Tampering with motes: Real-world physical attacks on wireless sensor networks A Becher, Z Benenson, M Dornseif International Conference on Security in Pervasive Computing, 104-118, 2006 | 337 | 2006 |
Realizing robust user authentication in sensor networks Z Benenson, N Gedicke, O Raivio Real-World Wireless Sensor Networks (REALWSN) 14, 52, 2005 | 198 | 2005 |
Cooperative intrusion detection in wireless sensor networks I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou European Conference on Wireless Sensor Networks, 263-278, 2009 | 138 | 2009 |
User authentication in sensor networks Z Benenson, F Gärtner, D Kesdogan Informatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung …, 2004 | 84 | 2004 |
Vulnerabilities and attacks in wireless sensor networks Z Benenson, PM Cholewinski, FC Freiling Wireless Sensors Networks Security, 22-43, 2008 | 54 | 2008 |
Android and iOS users' differences concerning security and privacy Z Benenson, F Gassmann, L Reinfelder CHI'13 Extended Abstracts on Human Factors in Computing Systems, 817-822, 2013 | 52 | 2013 |
TrustedPals: Secure multiparty computation implemented with smart cards M Fort, F Freiling, LD Penso, Z Benenson, D Kesdogan European Symposium on Research in Computer Security, 34-48, 2006 | 51 | 2006 |
Specifying IT security awareness N Hänsch, Z Benenson 2014 25th International Workshop on Database and Expert Systems Applications …, 2014 | 48 | 2014 |
Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning P Morgner, S Mattejat, Z Benenson, C Müller, F Armknecht Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 39 | 2017 |
Authenticated query flooding in sensor networks Z Benenson, FC Freiling, E Hammerschmidt, S Lucks, L Pimenidis IFIP International Information Security Conference, 38-49, 2006 | 38 | 2006 |
Unpacking spear phishing susceptibility Z Benenson, F Gassmann, R Landwirth International Conference on Financial Cryptography and Data Security, 610-627, 2017 | 35 | 2017 |
All your bulbs are belong to us: Investigating the current state of security in connected lighting systems P Morgner, S Mattejat, Z Benenson arXiv preprint arXiv:1608.03732, 2016 | 35 | 2016 |
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. Z Benenson, A Girard, I Krontiris WEIS, 2015 | 32 | 2015 |
An algorithmic framework for robust access control in wireless sensor networks Z Benenson, FC Gartner, D Kesdogan Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005 | 30 | 2005 |
Topology-based clusterhead candidate selection in wireless ad-hoc and sensor networks MR Brust, A Andronache, S Rothkugel, Z Benenson 2007 2nd International Conference on Communication Systems Software and …, 2007 | 29 | 2007 |
User acceptance of privacy-abcs: An exploratory study Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou International conference on human aspects of information security, privacy …, 2014 | 24 | 2014 |
Differences between Android and iPhone users in their security and privacy awareness L Reinfelder, Z Benenson, F Gassmann International Conference on Trust, Privacy and Security in Digital Business …, 2014 | 23 | 2014 |
Attitudes to IT security when using a smartphone Z Benenson, O Kroll-Peters, M Krupp 2012 Federated Conference on Computer Science and Information Systems …, 2012 | 18 | 2012 |
Wireless sensors networks security Z Benenson, PM Cholewinski, FC Freiling Vulnerabilities and Attacks in Wireless Sensor Networks, 22-43, 2008 | 17 | 2008 |
Maybe poor johnny really cannot encrypt: The case for a complexity theory for usable security Z Benenson, G Lenzini, D Oliveira, S Parkin, S Uebelacker Proceedings of the 2015 New Security Paradigms Workshop, 85-99, 2015 | 15 | 2015 |