Susanne Wetzel

Building: North Building
Phone: +1 (201) 216-5610

Universitaet des Saarlandes (Germany), 1998, Dr.-Ing.

Universitaet Karlsruhe (Germany), 1993, Dipl.-Inform.

My research interests are in cryptography and algorithmic number theory. In the field of cryptography, my research is focused on wireless security, secret sharing, privacy, and biometrics, and my contributions range from analysis to protocol design. In algorithmic number theory, my research is centered on lattice theory, in particular on developing new algorithms and heuristics for lattice basis reduction.
Patents & Inventions
  • Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Bluetooth-enabled Devices. United States Patent 6,574,455 - June 3, 2003.
  • Bohannon P.L., Jakobsson, M., Monrose, F., Reiter, M.K., Wetzel, S.: Generation of Repeatable Cryptographic Key Based on Varying Parameters. United States Patent 6,901,145 - May 31, 2005.
  • Jakobsson, M., Wetzel, S.: Secure Distributed Computation in Cryptographic Applications. United States Patent 6,950,937 - September 27, 2005.
  • Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Short Range Wireless Enable Devices. United States Patent 6,981,157 - December 27, 2005.
Selected Publications
  1. Stefan Wüller, Daniel A. Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel. (2017). "Designing privacy-Preserving Interval Operations Based on Homomorphic Encryption and Secret Sharing Techniques", Journal of Computer Security 25(1): 59-81.
  2. Alan T. Sherman, Melissa Dark, Agnes Chan, Rylan Chong, Thomas Morris, Linda Oliva, John Springer, Bhavani M. Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel. (2017). "INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research", IEEE Security & Privacy 15(4): 72-78.
  3. Thomas Lechler, Susanne Wetzel. (2017). "Conceptualizing the Silent Risk of Inadvertent Information Leakages", Computers & Electrical Engineering 58: 67-75.
Conference Proceedings
  1. Stefan Wüller, Ulrike Meyer, Susanne Wetzel. (2017). "Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries", PST 2017.
  2. Stefan Wüller, Michael Vu, Ulrike Meyer, Susanne Wetzel. (2017). "Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities", WPES@CCS 2017.
  3. Günther Reitberger, Susanne Wetzel. (2017). "Investigating the Impact of Media Coverage on Data Breach Fatigue", IEEE Sarnoff 2017.
  4. Susanne Wetzel. (2017). "Pathways in Cybersecurity: Translating Theory into Practice", WISE 2017.
  5. Stefan Wüller, Ulrike Meyer, Susanne Wetzel. (2017). "Towards Privacy-Preserving Multi-party Bartering", WAHC 2017.
  6. Fabian Foerg, Susanne Wetzel, Ulrike Meyer. (2017). "Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering", CODASPY 2017.
  7. Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel:. (2018). "Privacy-Preserving Subgraph Checking", PST 2018.
  8. Stefan Wüller, Malte Breuer, Ulrike Meyer, Susanne Wetzel. (2018). "Privacy-Preserving Trade Chain Detection", DPM/CBT@ESORICS 2018.
  • CS 578 Privacy in a Networked World
  • CS 579 Foundations of Cryptography
  • CS 600 Advanced Algorithm Design and Implementation
  • CS 693 Cryptographic Protocols
  • CS 425 Cybersecurity Capstone I
  • CS 426 Cybersecurity Capstone II
  • CS 306 Introduction to IT Security