Follow
Markus Dürmuth
Markus Dürmuth
Professor for IT Security, Leibniz University Hannover
Verified email at itsec.uni-hannover.de
Title
Cited by
Cited by
Year
Acoustic {Side-Channel} Attacks on Printers
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
19th USENIX Security Symposium (USENIX Security 10), 2010
2452010
Quantifying the security of graphical passwords: The case of android unlock patterns
S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2422013
Adaptive password-strength meters from markov models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
2192012
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1602008
Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}})
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
1582018
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009
1362009
Tempest in a teapot: Compromising reflections revisited
M Backes, T Chen, M Dürmuth, HPA Lensch, M Welk
2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009
1312009
Who Are You? A Statistical Approach to Measuring User Authenticity.
D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto
NDSS 16, 21-24, 2016
1092016
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
International symposium on engineering secure software and systems, 119-132, 2015
972015
An algebra for composing enterprise privacy policies
M Backes, M Dürmuth, R Steinwandt
European Symposium on Research in Computer Security, 33-52, 2004
752004
On the accuracy of password strength meters
M Golla, M Dürmuth
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
652018
A cryptographically sound Dolev-Yao style security proof of an electronic payment system
M Backes, M Durmuth
18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005
632005
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security, 508-523, 2010
622010
Deniable encryption with negligible detection probability: An interactive construction
M Dürmuth, DM Freeman
Annual International Conference on the Theory and Applications of …, 2011
612011
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
542013
OAEP is secure under key-dependent messages
M Backes, M Dürmuth, D Unruh
International Conference on the Theory and Application of Cryptology and …, 2008
532008
Evaluation of standardized password-based key derivation against parallel processing platforms
M Dürmuth, T Güneysu, M Kasper, C Paar, T Yalcin, R Zimmermann
European Symposium on Research in Computer Security, 716-733, 2012
442012
On the security of cracking-resistant password vaults
M Golla, B Beuscher, M Dürmuth
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
422016
" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications
M Golla, M Wei, J Hainline, L Filipe, M Dürmuth, E Redmiles, B Ur
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
402018
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
European Symposium on Research in Computer Security, 424-443, 2006
402006
The system can't perform the operation now. Try again later.
Articles 1–20