Susanne Wetzel - Publications

Affiliations: 
Computer Science Stevens Institute of Technology 
Area:
Computer Science

6 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Wüller S, Mayer DA, Förg F, Schüppen S, Assadsolimani B, Meyer U, Wetzel S. Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques Journal of Computer Security. 25: 59-81. DOI: 10.3233/Jcs-16830  0.506
2012 Mayer DA, Wetzel S. Verifiable private equality test: Enabling unbiased 2-party reconciliation on ordered sets in the malicious model Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 46-47. DOI: 10.1145/2414456.2414482  0.532
2012 Mayer DA, Steele O, Wetzel S, Meyer U. CaPTIF: Comprehensive performance testing framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7641: 55-70. DOI: 10.1007/978-3-642-34691-0_6  0.519
2008 Cordasco J, Wetzel S. Cryptographic Versus Trust-based Methods for MANET Routing Security Electronic Notes in Theoretical Computer Science. 197: 131-140. DOI: 10.1016/J.Entcs.2007.12.022  0.368
2006 Tsow A, Jakobsson M, Yang L, Wetzel S. Warkitting: The Drive-by Subversion of Wireless Home Routers Journal of Digital Forensic Practice. 1: 179-192. DOI: 10.1080/15567280600995832  0.323
1998 Biehl I, Meyer B, Wetzel S. Ensuring the integrity of agent - Based computations by short proofs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1477: 183-194. DOI: 10.1007/Bfb0057658  0.316
Show low-probability matches.