faculty profile

Susanne Wetzel

Building: Babbio
Room: 634
Phone: 201.216.5610
Fax: 201.216.8249
Email: swetzel@cs.stevens.edu

Universitaet des Saarlandes (Germany), 1998, Dr.-Ing.

Universitaet Karlsruhe (Germany), 1993, Dipl.-Inform.

My research interests are in cryptography and algorithmic number theory. In the field of cryptography, my research is focused on wireless security, secret sharing, privacy, and biometrics, and my contributions range from analysis to protocol design. In algorithmic number theory, my research is centered on lattice theory, in particular on developing new algorithms and heuristics for lattice basis reduction.
Patents & Inventions
  • Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Bluetooth-enabled Devices. United States Patent 6,574,455 - June 3, 2003.
  • Bohannon P.L., Jakobsson, M., Monrose, F., Reiter, M.K., Wetzel, S.: Generation of Repeatable Cryptographic Key Based on Varying Parameters. United States Patent 6,901,145 - May 31, 2005.
  • Jakobsson, M., Wetzel, S.: Secure Distributed Computation in Cryptographic Applications. United States Patent 6,950,937 - September 27, 2005.
  • Jakobsson, M., Wetzel, S.: Method and Apparatus for Ensuring Security of Users of Short Range Wireless Enable Devices. United States Patent 6,981,157 - December 27, 2005.
Selected Publications
Book Chapters
  1. Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. (2008). "Crimeware-Resistant Authentication", Crimeware, Markus Jakobsson and Zulfikar Ramzan, Symantec Press.
  1. Savarte, D., Wetzel, S., Patterson, W. (2011). "Analyzing Massively Collaborative Mathematics Projects", The Mathematical Intelligencer, Springer. 33 (1), 9-18.
  2. Cordasco, J., Wetzel, S.. (2008). "Cryptographic versus Trust-based Methods for MANET Routing Security", Electronic Notes in Theoretical Computer Science, Elsevier. 197 (2), 131-140.
  3. Tsow, A., Jakobsson, M., Yang, L., Wetzel, S.. (2006). "Warkitting: the Drive-by Subversion of Wireless Home Routers", Journal of Digital Forensics Practice, 1 (3), 179-192.
  4. Backes, W., Wetzel, S.. (2002). "Heuristics on Lattice Basis Reduction in Practice", ACM Journal on Experimental Algorithms, ACM. 7.
  5. Monrose, F.,Reiter, M.K., Wetzel, S.. (2002). "Password Hardening based on Keystroke Dynamics", International Journal of Information Security, Springer. 1 (2), 69-83.
Conference Proceedings
  1. Lechler, T., Wetzel, S., Jankowski, R. (2011). "Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems", Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 44).
  2. Mayer, D., Teubert, D., Wetzel, S., Meyer, U. (2011). "Implementation and Performance Evaluation of Privacy-preserving Fair Reconciliation Protocols on Ordered Sets", Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY). 109-120.
  3. Mayer, D., Neugebauer, G., Meyer, U., Wetzel, S. (2011). "Enabling Fair and Privacy-preserving Applications Using Reconciliation Protocols on Ordered Sets", Proceedings of the 34th IEEE Sarnoff Symposium.
  4. Tang, C., Naumann, D., Wetzel, S. (2011). "Symbolic Analysis for Security of Roaming Protocols in Mobile Networks", Proceedings of 7th International Conference on Security and Privacy in Communication Networks (Securecomm).
  5. Backes, W., Wetzel, S. (2011). "Parallel Lattice Basis Reduction - The Road to Many-Core", Proceedings of the 13th IEEE International Conference on High Performance Computing and Communications (HPCC).
  6. Backes, W., Wetzel, S. (2011). "Improving the Parallel Schnorr-Euchner LLL Algorithm", Proceedings of 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP).
  7. Braun, M., Meyer, U., Wetzel, S.. (2010). "Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures (Award for Most Innovative Technology-Related Paper)", 4th International IFIP WG 11.2 Workshop for Information Security Theory and Practices (WISTP). 122-137.
  8. Cordasco, J., Wetzel, S.. (2009). "An Attacker Model for MANET Routing Security", 2nd ACM Conference on Wireless Network Security (WiSec). 87-94.
  9. Backes, W., Wetzel, S.. (2009). "Parallel Lattice Basis Reduction using a Multi-Threaded Schnorr-Euchner LLL Algorithm", 15th International European Conference on Parallel and Distributed Computing (Euro-Par). 960-973.
  10. Jakobsson, M., Yang, L., Wetzel, S.. (2008). "Quantifying the Security of Preference-based Authentication", ACM CCS 2008 Workshop on Digital Identity Management (DIM). 61-69.
  11. Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. (2008). "Love and Authentication", ACM Computer/Human Interaction Conference (CHI).
  12. Meyer, U., Wetzel, S., Ioannidis, S.. (2007). "Distributed Privacy-Preserving Policy Reconciliation", IEEE International Conference on Communications (ICC). 1342-1349.
  13. Backes, W., Wetzel, S.. (2007). "An Efficient LLL Gram Using Buffered Transformations", 10th International Workshop on Computer Algebra in Scientific Computing (CASC). Springer. 31-44.
  14. Meyer, U., Wetzel, S.. (2006). " Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover", 3rd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec). 277-282.
  • CS 578 Privacy in a Networked World
  • CS 579 Foundations of Cryptography
  • CS 600 Advanced Algorithm Design and Implementation
  • CS 693 Cryptographic Protocols
  • CS 306 Introduction to IT Security