Susanne Wetzel
Susanne Wetzel
Associate Professor of Computer Science, Stevens Institute of Technology
Verified email at
TitleCited byYear
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International Journal of Information Security 1 (2), 69-83, 2002
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on …, 2001
Security weaknesses in Bluetooth
M Jakobsson, S Wetzel
Cryptographers’ Track at the RSA Conference, 176-191, 2001
A man-in-the-middle attack on UMTS
U Meyer, S Wetzel
Proceedings of the 3rd ACM workshop on Wireless security, 90-97, 2004
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks
U Meyer, S Wetzel
Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th …, 2004
Using voice to generate cryptographic keys
F Monrose, MK Reiter, Q Li, S Wetzel
2001: A Speaker Odyssey-The Speaker Recognition Workshop, 2001
Balancing auditability and privacy in vehicular networks
JY Choi, M Jakobsson, S Wetzel
Proceedings of the 1st ACM international workshop on Quality of service …, 2005
Cryptographic versus trust-based methods for MANET routing security
J Cordasco, S Wetzel
Electronic Notes in Theoretical Computer Science 197 (2), 131-140, 2008
Discount anonymous on demand routing for mobile ad hoc networks
L Yang, M Jakobsson, S Wetzel
Securecomm and Workshops, 2006, 1-10, 2006
Stealth attacks on ad-hoc wireless networks
M Jakobsson, S Wetzel, B Yener
Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th 3, 2103 …, 2003
Love and authentication
M Jakobsson, E Stolterman, S Wetzel, L Yang
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
Warkitting: the drive-by subversion of wireless home routers
A Tsow, M Jakobsson, L Yang, S Wetzel
Journal of Digital Forensic Practice 1 (3), 179-192, 2006
Secure server-aided signature generation
M Jakobsson, S Wetzel
Public Key Cryptography, 383-401, 2001
Ensuring the integrity of agent-based computations by short proofs
I Biehl, B Meyer, S Wetzel
Mobile Agents, 183-194, 1998
Generation of repeatable cryptographic key based on varying parameters
PL Bohannon, BM Jakobsson, F Monrose, MK Reiter, SG Wetzel
US Patent 6,901,145, 2005
Method and apparatus for ensuring security of users of bluetooth TM-enabled devices
BM Jakobsson, SG Wetzel
US Patent 6,574,455, 2003
Quantifying the security of preference-based authentication
M Jakobsson, L Yang, S Wetzel
Proceedings of the 4th ACM workshop on Digital identity management, 61-70, 2008
Towards information assurance (IA) curricular guidelines
S Cooper, C Nickell, LC Pérez, B Oldfield, J Brynielsson, AG Gökce, ...
Proceedings of the 2010 ITiCSE working group reports, 49-64, 2010
Traceable visual cryptography
I Biehl, S Wetzel
Information and Communications Security, 61-71, 1997
Distributed privacy-preserving policy reconciliation
U Meyer, S Wetzel, S Ioannidis
2007 IEEE International Conference on Communications, 1342-1349, 2007
The system can't perform the operation now. Try again later.
Articles 1–20