Markus Dürmuth
Markus Dürmuth
Professor for IT Security, Ruhr University Bochum
Verified email at rub.de
TitleCited byYear
Quantifying the security of graphical passwords: the case of android unlock patterns
S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1652013
Adaptive Password-Strength Meters from Markov Models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
1512012
Acoustic Side-Channel Attacks on Printers.
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
USENIX Security symposium, 307-322, 2010
1472010
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1132008
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009
1002009
Tempest in a teapot: Compromising reflections revisited
M Backes, T Chen, M Duermuth, HPA Lensch, M Welk
2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009
922009
An algebra for composing enterprise privacy policies
M Backes, M Dürmuth, R Steinwandt
European Symposium on Research in Computer Security, 33-52, 2004
702004
A cryptographically sound Dolev-Yao style security proof of an electronic payment system
M Backes, M Durmuth
18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005
642005
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security, 508-523, 2010
522010
OAEP is secure under key-dependent messages
M Backes, M Dürmuth, D Unruh
International Conference on the Theory and Application of Cryptology and …, 2008
522008
Who Are You? A Statistical Approach to Measuring User Authenticity.
D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto
NDSS, 1-15, 2016
502016
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
International Symposium on Engineering Secure Software and Systems, 119-132, 2015
422015
Deniable encryption with negligible detection probability: An interactive construction
M Dürmuth, DM Freeman
Annual International Conference on the Theory and Applications of …, 2011
412011
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
European Symposium on Research in Computer Security, 424-443, 2006
342006
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
European Symposium on Research in Computer Security, 424-443, 2006
342006
Evaluation of standardized password-based key derivation against parallel processing platforms
M Dürmuth, T Güneysu, M Kasper, C Paar, T Yalcin, R Zimmermann
European Symposium on Research in Computer Security, 716-733, 2012
332012
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
322013
Unification in privacy policy evaluation-translating EPAL into Prolog
M Backes, M Durmuth, G Karjot
Proceedings. Fifth IEEE International Workshop on Policies for Distributed …, 2004
312004
On simulatability soundness and mapping soundness of symbolic cryptography
M Backes, M Dürmuth, R Küsters
International Conference on Foundations of Software Technology and …, 2007
272007
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
International Journal of Information Security 7 (2), 155-169, 2008
252008
The system can't perform the operation now. Try again later.
Articles 1–20