Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data that, if used improperly, can harm the data subjects. As a result, concern about the ownership, control, privacy, and accuracy of these data has become a top priority. This course focuses on both the technical challenges of handling sensitive data and the policy and legal issues facing data subjects, data owners, and data users. This course is suitable for advanced undergraduate computer science majors, graduate students in computer science, and students in technology management or other majors with some computer science background. Course readings draw on a variety of sources, including both technical materials and the popular press.
This course provides a broad introduction to cornerstones of security (authenticity, confidentiality, message integrity, and non-repudiation) and the mechanisms to achieve them as well as the underlying mathematical basics. Topics include: block and stream ciphers, public-key systems, key management, certificates, public-key infrastructure (PKI), digital signature, non-repudiation, and message authentication. Various security standards and protocols such as DES, AES, PGP, and Kerberos, are studied.
CS 600:Advanced Algorithm Design and Implementation
Design, implementation, and asymptotic time and space analysis of advanced algorithms, as well as analyzing worst-case and average-case complexity of algorithms. Students will be expected to run experiments to test the actual performance of the algorithms on sample inputs. Introduction to NP-complete problems and approximation algorithms.
This course covers the design and analysis of security protocols, and studies different attacks and defenses against them. Topics include: signature and authentication protocols, privacy, digital rights management, security protocols for wired, wireless and distributed networks, electronic voting, payment and micropayment protocols, anonymity, broadcast encryption and traitor tracing, quantum cryptography, and visual cryptography. The course includes a project.
This course provides a basic introduction to the key concepts in security. It covers basic concepts such as authentication, confidentiality, integrity, and non-repudiation as well as important techniques and applications. Topics include access control, security economics, ethics, privacy, software/operating system security, and security policies.
Schaefer School of Engineering & Science
Center for the Advancement of Secure Systems and Information Assurance
Research & Education
Universitaet des Saarlandes (Germany), 1998, Dr.-Ing.
My research interests are in cryptography and algorithmic number theory. In the field of cryptography, my research is focused on wireless security, secret sharing, privacy, and biometrics, and my contributions range from analysis to protocol design. In algorithmic number theory, my research is centered on lattice theory, in particular on developing new algorithms and heuristics for lattice basis reduction.
Achievements & Professional Societies
Patents & Inventions
Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Bluetooth-enabled Devices. United States Patent 6,574,455 - June 3, 2003.
Bohannon P.L., Jakobsson, M., Monrose, F., Reiter, M.K., Wetzel, S.: Generation of Repeatable Cryptographic Key Based on Varying Parameters. United States Patent 6,901,145 - May 31, 2005.
Jakobsson, M., Wetzel, S.: Secure Distributed Computation in Cryptographic Applications. United States Patent 6,950,937 - September 27, 2005.
Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Short Range Wireless Enable Devices. United States Patent 6,981,157 - December 27, 2005.
Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. (2008). "Crimeware-Resistant Authentication", Crimeware, Markus Jakobsson and Zulfikar Ramzan, Symantec Press.
Savarte, D., Wetzel, S., Patterson, W. (2011). "Analyzing Massively Collaborative Mathematics Projects", The Mathematical Intelligencer, Springer. 33 (1), 9-18.
Cordasco, J., Wetzel, S.. (2008). "Cryptographic versus Trust-based Methods for MANET Routing Security", Electronic Notes in Theoretical Computer Science, Elsevier. 197 (2), 131-140.
Tsow, A., Jakobsson, M., Yang, L., Wetzel, S.. (2006). "Warkitting: the Drive-by Subversion of Wireless Home Routers", Journal of Digital Forensics Practice, 1 (3), 179-192.
Backes, W., Wetzel, S.. (2002). "Heuristics on Lattice Basis Reduction in Practice", ACM Journal on Experimental Algorithms, ACM. 7.
Monrose, F.,Reiter, M.K., Wetzel, S.. (2002). "Password Hardening based on Keystroke Dynamics", International Journal of Information Security, Springer. 1 (2), 69-83.
Lechler, T., Wetzel, S., Jankowski, R. (2011). "Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems", Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 44).
Mayer, D., Teubert, D., Wetzel, S., Meyer, U. (2011). "Implementation and Performance Evaluation of Privacy-preserving Fair Reconciliation Protocols on Ordered Sets", Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY). 109-120.
Mayer, D., Neugebauer, G., Meyer, U., Wetzel, S. (2011). "Enabling Fair and Privacy-preserving Applications Using Reconciliation Protocols on Ordered Sets", Proceedings of the 34th IEEE Sarnoff Symposium.
Tang, C., Naumann, D., Wetzel, S. (2011). "Symbolic Analysis for Security of Roaming Protocols in Mobile Networks", Proceedings of 7th International Conference on Security and Privacy in Communication Networks (Securecomm).
Backes, W., Wetzel, S. (2011). "Parallel Lattice Basis Reduction - The Road to Many-Core", Proceedings of the 13th IEEE International Conference on High Performance Computing and Communications (HPCC).
Backes, W., Wetzel, S. (2011). "Improving the Parallel Schnorr-Euchner LLL Algorithm", Proceedings of 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP).
Braun, M., Meyer, U., Wetzel, S.. (2010). "Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures (Award for Most Innovative Technology-Related Paper)", 4th International IFIP WG 11.2 Workshop for Information Security Theory and Practices (WISTP). 122-137.
Cordasco, J., Wetzel, S.. (2009). "An Attacker Model for MANET Routing Security", 2nd ACM Conference on Wireless Network Security (WiSec). 87-94.
Backes, W., Wetzel, S.. (2009). "Parallel Lattice Basis Reduction using a Multi-Threaded Schnorr-Euchner LLL Algorithm", 15th International European Conference on Parallel and Distributed Computing (Euro-Par). 960-973.
Jakobsson, M., Yang, L., Wetzel, S.. (2008). "Quantifying the Security of Preference-based Authentication", ACM CCS 2008 Workshop on Digital Identity Management (DIM). 61-69.
Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. (2008). "Love and Authentication", ACM Computer/Human Interaction Conference (CHI).
Meyer, U., Wetzel, S., Ioannidis, S.. (2007). "Distributed Privacy-Preserving Policy Reconciliation", IEEE International Conference on Communications (ICC). 1342-1349.
Backes, W., Wetzel, S.. (2007). "An Efficient LLL Gram Using Buffered Transformations", 10th International Workshop on Computer Algebra in Scientific Computing (CASC). Springer. 31-44.
Meyer, U., Wetzel, S.. (2006). " Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover", 3rd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec). 277-282.