JavaScript Menu Courtesy of Milonic.com
Stevens Computer Science Engineering & Science Stevens Computer Science
Stevens Institute of Technology Stevens Computer Science Homepage Stevens Computer Science Homepage
Stevens CS
PEOPLE
Faculty
Adjunct Faculty
Administrative Staff
Research Associates & Postdocs
PH.D Students
Alumni
        

News
gray gray Share/Save/Bookmark
Share
gray
Print
Stevens CS
back
Susanne Wetzel

Personal Webpage
Susanne Wetzel

Associate Professor

Location:

634 Babbio

Phone:

201.216.5610

Fax:

201.216.8249

Email:

swetzel@cs.stevens.edu
Courses:
CS 578
CS 579
CS 600
CS 693
CS 306
 
 

Schaefer School of Engineering & Science

Department:  

Computer Science

Research Center:  

Center for the Advancement of Secure Systems and Information Assurance

Research & Education
Education

Universitaet des Saarlandes (Germany), 1998, Dr.-Ing.

Universitaet Karlsruhe (Germany), 1993, Dipl.-Inform.

   
Research
My research interests are in cryptography and algorithmic number theory. In the field of cryptography, my research is focused on wireless security, secret sharing, privacy, and biometrics, and my contributions range from analysis to protocol design. In algorithmic number theory, my research is centered on lattice theory, in particular on developing new algorithms and heuristics for lattice basis reduction.
Achievements & Professional Societies
   
Patents & Inventions
  • Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Bluetooth-enabled Devices. United States Patent 6,574,455 - June 3, 2003.
  • Bohannon P.L., Jakobsson, M., Monrose, F., Reiter, M.K., Wetzel, S.: Generation of Repeatable Cryptographic Key Based on Varying Parameters. United States Patent 6,901,145 - May 31, 2005.
  • Jakobsson, M., Wetzel, S.: Secure Distributed Computation in Cryptographic Applications. United States Patent 6,950,937 - September 27, 2005.
  • Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Short Range Wireless Enable Devices. United States Patent 6,981,157 - December 27, 2005.
Selected Publications
Book Chapters

  • Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. (2008). "Crimeware-Resistant Authentication", Crimeware, Markus Jakobsson and Zulfikar Ramzan, Symantec Press.


  • Journals

  • Savarte, D., Wetzel, S., Patterson, W. (2011). "Analyzing Massively Collaborative Mathematics Projects", The Mathematical Intelligencer, Springer. 33 (1), 9-18.


  • Cordasco, J., Wetzel, S.. (2008). "Cryptographic versus Trust-based Methods for MANET Routing Security", Electronic Notes in Theoretical Computer Science, Elsevier. 197 (2), 131-140.


  • Tsow, A., Jakobsson, M., Yang, L., Wetzel, S.. (2006). "Warkitting: the Drive-by Subversion of Wireless Home Routers", Journal of Digital Forensics Practice, 1 (3), 179-192.


  • Backes, W., Wetzel, S.. (2002). "Heuristics on Lattice Basis Reduction in Practice", ACM Journal on Experimental Algorithms, ACM. 7.


  • Monrose, F.,Reiter, M.K., Wetzel, S.. (2002). "Password Hardening based on Keystroke Dynamics", International Journal of Information Security, Springer. 1 (2), 69-83.


  • Conference Proceedings

  • Lechler, T., Wetzel, S., Jankowski, R. (2011). "Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems", Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 44).


  • Mayer, D., Teubert, D., Wetzel, S., Meyer, U. (2011). "Implementation and Performance Evaluation of Privacy-preserving Fair Reconciliation Protocols on Ordered Sets", Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY). 109-120.


  • Mayer, D., Neugebauer, G., Meyer, U., Wetzel, S. (2011). "Enabling Fair and Privacy-preserving Applications Using Reconciliation Protocols on Ordered Sets", Proceedings of the 34th IEEE Sarnoff Symposium.


  • Tang, C., Naumann, D., Wetzel, S. (2011). "Symbolic Analysis for Security of Roaming Protocols in Mobile Networks", Proceedings of 7th International Conference on Security and Privacy in Communication Networks (Securecomm).


  • Backes, W., Wetzel, S. (2011). "Parallel Lattice Basis Reduction - The Road to Many-Core", Proceedings of the 13th IEEE International Conference on High Performance Computing and Communications (HPCC).


  • Backes, W., Wetzel, S. (2011). "Improving the Parallel Schnorr-Euchner LLL Algorithm", Proceedings of 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP).


  • Braun, M., Meyer, U., Wetzel, S.. (2010). "Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures (Award for Most Innovative Technology-Related Paper)", 4th International IFIP WG 11.2 Workshop for Information Security Theory and Practices (WISTP). 122-137.


  • Cordasco, J., Wetzel, S.. (2009). "An Attacker Model for MANET Routing Security", 2nd ACM Conference on Wireless Network Security (WiSec). 87-94.


  • Backes, W., Wetzel, S.. (2009). "Parallel Lattice Basis Reduction using a Multi-Threaded Schnorr-Euchner LLL Algorithm", 15th International European Conference on Parallel and Distributed Computing (Euro-Par). 960-973.


  • Jakobsson, M., Yang, L., Wetzel, S.. (2008). "Quantifying the Security of Preference-based Authentication", ACM CCS 2008 Workshop on Digital Identity Management (DIM). 61-69.


  • Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. (2008). "Love and Authentication", ACM Computer/Human Interaction Conference (CHI).


  • Meyer, U., Wetzel, S., Ioannidis, S.. (2007). "Distributed Privacy-Preserving Policy Reconciliation", IEEE International Conference on Communications (ICC). 1342-1349.


  • Backes, W., Wetzel, S.. (2007). "An Efficient LLL Gram Using Buffered Transformations", 10th International Workshop on Computer Algebra in Scientific Computing (CASC). Springer. 31-44.


  • Meyer, U., Wetzel, S.. (2006). " Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover", 3rd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec). 277-282.


  • Stevens CS
            

    News
    gray gray Share/Save/Bookmark
    Share
    gray
    Print
    Stevens CS
    Stevens CS Stevens CS Stevens CS
    View my Iframe Content