Michael Reiter
Michael Reiter
Lawrence M. Slifkin Distinguished Professor, University of North Carolina at Chapel Hill
Verified email at duke.edu - Homepage
Title
Cited by
Cited by
Year
Crowds: Anonymity for web transactions
MK Reiter, AD Rubin
ACM transactions on information and system security (TISSEC) 1 (1), 66-92, 1998
26061998
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
22512011
The design and analysis of graphical passwords
IH Jermyn, A Mayer, F Monrose, MK Reiter, AD Rubin
USENIX Association, 1999
10551999
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
8342008
The design and implementation of a secure auction service
MK Franklin, MK Reiter
IEEE Transactions on Software Engineering 22 (5), 302-312, 1996
829*1996
Byzantine quorum systems
D Malkhi, M Reiter
Distributed Computing 11 (4), 203-213, 1998
8061998
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7962012
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International journal of Information security 1 (2), 69-83, 2002
6862002
Seeing-is-believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005
6792005
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 acm sigsac conference on computer and communications …, 2016
6712016
On user choice in graphical password schemes
D Davis, F Monrose, MK Reiter
USENIX Security Symposium 13 (2004), 11-11, 2004
6482004
Stealing machine learning models via prediction APIs
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th USENIX Security Symposium (USENIX Security 16), 601-618, 2016
6282016
Design and implementation of a consolidated middlebox architecture
V Sekar, N Egi, S Ratnasamy, MK Reiter, G Shi
9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012
5282012
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
5062000
Fault-scalable Byzantine fault-tolerant services
M Abd-El-Malek, GR Ganger, GR Goodson, MK Reiter, JJ Wylie
ACM SIGOPS Operating Systems Review 39 (5), 59-74, 2005
4212005
Anonymous web transactions with crowds
MK Reiter, AD Rubin
Communications of the ACM 42 (2), 32-48, 1999
4211999
Fair exchange with a semi-trusted third party
MK Franklin, MK Reiter
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
4101997
HomeAlone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
3842011
Timing attacks in low-latency mix systems
BN Levine, MK Reiter, C Wang, M Wright
International Conference on Financial Cryptography, 251-265, 2004
3742004
Secure agreement protocols: Reliable and atomic group multicast in Rampart
MK Reiter
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
3571994
The system can't perform the operation now. Try again later.
Articles 1–20