Follow
Markus Dürmuth
Markus Dürmuth
Professor for IT Security, Leibniz University Hannover
Verified email at itsec.uni-hannover.de
Title
Cited by
Cited by
Year
Acoustic {Side-Channel} attacks on printers
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
19th USENIX Security Symposium (USENIX Security 10), 2010
2962010
Quantifying the security of graphical passwords: The case of android unlock patterns
S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2872013
Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}})
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018
2692018
Adaptive password-strength meters from markov models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
2542012
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1722008
Tempest in a teapot: Compromising reflections revisited
M Backes, T Chen, M Dürmuth, HPA Lensch, M Welk
2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009
1472009
Who Are You? A Statistical Approach to Measuring User Authenticity.
D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto
NDSS 16, 21-24, 2016
1462016
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009
1462009
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015
1352015
On the accuracy of password strength meters
M Golla, M Dürmuth
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1122018
Apps against the spread: Privacy implications and user acceptance of COVID-19-related smartphone apps on three continents
C Utz, S Becker, T Schnitzler, FM Farke, F Herbert, L Schaewitz, ...
Proceedings of the 2021 chi conference on human factors in computing systems …, 2021
832021
An algebra for composing enterprise privacy policies
M Backes, M Dürmuth, R Steinwandt
Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004
772004
Is this really you? An empirical study on risk-based authentication applied in the wild
S Wiefling, L Lo Iacono, M Dürmuth
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
722019
" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications
M Golla, M Wei, J Hainline, L Filipe, M Dürmuth, E Redmiles, B Ur
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
722018
Deniable encryption with negligible detection probability: An interactive construction
M Dürmuth, DM Freeman
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
672011
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
662013
This pin can be easily guessed: Analyzing the security of smartphone unlock pins
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020
652020
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
652010
A cryptographically sound Dolev-Yao style security proof of an electronic payment system
M Backes, M Durmuth
18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005
652005
OAEP is secure under key-dependent messages
M Backes, M Dürmuth, D Unruh
Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the …, 2008
552008
The system can't perform the operation now. Try again later.
Articles 1–20