Michael Reiter
Michael Reiter
Lawrence M. Slifkin Distinguished Professor, University of North Carolina at Chapel Hill
Verified email at cs.unc.edu - Homepage
TitleCited byYear
Crowds: Anonymity for web transactions
MK Reiter, AD Rubin
ACM Transactions on Information and System Security (TISSEC) 1 (1), 66-92, 1998
25381998
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
19742011
The design and analysis of graphical passwords
I Jermyn, AJ Mayer, F Monrose, MK Reiter, AD Rubin
Usenix Security, 1999
10271999
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
ACM SIGOPS Operating Systems Review 42 (4), 315-328, 2008
8082008
Byzantine quorum systems
D Malkhi, M Reiter
Distributed Computing 11 (4), 203-213, 1998
7761998
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7432012
Seeing-Is-Believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
International Journal of Security and Networks 4 (1), 43-56, 2009
662*2009
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International journal of Information security 1 (2), 69-83, 2002
6542002
On user choice in graphical password schemes
D Davis, F Monrose, MK Reiter
Proceedings of the 13th USENIX Security Symposium, 2004
6252004
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 202-213, 2001
4922001
Design and implementation of a consolidated middlebox architecture
V Sekar, N Egi, S Ratnasamy, M Reiter, G Shi
4842011
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
4832016
The design and implementation of a secure auction service
MK Franklin, MK Reiter
IEEE Transactions on Software Engineering 22 (5), 302-312, 1996
4771996
Stealing machine learning models via prediction APIs
F Tramèr, F Zhang, A Juels, M Reiter, T Ristenpart
25th USENIX Security Symposium (USENIX Security 16), 2016
4332016
Anonymous web transactions with Crowds
MK Reiter, AD Rubin
Communications of the ACM 42 (2), 32-48, 1999
4131999
Fault-scalable Byzantine fault-tolerant services
M Abd-El-Malek, GR Ganger, GR Goodson, MK Reiter, JJ Wylie
ACM SIGOPS Operating Systems Review 39 (5), 59-74, 2005
3922005
Fair exchange with a semi-trusted third party
MK Franklin, MK Reiter
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3811997
Timing attacks in low-latency mix systems
B Levine, M Reiter, C Wang, M Wright
Financial Cryptography, 251-265, 2004
3662004
Secure agreement protocols: Reliable and atomic group multicast in Rampart
MK Reiter
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
3531994
HomeAlone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
Security and Privacy (SP), 2011 IEEE Symposium on, 313-328, 2011
3502011
The system can't perform the operation now. Try again later.
Articles 1–20