Susanne Wetzel

from Wikipedia, the free encyclopedia

Susanne Gudrun Wetzel is a German computer scientist and professor at the Department of Computer Science at the Stevens Institute of Technology (SIT) in Hoboken (New Jersey) .

Career

Wetzel graduated from the University of Karlsruhe (Technical University) with a degree in computer science in 1993 and received his doctorate in computer science under Johannes Buchmann at the Saarland University in 1998 with a dissertation on the subject of "Lattice Basis Reduction Algorithms and their Applications". This was followed by research activities for DaimlerChrysler in Stuttgart , Lucent Technologies Bell Laboratories in Murray Hill (New Jersey) and RSA Laboratories in Stockholm . In 2002 she moved to the Stevens Institute of Technology (SIT) in Hoboken as an Assistant Professor . Today she is a full professor in the Computer Science Department at SIT.

Susanne Wetzel's main research areas are cryptography and algorithmic number theory . Within cryptography, she focuses primarily on secure multi-party computing ("Secure multi-party computation" (SMC) with applications in barter , account reconciliation, electronic reconciliations and auctions), wireless security , privacy and biometrics . In the algorithmic number theory, her research focuses mainly on organization theory ( "lattice theory") and in particular the development of new algorithms and heuristics to base reduction of associations ( "lattice basis reduction"). Her research projects were funded by the National Science Foundation (NSF), Department of Homeland Security (DHS) and Department of Defense (DoD).

Wetzel is co-designer and director of the program for the university degree "Bachelor of Science in Cybersecurity" at SIT. She also directs the SIT scholarship program "Scholarships for Service". Wetzel is a member of the committee for the “Colloquium for Information Systems Security Education” (CISSE), sits on the board of the “Center for Discrete Mathematics and Theoretical Computer Science” (DIMACS) and is one of the members of the INSuRE project (“Information Security Research and Education ”) participating researchers. She is the Program Director for the Secure and Trustworthy Cyberspace (SaTC) program at the National Science Foundation .

Patents

  • Patent US6574455 : Method and Apparatus for Ensuring Security of Users of Bluetooth-enabled Devices. Published on June 3, 2003 , inventors: Markus Jakobsson, Susanne Wetzel.
  • Patent US6901145 : Generation of Repeatable Cryptographic Key Based on Varying Parameters. Published on May 31, 2005 , Inventors: Philip L. Bohannon, Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter, Susanne Wetzel.
  • Patent US6950937 : Secure Distributed Computation in Cryptographic Applications. Published on September 27, 2005 , inventors: Markus Jakobsson, Susanne Wetzel.
  • Patent US6981157 : Method and Apparatus for Ensuring Security of Users of Short Range Wireless Enable Devices. Published on December 27, 2005 , inventors: Markus Jakobsson, Susanne Wetzel.

Publications (excerpt)

Book contributions

Articles in professional journals

  • D. Savarte, S. Wetzel, W. Patterson: Analyzing Massively Collaborative Mathematics Projects. In: The Mathematical Intelligencer. Jumper. Volume 33, No. 1, 2011, pp. 9-18.
  • J. Cordasco, S. Wetzel: Cryptographic versus Trust-based Methods for MANET Routing Security. In: Electronic Notes in Theoretical Computer Science. Elsevier. Volume 197, No. 2, 2008, pp. 131-140.
  • A. Tsow, M. Jakobsson, L. Yang, S. Wetzel: Warkitting: the Drive-by Subversion of Wireless Home Routers. In: Journal of Digital Forensics Practice. Volume 1, No. 3, 2006, pp. 179-192.
  • W. Backes, S. Wetzel: Heuristics on Lattice Basis Reduction in Practice. In: ACM Journal on Experimental Algorithms. 7. 2002
  • F. Monrose, Reiter, MK, Wetzel, S .: Password Hardening based on Keystroke Dynamics. In: International Journal of Information Security. Jumper. Volume 1, No. 2, 2002, pp. 69-83.

Congress contributions

  • T. Lechler, S. Wetzel, R. Jankowski: Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems. In: Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 44). 2011, ISBN 978-0-7695-4282-9 .
  • D. Mayer, D. Teubert, S. Wetzel, Meyer, U .: Implementation and Performance Evaluation of Privacy-preserving Fair Reconciliation Protocols on Ordered Sets. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY). 2011, ISBN 978-1-4503-1376-6 , pp. 109-120.
  • D. Mayer, G. Neugebauer, U. Meyer, S. Wetzel: Enabling Fair and Privacy-preserving Applications Using Reconciliation Protocols on Ordered Sets. In: Proceedings of the 34th IEEE Sarnoff Symposium. 2011, ISBN 978-1-61284-681-1 .
  • C. Tang, D. Naumann, S. Wetzel: Symbolic Analysis for Security of Roaming Protocols in Mobile Networks. In: Proceedings of 7th International Conference on Security and Privacy in Communication Networks (Securecomm). 2011, ISBN 978-3-642-31909-9 .
  • W. Backes, S. Wetzel: Parallel Lattice Basis Reduction - The Road to Many-Core. In: Proceedings of the 13th IEEE International Conference on High Performance Computing and Communications (HPCC). 2011, ISBN 978-1-4577-1564-8 .
  • W. Backes, S. Wetzel: Improving the Parallel Schnorr-Euchner LLL Algorithm. In: Proceedings of 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP). 2011, ISBN 978-3-642-24649-4 ( limited preview )
  • M. Braun, U. Meyer, S. Wetzel: Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures (Award for Most Innovative Technology-Related Paper). In: 4th International IFIP WG 11.2 Workshop for Information Security Theory and Practices (WISTP). 2010, ISBN 978-3-642-12368-9 , pp. 122-137 ( limited preview )
  • J. Cordasco, S. Wetzel: An Attacker Model for MANET Routing Security. In: 2nd ACM Conference on Wireless Network Security (WiSec). 2009, pp. 87-94.
  • W. Backes, S. Wetzel: Parallel Lattice Basis Reduction using a Multi-Threaded Schnorr-Euchner LLL Algorithm. In: 15th International European Conference on Parallel and Distributed Computing (Euro-Par). 2009, ISBN 978-3-642-03869-3 , pp. 960–973 ( limited preview )
  • M. Jakobsson, L. Yang, S. Wetzel: Quantifying the Security of Preference-based Authentication. In: ACM CCS 2008 Workshop on Digital Identity Management (DIM). 2008, pp. 61-69.
  • M. Jakobsson, E. Stolterman, S. Wetzel, L. Yang: "Love and Authentication", ACM Computer / Human Interaction Conference (CHI). 2008.
  • U. Meyer, S. Wetzel, S. Ioannidis: Distributed Privacy-Preserving Policy Reconciliation. In: IEEE International Conference on Communications (ICC). 2007, pp. 1342-1349.
  • W. Backes, S. Wetzel: An Efficient LLL Gram Using Buffered Transformations. In: 10th International Workshop on Computer Algebra in Scientific Computing (CASC). Jumper. 2007, ISBN 978-3-540-75186-1 , pp. 31–44 ( limited preview )
  • U. Meyer, S. Wetzel: Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover. In: 3rd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec). 2006, pp. 277-282.

Web links

Individual evidence

  1. ^ Gudrun Susanne Wetzel: Lattice Basis Reduction Algorithms and their Applications. Dissertation . Shaker, Aachen 1998, ISBN 3-8265-4543-5 .
  2. ^ Website of Susanne Wetzel at the Stevens Institute of Technology (SIT) in Hoboken (New Jersey)
  3. Cybersecurity Conference Speaker Profiles . In: NYIT
  4. ^ Profile of Susanne Wetzel in the "Information Security Research and Education" project
  5. ACM CCS 2017 Panel Discussion . In: ACM 2017.