Susanne Wetzel
Orcid: 0009-0001-2769-3076Affiliations:
- Stevens Institute of Technology, Hoboken, NJ, USA
According to our database1,
Susanne Wetzel
authored at least 84 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
On csauthors.net:
Bibliography
2024
J. Comput. Secur., 2024
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
A Study on Exploring the Challenges of the CyberCorps<sup>®</sup>: Scholarship for Service Program to Support PhD Level Scholarships.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Advancing the State of Maritime Cybersecurity Guidelines to Improve the Resilience of the Maritime Transportation System.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
The Impact of COVID-19 on the Security and Resilience of the Maritime Transportation System.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019
2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
2017
Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques.
J. Comput. Secur., 2017
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Comput. Electr. Eng., 2017
Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 38th IEEE Sarnoff Symposium 2017, Newark, NJ, USA, 2017
Proceedings of the Information Security Education for a Global Digital Society, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
2013
Analysis of authentication and key establishment in inter-generational mobile telephony.
IACR Cryptol. ePrint Arch., 2013
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version).
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013
Proceedings of the Number Theory and Cryptography, 2013
2012
Proceedings of the Testing Software and Systems, 2012
Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version).
IACR Cryptol. ePrint Arch., 2011
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract].
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 16th annual conference reports on Innovation and technology in computer science education, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the 2010 ITiCSE working group reports, 2010
Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets.
Proceedings of the Information Security - 13th International Conference, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Parallel Lattice Basis Reduction Using a Multi-threaded Schnorr-Euchner LLL Algorithm.
Proceedings of the Euro-Par 2009 Parallel Processing, 2009
2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Computer Algebra in Scientific Computing, 10th International Workshop, 2007
2006
J. Digit. Forensic Pract., 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005
Proceedings of the Q2SWinet'05, 2005
Biometrics and cryptography.
Proceedings of the ICETE 2005, 2005
Secret locking: Exploring new approaches to biometric key encapsulation.
Proceedings of the ICETE 2005, 2005
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004
2003
Proceedings of the Global Telecommunications Conference, 2003
2002
2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the 2001: A Speaker Odyssey, 2001
2000
Proceedings of the Algorithm Engineering, 2000
Proceedings of the Algorithmic Number Theory, 4th International Symposium, 2000
1998
Proceedings of the Mobile Agents, Second International Workshop, 1998
Proceedings of the Informatik '98, 1998
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
1997
Proceedings of the 1997 ACM symposium on Applied Computing, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997