Suivre
Michael Reiter
Michael Reiter
James B. Duke Distinguished Professor, Duke University
Adresse e-mail validée de duke.edu - Page d'accueil
Titre
Citée par
Citée par
Année
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
35962011
Crowds: Anonymity for web transactions
MK Reiter, AD Rubin
ACM Transactions on Information and System Security 1 (1), 66-92, 1998
29421998
Stealing machine learning models via prediction APIs
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th USENIX Security Symposium (USENIX Security 16), 601-618, 2016
20192016
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM Conference on Computer and Communications …, 2016
17652016
The design and analysis of graphical passwords
IH Jermyn, A Mayer, F Monrose, MK Reiter, AD Rubin
USENIX Association, 1999
12021999
HotStuff: BFT consensus with linearity and responsiveness
M Yin, D Malkhi, MK Reiter, GG Gueta, I Abraham
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
1053*2019
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10412012
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
9972008
Byzantine quorum systems
D Malkhi, M Reiter
Distributed Computing 11 (4), 203-213, 1998
9581998
The design and implementation of a secure auction service
MK Franklin, MK Reiter
IEEE Transactions on Software Engineering 22 (5), 302-312, 1996
920*1996
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International journal of Information security 1 (2), 69-83, 2002
7562002
Seeing-is-believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005
7502005
On user choice in graphical password schemes
D Davis, F Monrose, MK Reiter
USENIX Security Symposium 13 (2004), 11-11, 2004
7502004
Design and implementation of a consolidated middlebox architecture
V Sekar, N Egi, S Ratnasamy, MK Reiter, G Shi
9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012
7422012
Fault-scalable Byzantine fault-tolerant services
M Abd-El-Malek, GR Ganger, GR Goodson, MK Reiter, JJ Wylie
ACM SIGOPS Operating Systems Review 39 (5), 59-74, 2005
5572005
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
5552000
HomeAlone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
4952011
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
4932014
Fair exchange with a semi-trusted third party
MK Franklin, MK Reiter
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
4761997
SBFT: A scalable and decentralized trust infrastructure
GG Gueta, I Abraham, S Grossman, D Malkhi, B Pinkas, MK Reiter, ...
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
4622019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20