Zinaida Benenson
Zinaida Benenson
Human Factors in Security and Privacy Group, University of Erlangen-Nuremberg
Verified email at fau.de - Homepage
Title
Cited by
Cited by
Year
Tampering with motes: Real-world physical attacks on wireless sensor networks
A Becher, Z Benenson, M Dornseif
International Conference on Security in Pervasive Computing, 104-118, 2006
3192006
Realizing robust user authentication in sensor networks
Z Benenson, N Gedicke, O Raivio
Real-World Wireless Sensor Networks (REALWSN) 14, 52, 2005
1892005
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
European Conference on Wireless Sensor Networks, 263-278, 2009
1362009
User authentication in sensor networks
Z Benenson, F Gärtner, D Kesdogan
Informatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung …, 2004
812004
TrustedPals: Secure multiparty computation implemented with smart cards
M Fort, F Freiling, LD Penso, Z Benenson, D Kesdogan
European Symposium on Research in Computer Security, 34-48, 2006
532006
Vulnerabilities and attacks in wireless sensor networks
Z Benenson, PM Cholewinski, FC Freiling
Wireless Sensors Networks Security, 22-43, 2008
502008
Android and iOS users' differences concerning security and privacy
Z Benenson, F Gassmann, L Reinfelder
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 817-822, 2013
482013
Specifying IT security awareness
N Hänsch, Z Benenson
2014 25th International Workshop on Database and Expert Systems Applications …, 2014
392014
Authenticated query flooding in sensor networks
Z Benenson, FC Freiling, E Hammerschmidt, S Lucks, L Pimenidis
IFIP International Information Security Conference, 38-49, 2006
382006
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning
P Morgner, S Mattejat, Z Benenson, C Müller, F Armknecht
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
362017
Unpacking spear phishing susceptibility
Z Benenson, F Gassmann, R Landwirth
International Conference on Financial Cryptography and Data Security, 610-627, 2017
332017
All your bulbs are belong to us: Investigating the current state of security in connected lighting systems
P Morgner, S Mattejat, Z Benenson
arXiv preprint arXiv:1608.03732, 2016
322016
Topology-based clusterhead candidate selection in wireless ad-hoc and sensor networks
MR Brust, A Andronache, S Rothkugel, Z Benenson
2007 2nd International Conference on Communication Systems Software and …, 2007
292007
An algorithmic framework for robust access control in wireless sensor networks
Z Benenson, FC Gartner, D Kesdogan
Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005
292005
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
Z Benenson, A Girard, I Krontiris
WEIS, 2015
282015
Differences between Android and iPhone users in their security and privacy awareness
L Reinfelder, Z Benenson, F Gassmann
International Conference on Trust, Privacy and Security in Digital Business …, 2014
222014
User acceptance of privacy-ABCs: an exploratory study
Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou
International Conference on Human Aspects of Information Security, Privacy …, 2014
202014
Attitudes to IT security when using a smartphone
Z Benenson, O Kroll-Peters, M Krupp
2012 Federated Conference on Computer Science and Information Systems …, 2012
192012
Safety, liveness, and information flow: Dependability revisited
Z Beneson, FC Freiling, T Holz, D Kesdogan, L Draque Penso
ARCS'06, 19th International Conference on Architecture of Computing Systems, 2006
162006
Susceptibility to URL-based Internet attacks: Facebook vs. email
Z Benenson, A Girard, N Hintz, A Luder
2014 IEEE International Conference on Pervasive Computing and Communication …, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20