Tampering with motes: Real-world physical attacks on wireless sensor networks A Becher, Z Benenson, M Dornseif Security in Pervasive Computing: Third International Conference, SPC 2006 …, 2006 | 372 | 2006 |
Realizing robust user authentication in sensor networks Z Benenson, N Gedicke, O Raivio Real-World Wireless Sensor Networks (REALWSN) 14 (52), 1-5, 2005 | 207 | 2005 |
Cooperative intrusion detection in wireless sensor networks I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009 | 150 | 2009 |
Unpacking spear phishing susceptibility Z Benenson, F Gassmann, R Landwirth Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 100 | 2017 |
Specifying IT security awareness N Hänsch, Z Benenson 2014 25th International workshop on database and expert systems applications …, 2014 | 99 | 2014 |
User authentication in sensor networks Z Benenson, F Gärtner, D Kesdogan Gesellschaft für Informatik eV, 2004 | 90 | 2004 |
Android and iOS users' differences concerning security and privacy Z Benenson, F Gassmann, L Reinfelder CHI'13 Extended Abstracts on Human Factors in Computing Systems, 817-822, 2013 | 80 | 2013 |
Insecure to the touch: Attacking ZigBee 3.0 via touchlink commissioning P Morgner, S Mattejat, Z Benenson, C Müller, F Armknecht Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017 | 77 | 2017 |
All your bulbs are belong to us: Investigating the current state of security in connected lighting systems P Morgner, S Mattejat, Z Benenson arXiv preprint arXiv:1608.03732, 2016 | 74 | 2016 |
Security update labels: establishing economic incentives for security patching of IoT consumer products P Morgner, C Mai, N Koschate-Fischer, F Freiling, Z Benenson 2020 IEEE Symposium on Security and Privacy (SP), 429-446, 2020 | 61 | 2020 |
TrustedPals: Secure multiparty computation implemented with smart cards M Fort, F Freiling, LD Penso, Z Benenson, D Kesdogan Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 58 | 2006 |
Vulnerabilities and attacks in wireless sensor networks Z Benenson, PM Cholewinski, FC Freiling Wireless Sensors Networks Security 1, 22-43, 2008 | 57 | 2008 |
Long-term observation on browser fingerprinting: Users’ trackability and perspective G Pugliese, C Riess, F Gassmann, Z Benenson Proceedings on Privacy Enhancing Technologies, 2020 | 56 | 2020 |
Differences between Android and iPhone users in their security and privacy awareness L Reinfelder, Z Benenson, F Gassmann Trust, Privacy, and Security in Digital Business: 11th International …, 2014 | 48 | 2014 |
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. Z Benenson, A Girard, I Krontiris WEIS, 2015 | 47 | 2015 |
Security managers are not the enemy either L Reinfelder, R Landwirth, Z Benenson Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 43 | 2019 |
Authenticated query flooding in sensor networks Z Benenson, FC Freiling, E Hammerschmidt, S Lucks, L Pimenidis Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006 | 40 | 2006 |
Privacy implications of room climate data P Morgner, C Müller, M Ring, B Eskofier, C Riess, F Armknecht, ... Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 36 | 2017 |
Maybe poor johnny really cannot encrypt: The case for a complexity theory for usable security Z Benenson, G Lenzini, D Oliveira, S Parkin, S Uebelacker Proceedings of the 2015 New Security Paradigms Workshop, 85-99, 2015 | 33 | 2015 |
An algorithmic framework for robust access control in wireless sensor networks Z Benenson, FC Gartner, D Kesdogan Proceeedings of the Second European Workshop on Wireless Sensor Networks …, 2005 | 33 | 2005 |