven composition of resource-management SDN applications (2018) (18)
- Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection (2019) (17)
- Fragile mixing (2004) (16)
- To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings (2017) (16)
- Building Reliable Mix Networks with Fair Exchange (2005) (16)
- Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks (2007) (16)
- Selected Results from the Latest Decade of Quorum Systems Research (2010) (15)
- Discovering access-control misconfigurations: new approaches and evaluation methodologies (2012) (15)
- Revisiting Botnet Models and Their Implications for Takedown Strategies (2012) (15)
- On-Demand Time Blurring to Support Side-Channel Defense (2017) (15)
- Probabilistic Opaque Quorum Systems (2007) (14)
- On the Limits of Payload-Oblivious Network Attack Detection (2008) (14)
- Nested objects in a Byzantine quorum-replicated system (2004) (14)
- The Safety and Liveness Properties of a Protocol Family for Versatile Survivable Storage Infrastructures (2004) (14)
- Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices (2015) (14)
- Really Truly Trackerless BitTorrent (2006) (14)
- AGIS: Towards automatic generation of infection signatures (2008) (14)
- Which PKI (public key infrastructure) is the right one? (panel session) (2000) (13)
- Quorum placement in networks: minimizing network congestion (2006) (13)
- Consumable Credentials in Logic-Based Access Control (2006) (13)
- Proceedings of the 6th ACM conference on Electronic commerce (2005) (12)
- Survivable consensus objects (1998) (12)
- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles (2009) (12)
- Coordinated sampling sans Origin-Destination identifiers: Algorithms and analysis (2010) (12)
- SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading (2014) (11)
- Static Evaluation of Noninterference Using Approximate Model Counting (2018) (10)
- Protecting Privacy in Key-Value Search Systems (2006) (10)
- Usability Testing a Malware-Resistant Input Mechanism (2011) (10)
- Detecting stuffing of a user's credentials at her own accounts (2019) (10)
- Is Host-Based Anomaly Detection + Temporal Correlation = Worm Causality (2007) (10)
- File system virtual appliances: Portable file system implementations (2012) (9)
- Automatically Adapting a Trained Anomaly Detector to Software Patches (2009) (9)
- A protocol family approach to survivable storage infrastructures (2004) (9)
- A Protocol Family for Versatile Survivable Storage Infrastructures (CMU-PDL-03-103) (2003) (9)
- Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games (2021) (9)
- Effects of access-control policy conflict-resolution methods on policy-authoring usability (2009) (9)
- Comparing Access-Control Technologies: A Study of Keys and Smartphones (2007) (9)
- Bounded vector signatures and their applications (2011) (8)
- Replica Placement for Availability in the Worst Case (2015) (8)
- Efficient Consistency for Erasure-coded Data via Versioning Servers (CMU-CS-03-127) (2003) (8)
- Access control for home data sharing: evaluating social acceptability (2010) (8)
- Decentralized Storage Consistency via Versioning Servers (2002) (8)
- When and How to Change Quorums on Wide Area Networks (2009) (8)
- WRAPS: Denial-of-Service Defense through Web Referrals (2006) (8)
- A secure distributed search system (2002) (7)
- Efficient and Safe Network Updates with Suffix Causal Consistency (2019) (7)
- A System to Verify Network Behavior of Known Cryptographic Clients (2017) (7)
- Byzantine-Tolerant Erasure-Coded Storage (2003) (7)
- Toward practical encrypted email that supports private, regular-expression searches (2015) (7)
- Toward Online Verification of Client Behavior in Distributed Applications (2013) (7)
- Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles (Extended Abstract) (2004) (7)
- Coordinated Sampling: An Efficient, Network-Wide Approach for Flow Monitoring (2007) (6)
- xDomain: cross-border proofs of access (2009) (6)
- Optimal Byzantine Quorum Systems (1997) (6)
- Fast and Black-box Exploit Detection and Signature Generation for Commodity Software (2008) (6)
- Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud (2013) (6)
- Third-Party DFA Evaluation on Encrypted Files (2011) (6)
- Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption (2021) (5)
- n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers (2019) (5)
- Data Structures with Unpredictable Timing (2009) (5)
- Efficient cryptographic techniques for securing storage systems (2007) (5)
- On Propagating Updates in a Byzantine Environment (1999) (5)
- Efficient Byzantine Fault Tolerance for Scalable Storage and Services (2009) (5)
- Asynchronous Verifiable Secret-Sharing Protocols on a Good Day (2018) (4)
- Studying access-control usability in the lab: lessons learned from four studies (2012) (4)
- Using Amnesia to Detect Credential Database Breaches (2021) (4)
- Self-optimizing distributed trees (2008) (4)
- Server-side verification of client behavior in cryptographic protocols (2016) (4)
- Two-party generation of DSA signatures : (Extended abstract) (2001) (4)
- Towards Optimized Probe Scheduling for Active Measurement Studies (2011) (3)
- Secure Decoupled Linkage (SDLink) system for building a social genome (2013) (3)
- Amplifying limited expert input to sanitize large network traces (2011) (3)
- Defense Through Diverse Directions (2020) (3)
- Gray-box anomaly detection using system call monitoring (2007) (3)
- Decentralized Storage Consistency via Versioning Servers (CMU-CS-02-180) (2002) (3)
- Distributing trust with the Rampart toolkit : Group communication (1996) (3)
- Statistical Methods for User and Team Identification in Multiplayer Games (2008) (3)
- Unreliable Intrusion Detection in Distributed Com (1997) (3)
- How to Securely Replicate (1994) (3)
- Accelerating the Development of Software-Defined Network Optimization Applications Using SOL (2015) (3)
- CPU Elasticity to Mitigate Cross-VM Runtime Monitoring (2020) (3)
- A High..Throughput Secure Reliable Multicast Protocol (Extended Abstract) (1996) (3)
- Quiver: Consistent and Scalable Object Sharing for Edge Services (2008) (3)
- Anomaly Detection Amidst Constant Anomalies: Training IDS On Constantly Attacked Data (CMU-CyLab-08-006) (2008) (3)
- Making Contribution-Aware P 2 P Systems Robust to Collusion Attacks Using Bandwidth Puzzles (2008) (3)
- Impact of Background Images on the DAS (Draw- A- Secret) Graphical Password Authentication Scheme (2011) (3)
- Forensic Analysis for Epidemic Attacks in (2006) (3)
- Collaborative Research : ITR / ANIR : 100 Mb / sec For 100 Million Households (3)
- Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption (2021) (3)
- Quiver on the edge: consistent scalable edge services (2006) (3)
- Quiver : Consistent Object Sharing for Edge Services (2007) (2)
- Fault Detection for Byzantine Quorum Systems (Extended Abstract) (1998) (2)
- Macroeconomic fluctuations and the labor market (2007) (2)
- Coordinated Sampling sans Origin-Destination Identifiers : Algorithms , Analysis , and Evaluation (2009) (2)
- Defending against device theft with human notarization (2014) (2)
- Towards bounded wait-free PASIS (2006) (2)
- Correctness of the Read/Conditional-Write and Query/Update Protocols (CMU-PDL-05-107) (2005) (2)
- Write Markers for Probabilistic Quorum Systems (2008) (2)
- Authenticated data compression in delay tolerant wireless sensor networks (2009) (2)
- Efficient Byzantine-tolerant Erasure-coded Storage (CMU-PDL-03-104) (2003) (2)
- Side Channels in Multi-Tenant Environments (2015) (2)
- Trust and Trustworthy Computing (2012) (2)
- Beyond Output Voting: Detecting Compromised Replicas using Behavioral Distance (2006) (2)
- File System Virtual Appliances: Third-Party File System Implementations Without the Pain (2008) (1)
- n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications (2019) (1)
- The design and implementation of a JCA-compliant capture protection infrastructure (2003) (1)
- Self-Adjusting Distributed Trees (2005) (1)
- Research Field: Survivability, Security and Fault Tolerance in Distributed Systems (2011) (1)
- Device-Enabled Authorization in the Grey System (Extended Abstract) (2005) (1)
- Networked Cryptographic Devices Resilient to Capture (Extended Abstract) (2001) (1)
- Efficient Proving for Distributed Access-Control Systems (2006) (1)
- Mitigating Timing Channels in Clouds using StopWatch ∗ (2012) (1)
- xDomain: Cross-border Proofs of Access (CMU-CyLab-09-005) (2009) (1)
- Distance-Aware Private Set Intersection (2021) (1)
- PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion (2018) (1)
- sAVSS: Scalable Asynchronous Verifiable Secret Sharing in BFT Protocols (2018) (1)
- Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems (2012) (1)
- Apollo - Optimistically Linear and Responsive SMR (2021) (1)
- Making Contribution-Aware Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles (2008) (1)
- Distributed System Security via Logical Frameworks (2004) (1)
- Efficient , Compromise Resilient and Append-only Cryptographic Constructions for Digital Forensics (2011) (1)
- Summary-Invisible Networking: Techniques and Defenses (2010) (1)
- Guest Editor's Introduction: High-Confidence Distributed Systems (1999) (1)
- Personalized Pseudonyms for Servers in the Cloud (2017) (1)
- Education Modules for Networking, Cloud Computing, and Security in Systems Courses (2016) (1)
- Privacy-Preserving Global Customization ( Extended Abstract ) (2000) (1)
- Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication (2021) (1)
- Social Security : Combating Device Theft With Community-Based Video (2013) (1)
- Defeating traffic analysis via differential privacy: a case study on streaming traffic (2022) (1)
- Bump in the Ether: Mobile Phones as Proxies for Sensitive Input (2005) (1)
- Practical Integration via Separable Bijective Networks (2022) (1)
- Role-Based Deception in Enterprise Networks (2020) (1)
- Optimally Hiding Object Sizes with Constrained Padding (2021) (1)
- StopWatch : Toward “ Differentially Private ” Timing for Cloud Executi ons (2011) (1)
- Security by, and for, Converged Mobile Devices (2004) (1)
- Automatic Generation of Two-Party Computations (Extended Abstract) (2003) (0)
- Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005 (2005) (0)
- The Design and Implementation of a Java PlaygroundDahlia (1997) (0)
- Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers (2016) (0)
- P RACTICAL I NTEGRATION VIA S EPARABLE B IJECTIVE N ETWORKS (2022) (0)
- How to securely replicate services (preliminary version) (1992) (0)
- Defending Against Device Theft with Human Notarization ( Invited Paper ) (2014) (0)
- TASE: Reducing latency of symbolic execution with transactional memory (2019) (0)
- Increasing Intrusion Tolerance via Scalable Redundancy (2006) (0)
- Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, proceedings (2015) (0)
- Efficient survivability for highly replicated services (2009) (0)
- Zhang Personalized Pseudonyms for Servers in the Cloud (2017) (0)
- Browser Fingerprinting from Coarse Traffic Summaries (2009) (0)
- ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes (2022) (0)
- Keynote: Trustworthy Services and the Biological Analogy (2008) (0)
- CCSW'16: 8th ACM Cloud Computing Security Workshop (2016) (0)
- Byzantine-tolerant Erasure-coded Storage (CMU-CS-03-187) (2003) (0)
- Time-scoped searching of encrypted audit logs: (Extended abstract) (2004) (0)
- ENGRAFT (2022) (0)
- Obje ts Shared by Byzantine Pro esses ? (2007) (0)
- Metering Graphical Data Leakage with Snowman (2020) (0)
- Client Security in Scalable and Survivable Object Systems (2005) (0)
- Institutional Knowledge at Singapore Management University Institutional Knowledge at Singapore Management University On Challenges in Evaluating Malware Clustering On Challenges in Evaluating Malware Clustering (2020) (0)
- Bernoulli honeywords (2022) (0)
- GENI Facility Security GDD-06-23 GENI : Global Environment for Network Innovations (1973) (0)
- WACCO and LOKO: Strong Consistency at Global Scale (2015) (0)
- Graphical Passwords Graphical Password Is a Secret That a Human User Inputs to a Computer with the Aid Of (2005) (0)
- Institutional Knowledge at Singapore Management University On Challenges in Evaluating Malware Clustering (2019) (0)
- The Netivus Manifesto (2021) (0)
- Robust Distributed Services in Embedded Networks (2007) (0)
- The Effect of Repeated Login Prompts on Phishing Susceptibility (2016) (0)
- Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription (2023) (0)
- Prometheus: Enhancing the Quality of Service of the Joint Battlespace Infosphere (2006) (0)
- A Case for a RISC Architecture for Network Flow Monitoring (2009) (0)
- Fault-Tolerant Key Distribution (Preliminary Version) (1993) (0)
- Defeating traffic analysis via differential privacy: a case study on streaming traffic (2022) (0)
- Toward practical encrypted email that supports private, regular-expression searches (2014) (0)
- Session details: Privacy-preserving techniques and usage control (2013) (0)
- Scalable Redundancy for Infrastructure Services (2004) (0)
- Proceedings of the 2016 ACM on Cloud Computing Security Workshop (2016) (0)
- Better Architectures and New Security Applications for Network Monitoring (2009) (0)
- Distributed System Security via Logical Frameworks (SeLF) (2008) (0)
- Tackling Credential Abuse Together (2023) (0)
- EuroCASE CD—A knowledge-based debugger for hardware/software configurations (1993) (0)
- Proceedings of the 5th international conference on Trust and Trustworthy Computing (2012) (0)
- Cryptology and Network Security (2015) (0)
- Accountability for Information Flow via Explicit Formal Proof (2009) (0)
- Trustworthy Services and the Biological Analogy (2007) (0)
- AFRL-IFRS-TR-2004-138 Final Technical Report May 2004 SCALABLE REDUNDANCY FOR INFRASTRUCTURE SERVICES (2004) (0)
- A Self-Service Approach to Scalable Service Deployment (2006) (0)
- High-Confidence Distributed Systems - Guest Editor's Introduction (1999) (0)
- Session details: Attacks 1 (2008) (0)
- Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks (2021) (0)
- The Design and Implementation of a Java PlaygroundbyDahlia (1997) (0)
- Interpretable noninterference measurement and its application to processor designs (2021) (0)
This paper list is powered by the following services:
Other Resources About Michael Reiter
What Schools Are Affiliated With Michael Reiter ?
Michael Reiter is affiliated with the following schools: