Quantifying the security of graphical passwords: The case of android unlock patterns S Uellenbeck, M Dürmuth, C Wolf, T Holz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 221 | 2013 |
Acoustic Side-Channel Attacks on Printers. M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder USENIX Security symposium 10, 307-322, 2010 | 210 | 2010 |
Adaptive password-strength meters from markov models. C Castelluccia, M Dürmuth, D Perito NDSS, 2012 | 187 | 2012 |
Compromising reflections-or-how to read LCD monitors around the corner M Backes, M Dürmuth, D Unruh 2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008 | 137 | 2008 |
A provably secure and efficient countermeasure against timing attacks B Köpf, M Dürmuth 2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009 | 125 | 2009 |
Tempest in a teapot: Compromising reflections revisited M Backes, T Chen, M Dürmuth, HPA Lensch, M Welk 2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009 | 108 | 2009 |
Rethinking access control and authentication for the home internet of things (iot) W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur 27th {USENIX} Security Symposium ({USENIX} Security 18), 255-272, 2018 | 95 | 2018 |
Who Are You? A Statistical Approach to Measuring User Authenticity. D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto NDSS 16, 21-24, 2016 | 85 | 2016 |
An algebra for composing enterprise privacy policies M Backes, M Dürmuth, R Steinwandt European Symposium on Research in Computer Security, 33-52, 2004 | 75 | 2004 |
OMEN: Faster password guessing using an ordered markov enumerator M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane International Symposium on Engineering Secure Software and Systems, 119-132, 2015 | 73 | 2015 |
A cryptographically sound Dolev-Yao style security proof of an electronic payment system M Backes, M Durmuth 18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005 | 63 | 2005 |
Speaker recognition in encrypted voice streams M Backes, G Doychev, M Dürmuth, B Köpf European Symposium on Research in Computer Security, 508-523, 2010 | 58 | 2010 |
Deniable encryption with negligible detection probability: An interactive construction M Dürmuth, DM Freeman Annual International Conference on the Theory and Applications of …, 2011 | 53 | 2011 |
OAEP is secure under key-dependent messages M Backes, M Dürmuth, D Unruh International Conference on the Theory and Application of Cryptology and …, 2008 | 51 | 2008 |
When privacy meets security: Leveraging personal information for password cracking C Castelluccia, A Chaabane, M Dürmuth, D Perito arXiv preprint arXiv:1304.6584, 2013 | 47 | 2013 |
Evaluation of standardized password-based key derivation against parallel processing platforms M Dürmuth, T Güneysu, M Kasper, C Paar, T Yalcin, R Zimmermann European Symposium on Research in Computer Security, 716-733, 2012 | 41 | 2012 |
On the accuracy of password strength meters M Golla, M Dürmuth Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 39 | 2018 |
Conditional reactive simulatability M Backes, M Dürmuth, D Hofheinz, R Küsters European Symposium on Research in Computer Security, 424-443, 2006 | 38 | 2006 |
Conditional reactive simulatability M Backes, M Dürmuth, D Hofheinz, R Küsters European Symposium on Research in Computer Security, 424-443, 2006 | 38 | 2006 |
On the security of cracking-resistant password vaults M Golla, B Beuscher, M Dürmuth Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 34 | 2016 |