Seguir
Michael Reiter
Michael Reiter
James B. Duke Distinguished Professor, Duke University
Dirección de correo verificada de duke.edu - Página principal
Título
Citado por
Citado por
Año
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
36612011
Crowds: Anonymity for web transactions
MK Reiter, AD Rubin
ACM Transactions on Information and System Security 1 (1), 66-92, 1998
29861998
Stealing machine learning models via prediction APIs
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th USENIX Security Symposium (USENIX Security 16), 601-618, 2016
21302016
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM Conference on Computer and Communications …, 2016
18482016
The design and analysis of graphical passwords
IH Jermyn, A Mayer, F Monrose, MK Reiter, AD Rubin
USENIX Association, 1999
11961999
HotStuff: BFT consensus with linearity and responsiveness
M Yin, D Malkhi, MK Reiter, GG Gueta, I Abraham
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019
1148*2019
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
10462012
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
10092008
Byzantine quorum systems
D Malkhi, M Reiter
Distributed Computing 11 (4), 203-213, 1998
9631998
The design and implementation of a secure auction service
MK Franklin, MK Reiter
IEEE Transactions on Software Engineering 22 (5), 302-312, 1996
921*1996
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International journal of Information security 1 (2), 69-83, 2002
7562002
Seeing-is-believing: Using camera phones for human-verifiable authentication
JM McCune, A Perrig, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005
7532005
On user choice in graphical password schemes
D Davis, F Monrose, MK Reiter
USENIX Security Symposium 13 (2004), 11-11, 2004
7522004
Design and implementation of a consolidated middlebox architecture
V Sekar, N Egi, S Ratnasamy, MK Reiter, G Shi
9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012
7442012
Fault-scalable Byzantine fault-tolerant services
M Abd-El-Malek, GR Ganger, GR Goodson, MK Reiter, JJ Wylie
ACM SIGOPS Operating Systems Review 39 (5), 59-74, 2005
5582005
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
5562000
HomeAlone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
5032011
SBFT: A scalable and decentralized trust infrastructure
GG Gueta, I Abraham, S Grossman, D Malkhi, B Pinkas, MK Reiter, ...
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
5022019
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
4972014
Fair exchange with a semi-trusted third party
MK Franklin, MK Reiter
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
4791997
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20