Susanne Wetzel

Affiliations:
  • Stevens Institute of Technology, Hoboken, NJ, USA


According to our database1, Susanne Wetzel authored at least 81 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem.
CoRR, 2023

Cyber Insurance in the Maritime Transportation System.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

2022
Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Advancing the State of Maritime Cybersecurity Guidelines to Improve the Resilience of the Maritime Transportation System.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

The Impact of COVID-19 on the Security and Resilience of the Maritime Transportation System.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
A Privacy-Preserving Protocol for the Kidney Exchange Problem.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

2019
Privacy - Preserving Multi-Party Conditional Random Selection.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Introducing Research into the Undergraduate Curriculum in Cybersecurity.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

2018
Privacy-Preserving Subgraph Checking.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Privacy-Preserving Trade Chain Detection.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques.
J. Comput. Secur., 2017

INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017

Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries.
IACR Cryptol. ePrint Arch., 2017

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research.
CoRR, 2017

Conceptualizing the silent risk of inadvertent information leakages.
Comput. Electr. Eng., 2017

Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Investigating the impact of media coverage on data breach fatigue.
Proceedings of the 38th IEEE Sarnoff Symposium 2017, Newark, NJ, USA, 2017

Pathways in Cybersecurity: Translating Theory into Practice.
Proceedings of the Information Security Education for a Global Digital Society, 2017

Towards Privacy-Preserving Multi-party Bartering.
Proceedings of the Financial Cryptography and Data Security, 2017

Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Privacy-preserving two-party bartering secure against active adversaries.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Privacy-preserving conditional random selection.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

2014
A secure two-party bartering protocol using privacy-preserving interval operations.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
Analysis of authentication and key establishment in inter-generational mobile telephony.
IACR Cryptol. ePrint Arch., 2013

Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version).
IACR Cryptol. ePrint Arch., 2013

Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.
Proceedings of the Network and System Security - 7th International Conference, 2013

SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Design and implementation of privacy-preserving reconciliation protocols.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Privacy-Preserving Reconciliation Protocols: From Theory to Practice.
Proceedings of the Number Theory and Cryptography, 2013

2012
CaPTIF: Comprehensive Performance TestIng Framework.
Proceedings of the Testing Software and Systems, 2012

Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version).
IACR Cryptol. ePrint Arch., 2011

Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract].
Proceedings of the Security and Privacy in Communication Networks, 2011

Information assurance education in two- and four-year institutions.
Proceedings of the 16th annual conference reports on Innovation and technology in computer science education, 2011

Improving the Parallel Schnorr-Euchner LLL Algorithm.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Parallel Lattice Basis Reduction - The Road to Many-Core.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
New Advances on Privacy-Preserving Policy Reconciliation.
IACR Cryptol. ePrint Arch., 2010

BoostReduce - A Framework For Strong Lattice Basis Reduction.
IACR Cryptol. ePrint Arch., 2010

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Towards information assurance (IA) curricular guidelines.
Proceedings of the 2010 ITiCSE working group reports, 2010

Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets.
Proceedings of the Information Security - 13th International Conference, 2010

2009
An attacker model for MANET routing security.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Parallel Lattice Basis Reduction Using a Multi-threaded Schnorr-Euchner LLL Algorithm.
Proceedings of the Euro-Par 2009 Parallel Processing, 2009

2008
Quantifying the security of preference-based authentication.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Love and authentication.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Cryptographic Versus Trust-based Methods for MANET Routing Security.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Distributed Privacy-Preserving Policy Reconciliation.
Proceedings of IEEE International Conference on Communications, 2007

An Efficient LLL Gram Using Buffered Transformations.
Proceedings of the Computer Algebra in Scientific Computing, 10th International Workshop, 2007

2006
Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digit. Forensic Pract., 2006

Discount Anonymous On Demand Routing for Mobile Ad hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Implementation and Performance Evaluation of EAP-TLS-KS.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005

Balancing auditability and privacy in vehicular networks.
Proceedings of the Q2SWinet'05, 2005

Biometrics and cryptography.
Proceedings of the ICETE 2005, 2005

Secret locking: Exploring new approaches to biometric key encapsulation.
Proceedings of the ICETE 2005, 2005

2004
A man-in-the-middle attack on UMTS.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Stealth attacks in vehicular technologies.
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004

On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Efficient attribute authentication with applications to ad hoc networks.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004

2003
CodeBLUE: a Bluetooth interactive dance club system.
Proceedings of the Global Telecommunications Conference, 2003

2002
Heuristics on Lattice Basis Reduction in Practice.
ACM J. Exp. Algorithmics, 2002

Password hardening based on keystroke dynamics.
Int. J. Inf. Sec., 2002

2001
Cryptographic Key Generation from Voice.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Secure Server-Aided Signature Generation.
Proceedings of the Public Key Cryptography, 2001

Using voice to generate cryptographic keys.
Proceedings of the 2001: A Speaker Odyssey, 2001

Security Weaknesses in Bluetooth.
Proceedings of the Topics in Cryptology, 2001

2000
Lattice Basis Reduction with Dynamic Approximation.
Proceedings of the Algorithm Engineering, 2000

New Results on Lattice Basis Reduction in Practice.
Proceedings of the Algorithmic Number Theory, 4th International Symposium, 2000

1998
Ensuring the Integrity of Agent-Based Computations by Short Proofs.
Proceedings of the Mobile Agents, Second International Workshop, 1998

Visual Cryptography - How to Use Images to Share a Secret.
Proceedings of the Informatik '98, 1998

An Efficient Parallel Block-Reduction Algorithm.
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998

1997
LiDIA - a library for computational number theory.
SIGSAM Bull., 1997

Design concepts for matrices and lattices in LiDIA.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

Traceable visual cryptography.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...