Markus Dürmuth
Markus Dürmuth
Professor for IT Security, Ruhr University Bochum
Verified email at rub.de
TitleCited byYear
Quantifying the security of graphical passwords: the case of android unlock patterns
S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1802013
Adaptive Password-Strength Meters from Markov Models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
1592012
Acoustic Side-Channel Attacks on Printers.
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
USENIX Security symposium, 307-322, 2010
1592010
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1162008
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009
1052009
Tempest in a teapot: Compromising reflections revisited
M Backes, T Chen, M Duermuth, HPA Lensch, M Welk
2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009
932009
An algebra for composing enterprise privacy policies
M Backes, M Dürmuth, R Steinwandt
European Symposium on Research in Computer Security, 33-52, 2004
712004
A cryptographically sound Dolev-Yao style security proof of an electronic payment system
M Backes, M Durmuth
18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005
642005
Who Are You? A Statistical Approach to Measuring User Authenticity.
D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto
NDSS, 1-15, 2016
602016
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security, 508-523, 2010
532010
OAEP is secure under key-dependent messages
M Backes, M Dürmuth, D Unruh
International Conference on the Theory and Application of Cryptology and …, 2008
532008
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
International Symposium on Engineering Secure Software and Systems, 119-132, 2015
482015
Deniable encryption with negligible detection probability: An interactive construction
M Dürmuth, DM Freeman
Annual International Conference on the Theory and Applications of …, 2011
432011
Rethinking access control and authentication for the home internet of things (iot)
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th {USENIX} Security Symposium ({USENIX} Security 18), 255-272, 2018
362018
Evaluation of standardized password-based key derivation against parallel processing platforms
M Dürmuth, T Güneysu, M Kasper, C Paar, T Yalcin, R Zimmermann
European Symposium on Research in Computer Security, 716-733, 2012
362012
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
342013
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
European Symposium on Research in Computer Security, 424-443, 2006
342006
Conditional reactive simulatability
M Backes, M Dürmuth, D Hofheinz, R Küsters
European Symposium on Research in Computer Security, 424-443, 2006
342006
Unification in privacy policy evaluation-translating EPAL into Prolog
M Backes, M Durmuth, G Karjot
Proceedings. Fifth IEEE International Workshop on Policies for Distributed …, 2004
312004
On simulatability soundness and mapping soundness of symbolic cryptography
M Backes, M Dürmuth, R Küsters
International Conference on Foundations of Software Technology and …, 2007
272007
The system can't perform the operation now. Try again later.
Articles 1–20