Follow
PD Dr. Zinaida Benenson
PD Dr. Zinaida Benenson
Head of Human Factors in Security and Privacy Group, University of Erlangen-Nuremberg
Verified email at fau.de - Homepage
Title
Cited by
Cited by
Year
Tampering with motes: Real-world physical attacks on wireless sensor networks
A Becher, Z Benenson, M Dornseif
Security in Pervasive Computing: Third International Conference, SPC 2006 …, 2006
3662006
Realizing robust user authentication in sensor networks
Z Benenson, N Gedicke, O Raivio
Real-World Wireless Sensor Networks (REALWSN) 14 (52), 1-5, 2005
2072005
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
1502009
Unpacking spear phishing susceptibility
Z Benenson, F Gassmann, R Landwirth
Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017
902017
User authentication in sensor networks
Z Benenson, F Gärtner, D Kesdogan
Informatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung …, 2004
892004
Specifying IT security awareness
N Hänsch, Z Benenson
2014 25th International workshop on database and expert systems applications …, 2014
832014
Android and iOS users' differences concerning security and privacy
Z Benenson, F Gassmann, L Reinfelder
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 817-822, 2013
772013
Insecure to the touch: Attacking ZigBee 3.0 via touchlink commissioning
P Morgner, S Mattejat, Z Benenson, C Müller, F Armknecht
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
702017
All your bulbs are belong to us: Investigating the current state of security in connected lighting systems
P Morgner, S Mattejat, Z Benenson
arXiv preprint arXiv:1608.03732, 2016
682016
Vulnerabilities and attacks in wireless sensor networks
Z Benenson, PM Cholewinski, FC Freiling
Wireless Sensors Networks Security 1, 22-43, 2008
572008
TrustedPals: Secure multiparty computation implemented with smart cards
M Fort, F Freiling, LD Penso, Z Benenson, D Kesdogan
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
562006
Security update labels: establishing economic incentives for security patching of IoT consumer products
P Morgner, C Mai, N Koschate-Fischer, F Freiling, Z Benenson
2020 IEEE Symposium on Security and Privacy (SP), 429-446, 2020
492020
Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective.
G Pugliese, C Riess, F Gassmann, Z Benenson
Proc. Priv. Enhancing Technol. 2020 (2), 558-577, 2020
462020
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
Z Benenson, A Girard, I Krontiris
WEIS, 2015
432015
Differences between Android and iPhone users in their security and privacy awareness
L Reinfelder, Z Benenson, F Gassmann
Trust, Privacy, and Security in Digital Business: 11th International …, 2014
402014
Authenticated query flooding in sensor networks
Z Benenson, FC Freiling, E Hammerschmidt, S Lucks, L Pimenidis
Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006
382006
Security managers are not the enemy either
L Reinfelder, R Landwirth, Z Benenson
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
312019
An algorithmic framework for robust access control in wireless sensor networks
Z Benenson, FC Gartner, D Kesdogan
Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005
312005
Privacy implications of room climate data
P Morgner, C Müller, M Ring, B Eskofier, C Riess, F Armknecht, ...
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
302017
Maybe poor johnny really cannot encrypt: The case for a complexity theory for usable security
Z Benenson, G Lenzini, D Oliveira, S Parkin, S Uebelacker
Proceedings of the 2015 New Security Paradigms Workshop, 85-99, 2015
302015
The system can't perform the operation now. Try again later.
Articles 1–20