Zinaida Benenson
Zinaida Benenson
Human Factors in Security and Privacy Group, University of Erlangen-Nuremberg
Verified email at fau.de - Homepage
Cited by
Cited by
Tampering with motes: Real-world physical attacks on wireless sensor networks
A Becher, Z Benenson, M Dornseif
International Conference on Security in Pervasive Computing, 104-118, 2006
Realizing robust user authentication in sensor networks
Z Benenson, N Gedicke, O Raivio
Real-World Wireless Sensor Networks (REALWSN) 14, 52, 2005
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
European Conference on Wireless Sensor Networks, 263-278, 2009
User authentication in sensor networks
Z Benenson, F Gärtner, D Kesdogan
Informatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung …, 2004
Android and iOS users' differences concerning security and privacy
Z Benenson, F Gassmann, L Reinfelder
CHI'13 Extended Abstracts on Human Factors in Computing Systems, 817-822, 2013
Vulnerabilities and attacks in wireless sensor networks
Z Benenson, PM Cholewinski, FC Freiling
Wireless Sensors Networks Security 1, 22-43, 2008
Specifying IT security awareness
N Hänsch, Z Benenson
2014 25th International Workshop on Database and Expert Systems Applications …, 2014
TrustedPals: Secure multiparty computation implemented with smart cards
M Fort, F Freiling, LD Penso, Z Benenson, D Kesdogan
European Symposium on Research in Computer Security, 34-48, 2006
Unpacking spear phishing susceptibility
Z Benenson, F Gassmann, R Landwirth
International conference on financial cryptography and data security, 610-627, 2017
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning
P Morgner, S Mattejat, Z Benenson, C Müller, F Armknecht
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
All your bulbs are belong to us: Investigating the current state of security in connected lighting systems
P Morgner, S Mattejat, Z Benenson
arXiv preprint arXiv:1608.03732, 2016
Authenticated query flooding in sensor networks
Z Benenson, FC Freiling, E Hammerschmidt, S Lucks, L Pimenidis
IFIP International Information Security Conference, 38-49, 2006
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
Z Benenson, A Girard, I Krontiris
WEIS, 2015
An algorithmic framework for robust access control in wireless sensor networks
Z Benenson, FC Gartner, D Kesdogan
Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005
Differences between Android and iPhone users in their security and privacy awareness
L Reinfelder, Z Benenson, F Gassmann
International Conference on Trust, Privacy and Security in Digital Business …, 2014
Topology-based clusterhead candidate selection in wireless ad-hoc and sensor networks
MR Brust, A Andronache, S Rothkugel, Z Benenson
2007 2nd International Conference on Communication Systems Software and …, 2007
User acceptance of privacy-abcs: An exploratory study
Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou
International conference on human aspects of information security, privacy …, 2014
Maybe poor johnny really cannot encrypt: The case for a complexity theory for usable security
Z Benenson, G Lenzini, D Oliveira, S Parkin, S Uebelacker
Proceedings of the 2015 New Security Paradigms Workshop, 85-99, 2015
Attitudes to IT security when using a smartphone
Z Benenson, O Kroll-Peters, M Krupp
2012 Federated Conference on Computer Science and Information Systems …, 2012
Wireless sensors networks security
Z Benenson, PM Cholewinski, FC Freiling
Vulnerabilities and Attacks in Wireless Sensor Networks, 22-43, 2008
The system can't perform the operation now. Try again later.
Articles 1–20