Markus Dürmuth
Markus Dürmuth
Professor for IT Security, Ruhr University Bochum
Verified email at rub.de
Title
Cited by
Cited by
Year
Quantifying the security of graphical passwords: the case of android unlock patterns
S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2072013
Acoustic Side-Channel Attacks on Printers.
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
USENIX Security symposium, 307-322, 2010
1952010
Adaptive Password-Strength Meters from Markov Models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
1722012
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1292008
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009
1172009
Tempest in a teapot: Compromising reflections revisited
M Backes, T Chen, M Duermuth, HPA Lensch, M Welk
2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009
1022009
Rethinking access control and authentication for the home internet of things (IoT)
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th {USENIX} Security Symposium ({USENIX} Security 18), 255-272, 2018
772018
Who Are You? A Statistical Approach to Measuring User Authenticity.
D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto
NDSS, 1-15, 2016
772016
An algebra for composing enterprise privacy policies
M Backes, M Dürmuth, R Steinwandt
European Symposium on Research in Computer Security, 33-52, 2004
742004
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
International Symposium on Engineering Secure Software and Systems, 119-132, 2015
672015
A cryptographically sound Dolev-Yao style security proof of an electronic payment system
M Backes, M Durmuth
18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005
612005
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security, 508-523, 2010
562010
OAEP is secure under key-dependent messages
M Backes, M Dürmuth, D Unruh
International Conference on the Theory and Application of Cryptology and …, 2008
512008
Deniable encryption with negligible detection probability: An interactive construction
M Dürmuth, DM Freeman
Annual International Conference on the Theory and Applications of …, 2011
492011
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
442013
Evaluation of standardized password-based key derivation against parallel processing platforms
M Dürmuth, T Güneysu, M Kasper, C Paar, T Yalcin, R Zimmermann
European Symposium on Research in Computer Security, 716-733, 2012
402012
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
European Symposium on Research in Computer Security, 424-443, 2006
362006
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
European Symposium on Research in Computer Security, 424-443, 2006
362006
On the security of cracking-resistant password vaults
M Golla, B Beuscher, M Dürmuth
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
312016
Unification in privacy policy evaluation-translating EPAL into Prolog
M Backes, M Durmuth, G Karjot
Proceedings. Fifth IEEE International Workshop on Policies for Distributed …, 2004
312004
The system can't perform the operation now. Try again later.
Articles 1–20