Susanne Wetzel
Susanne Wetzel
Professor of Computer Science, Stevens Institute of Technology
Verified email at
Cited by
Cited by
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International Journal of Information Security 1 (2), 69-83, 2002
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
Security weaknesses in Bluetooth
M Jakobsson, S Wetzel
Cryptographers’ Track at the RSA Conference, 176-191, 2001
A man-in-the-middle attack on UMTS
U Meyer, S Wetzel
Proceedings of the 3rd ACM workshop on Wireless security, 90-97, 2004
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks
U Meyer, S Wetzel
2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio …, 2004
Balancing auditability and privacy in vehicular networks
JY Choi, M Jakobsson, S Wetzel
Proceedings of the 1st ACM international workshop on Quality of service …, 2005
Using voice to generate cryptographic keys
F Monrose, MK Reiter, Q Li, S Wetzel
2001: A Speaker Odyssey-The Speaker Recognition Workshop, 2001
Cryptographic versus trust-based methods for MANET routing security
J Cordasco, S Wetzel
Electronic Notes in Theoretical Computer Science 197 (2), 131-140, 2008
Discount anonymous on demand routing for mobile ad hoc networks
L Yang, M Jakobsson, S Wetzel
2006 Securecomm and Workshops, 1-10, 2006
Stealth attacks on ad-hoc wireless networks
M Jakobsson, S Wetzel, B Yener
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No …, 2003
Love and authentication
M Jakobsson, E Stolterman, S Wetzel, L Yang
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
Secure server-aided signature generation
M Jakobsson, S Wetzel
Public Key Cryptography, 383-401, 2001
Ensuring the integrity of agent-based computations by short proofs
I Biehl, B Meyer, S Wetzel
Mobile Agents, 183-194, 1998
Warkitting: the drive-by subversion of wireless home routers
A Tsow, M Jakobsson, L Yang, S Wetzel
Journal of Digital Forensic Practice 1 (3), 179-192, 2006
Quantifying the security of preference-based authentication
M Jakobsson, L Yang, S Wetzel
Proceedings of the 4th ACM workshop on Digital identity management, 61-70, 2008
Method and apparatus for ensuring security of users of bluetooth TM-enabled devices
BM Jakobsson, SG Wetzel
US Patent 6,574,455, 2003
Generation of repeatable cryptographic key based on varying parameters
PL Bohannon, BM Jakobsson, F Monrose, MK Reiter, SG Wetzel
US Patent 6,901,145, 2005
Towards information assurance (IA) curricular guidelines
S Cooper, C Nickell, LC Pérez, B Oldfield, J Brynielsson, AG Gökce, ...
Proceedings of the 2010 ITiCSE working group reports, 49-64, 2010
Traceable visual cryptography
I Biehl, S Wetzel
Information and Communications Security: First International Conference …, 1997
Efficient attribute authentication with applications to ad hoc networks
M Jakobsson, S Wetzel
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20