False data injection attacks against state estimation in electric power grids Y Liu, P Ning, MK Reiter ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011 | 3331 | 2011 |
Crowds: Anonymity for web transactions MK Reiter, AD Rubin ACM Transactions on Information and System Security 1 (1), 66-92, 1998 | 2881 | 1998 |
Stealing machine learning models via prediction APIs F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart 25th USENIX Security Symposium (USENIX Security 16), 601-618, 2016 | 1663 | 2016 |
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition M Sharif, S Bhagavatula, L Bauer, MK Reiter Proceedings of the 2016 ACM Conference on Computer and Communications …, 2016 | 1532 | 2016 |
The design and analysis of graphical passwords IH Jermyn, A Mayer, F Monrose, MK Reiter, AD Rubin USENIX Association, 1999 | 1173 | 1999 |
Cross-VM side channels and their use to extract private keys Y Zhang, A Juels, MK Reiter, T Ristenpart Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1002 | 2012 |
Flicker: An execution infrastructure for TCB minimization JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008 | 982 | 2008 |
Byzantine quorum systems D Malkhi, M Reiter Distributed Computing 11 (4), 203-213, 1998 | 931 | 1998 |
The design and implementation of a secure auction service MK Franklin, MK Reiter IEEE Transactions on Software Engineering 22 (5), 302-312, 1996 | 912* | 1996 |
HotStuff: BFT consensus with linearity and responsiveness M Yin, D Malkhi, MK Reiter, GG Gueta, I Abraham Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing …, 2019 | 806* | 2019 |
Seeing-is-believing: Using camera phones for human-verifiable authentication JM McCune, A Perrig, MK Reiter 2005 IEEE Symposium on Security and Privacy (S&P'05), 110-124, 2005 | 755 | 2005 |
Password hardening based on keystroke dynamics F Monrose, MK Reiter, S Wetzel International journal of Information security 1 (2), 69-83, 2002 | 746 | 2002 |
On user choice in graphical password schemes D Davis, F Monrose, MK Reiter USENIX Security Symposium 13 (2004), 11-11, 2004 | 737 | 2004 |
Design and implementation of a consolidated middlebox architecture V Sekar, N Egi, S Ratnasamy, MK Reiter, G Shi 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12 …, 2012 | 708 | 2012 |
Cryptographic key generation from voice F Monrose, MK Reiter, Q Li, S Wetzel Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000 | 553 | 2000 |
Fault-scalable Byzantine fault-tolerant services M Abd-El-Malek, GR Ganger, GR Goodson, MK Reiter, JJ Wylie ACM SIGOPS Operating Systems Review 39 (5), 59-74, 2005 | 535 | 2005 |
HomeAlone: Co-residency detection in the cloud via side-channel analysis Y Zhang, A Juels, A Oprea, MK Reiter 2011 IEEE symposium on security and privacy, 313-328, 2011 | 484 | 2011 |
Fair exchange with a semi-trusted third party MK Franklin, MK Reiter Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 473 | 1997 |
Cross-tenant side-channel attacks in PaaS clouds Y Zhang, A Juels, MK Reiter, T Ristenpart Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 460 | 2014 |
Anonymous web transactions with Crowds MK Reiter, AD Rubin Communications of the ACM 42 (2), 32-48, 1999 | 448 | 1999 |