Michael Reiter
Michael Reiter
Lawrence M. Slifkin Distinguished Professor, University of North Carolina at Chapel Hill
Geverifieerd e-mailadres voor cs.unc.edu - Homepage
TitelGeciteerd doorJaar
Crowds: Anonymity for web transactions
MK Reiter, AD Rubin
ACM Transactions on Information and System Security (TISSEC) 1 (1), 66-92, 1998
24631998
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 13, 2011
17082011
The design and analysis of graphical passwords
I Jermyn, AJ Mayer, F Monrose, MK Reiter, AD Rubin
Usenix Security, 1999
9251999
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
ACM SIGOPS Operating Systems Review 42 (4), 315-328, 2008
7742008
Byzantine quorum systems
D Malkhi, M Reiter
Distributed Computing 11 (4), 203-213, 1998
7251998
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
6572012
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International Journal of Information Security 1 (2), 69-83, 2002
6322002
Seeing-Is-Believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
International Journal of Security and Networks 4 (1), 43-56, 2009
600*2009
On user choice in graphical password schemes
D Davis, F Monrose, MK Reiter
Proceedings of the 13th USENIX Security Symposium, 2004
5802004
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 202-213, 2001
4752001
The design and implementation of a secure auction service
MK Franklin, MK Reiter
IEEE Transactions on Software Engineering 22 (5), 302-312, 1996
4641996
Design and implementation of a consolidated middlebox architecture
V Sekar, N Egi, S Ratnasamy, M Reiter, G Shi
4562011
Anonymous web transactions with Crowds
MK Reiter, AD Rubin
Communications of the ACM 42 (2), 32-48, 1999
4051999
Fair exchange with a semi-trusted third party
MK Franklin, MK Reiter
ACM Conference on Computer and Communications Security, 1-5, 1997
3711997
Fault-scalable Byzantine fault-tolerant services
M Abd-El-Malek, GR Ganger, GR Goodson, MK Reiter, JJ Wylie
ACM SIGOPS Operating Systems Review 39 (5), 59-74, 2005
3572005
Timing attacks in low-latency mix systems
B Levine, M Reiter, C Wang, M Wright
Financial Cryptography, 251-265, 2004
3552004
Secure auction systems
MK Franklin, MK Reiter
US Patent 6,055,518, 2000
3532000
Secure agreement protocols: Reliable and atomic group multicast in Rampart
MK Reiter
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
3381994
Authentication metric analysis and design
MK Reiter, SG Stubblebine
ACM Transactions on Information and System Security (TISSEC) 2 (2), 138-158, 1999
328*1999
HomeAlone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
Security and Privacy (SP), 2011 IEEE Symposium on, 313-328, 2011
3172011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20