Susanne Wetzel - Publications
Affiliations: | Computer Science | Stevens Institute of Technology |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2017 | Wüller S, Mayer DA, Förg F, Schüppen S, Assadsolimani B, Meyer U, Wetzel S. Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques Journal of Computer Security. 25: 59-81. DOI: 10.3233/Jcs-16830 | 0.506 | |||
2012 | Mayer DA, Wetzel S. Verifiable private equality test: Enabling unbiased 2-party reconciliation on ordered sets in the malicious model Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 46-47. DOI: 10.1145/2414456.2414482 | 0.532 | |||
2012 | Mayer DA, Steele O, Wetzel S, Meyer U. CaPTIF: Comprehensive performance testing framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7641: 55-70. DOI: 10.1007/978-3-642-34691-0_6 | 0.519 | |||
2008 | Cordasco J, Wetzel S. Cryptographic Versus Trust-based Methods for MANET Routing Security Electronic Notes in Theoretical Computer Science. 197: 131-140. DOI: 10.1016/J.Entcs.2007.12.022 | 0.368 | |||
2006 | Tsow A, Jakobsson M, Yang L, Wetzel S. Warkitting: The Drive-by Subversion of Wireless Home Routers Journal of Digital Forensic Practice. 1: 179-192. DOI: 10.1080/15567280600995832 | 0.323 | |||
1998 | Biehl I, Meyer B, Wetzel S. Ensuring the integrity of agent - Based computations by short proofs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1477: 183-194. DOI: 10.1007/Bfb0057658 | 0.316 | |||
Show low-probability matches. |