Susanne Wetzel
#138,515
Most Influential Person Now
German computer scientist and professor
Susanne Wetzel's AcademicInfluence.com Rankings
Susanne Wetzelcomputer-science Degrees
Computer Science
#8806
World Rank
#9258
Historical Rank
Database
#9295
World Rank
#9785
Historical Rank
Download Badge
Computer Science
Susanne Wetzel's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Susanne Wetzel Influential?
(Suggest an Edit or Addition)According to Wikipedia, Gudrun Susanne Wetzel is a German computer scientist known for her work in computer security, including the use of information channels such as voice or keystroke dynamics to strengthen password-based security, and the security of wireless communications standards including Bluetooth and GSM. She is a professor of computer science at the Stevens Institute of Technology.
Susanne Wetzel's Published Works
Published Works
- Password hardening based on keystroke dynamics (1999) (596)
- Cryptographic key generation from voice (2001) (373)
- Security Weaknesses in Bluetooth (2001) (324)
- A man-in-the-middle attack on UMTS (2004) (249)
- Balancing auditability and privacy in vehicular networks (2005) (134)
- Using voice to generate cryptographic keys (2001) (103)
- Cryptographic Versus Trust-based Methods for MANET Routing Security (2008) (93)
- Discount Anonymous On Demand Routing for Mobile Ad hoc Networks (2006) (78)
- On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks (2004) (67)
- Stealth attacks on ad-hoc wireless networks (2003) (67)
- LiDIA—a library for computational number theory (1997) (62)
- Secure Server-Aided Signature Generation (2001) (60)
- Ensuring the Integrity of Agent-Based Computations by Short Proofs (1998) (52)
- Love and authentication (2008) (51)
- Warkitting: The Drive-by Subversion of Wireless Home Routers (2006) (42)
- Cryptographic Key Generation from Voice (Extended Abstract) (2001) (38)
- Heuristics on lattice basis reduction in practice (2002) (34)
- Information assurance education in two- and four-year institutions (2011) (33)
- Efficient attribute authentication with applications to ad hoc networks (2004) (28)
- Quantifying the security of preference-based authentication (2008) (28)
- Towards information assurance (IA) curricular guidelines (2010) (26)
- CodeBLUE: a Bluetooth interactive dance club system (2003) (19)
- Traceable visual cryptography (1997) (19)
- Analysis of Authentication and Key Establishment in Inter-generational Mobile Telephony (2013) (18)
- Distributed Privacy-Preserving Policy Reconciliation (2007) (18)
- An attacker model for MANET routing security (2009) (17)
- Stealth attacks in vehicular technologies (2004) (16)
- An approach to enhance inter-provider roaming through secret sharing and its application to WLANs (2005) (15)
- SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets (2013) (14)
- Implementation and Performance Evaluation of EAP-TLS-KS (2006) (13)
- New Advances on Privacy-Preserving Policy Reconciliation (2010) (12)
- Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets (2010) (12)
- Towards Privacy-Preserving Multi-party Bartering (2017) (12)
- INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research (2017) (11)
- Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract] (2011) (11)
- An Efficient Parallel Block-Reduction Algorithm (1998) (10)
- Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities (2017) (10)
- Parallel Lattice Basis Reduction Using a Multi-threaded Schnorr-Euchner LLL Algorithm (2009) (10)
- Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model (2012) (9)
- Enabling fair and privacy-preserving applications using reconciliation protocols on ordered sets (2011) (9)
- New Results on Lattice Basis Reduction in Practice (2000) (9)
- Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets (2011) (9)
- Privacy-preserving conditional random selection (2015) (8)
- A secure two-party bartering protocol using privacy-preserving interval operations (2014) (7)
- Design and implementation of privacy-preserving reconciliation protocols (2013) (7)
- An Efficient LLL Gram Using Buffered Transformations (2007) (7)
- Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems (2011) (7)
- Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols (2007) (7)
- Improving the Parallel Schnorr-Euchner LLL Algorithm (2011) (6)
- Privacy-preserving two-party bartering secure against active adversaries (2016) (6)
- The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research (2017) (6)
- Analyzing Massively Collaborative Mathematics Projects (2011) (5)
- Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange (2022) (5)
- A Privacy-Preserving Protocol for the Kidney Exchange Problem (2020) (5)
- Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques (2017) (5)
- Conceptualizing the silent risk of inadvertent information leakages (2017) (5)
- A Parallel LLL using POSIX Threads (2008) (5)
- Secret locking: Exploring new approaches to biometric key encapsulation (2005) (4)
- CaPTIF: Comprehensive Performance TestIng Framework (2012) (4)
- Parallel Lattice Basis Reduction - The Road to Many-Core (2011) (4)
- Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (2013) (4)
- Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries (2017) (4)
- The Effect of Sorting on Lattice Basis Reduction (2007) (3)
- The Impact of COVID-19 on the Security and Resilience of the Maritime Transportation System (2021) (3)
- On the Performance of Provably Secure Hashing with Elliptic Curves (2007) (3)
- Advancing the State of Maritime Cybersecurity Guidelines to Improve the Resilience of the Maritime Transportation System (2021) (3)
- Biometrics and cryptography (2005) (3)
- Investigating the impact of media coverage on data breach fatigue (2017) (3)
- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures (2010) (2)
- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption (2013) (2)
- Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering (2017) (2)
- An untraceable coin-based incentive scheme for multi-hop networks (2005) (2)
- Visual Cryptography - How to Use Images to Share a Secret (1998) (2)
- Lattice Basis Reduction with Dynamic Approximation (2000) (2)
- Privacy-Preserving Trade Chain Detection (2018) (1)
- Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming (2022) (1)
- Stealth Attacks on Vehicular Wireless Networks ( Invited Paper ) (1)
- Design concepts for matrices and lattices in LiDIA (1997) (1)
- Introducing Research into the Undergraduate Curriculum in Cybersecurity (2019) (1)
- Privacy - Preserving Multi-Party Conditional Random Selection (2019) (1)
- Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice (2021) (1)
- Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010 (2010) (0)
- Privacy-Preserving Reconciliation Protocols: From Theory to Practice (2013) (0)
- AnUntraceable Coin-basedIncentive Scheme forMulti-Hop Networks (2005) (0)
- The Unconstitutionality of the Criminal Provisions Under the Sherman Act Sections 1, 2, and 3 (1994) (0)
- Session details: Session 7: Encryption and Privacy (2022) (0)
- Privacy-Preserving Subgraph Checking (2018) (0)
- Discount Anonymous OnDemandRouting for Mobile AdhocNetworks (2006) (0)
- Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem (2023) (0)
- Session details: Secure services (2004) (0)
- Method and device for ensuring the safety of user devices by Bluetooth (2001) (0)
- Introducing history-enriched security context transfer to enhance the security of subsequent handover (2006) (0)
- Information Security Education. Education in Proactive Information Security (2019) (0)
- Traceable Visual Cryptography Traceable Visual Cryptography (1997) (0)
- High Assurance for Interactive Applications in Ad Hoc Networks (0)
- Pathways in Cybersecurity: Translating Theory into Practice (2017) (0)
- BoostReduce - A Framework For Strong Lattice Basis Reduction (2010) (0)
This paper list is powered by the following services:
Other Resources About Susanne Wetzel
What Schools Are Affiliated With Susanne Wetzel?
Susanne Wetzel is affiliated with the following schools: