2014 - IEEE Fellow For contributions to computer security and fault-tolerant distributed computing
2008 - ACM Fellow For contributions to computer security and fault-tolerant distributed computing.
Michael K. Reiter focuses on Computer security, Server, Distributed computing, Computer network and Cryptography. His study in Computer security focuses on Password, Side channel attack, S/KEY, Password strength and Encryption. The various areas that Michael K. Reiter examines in his Server study include Consistency, Network topology, Protocol and Network data.
In his study, Hash function is strongly linked to Key, which falls under the umbrella field of Distributed computing. His study focuses on the intersection of Computer network and fields such as Software deployment with connections in the field of Implementation, Extensibility, Resource management and Workload. His Cryptography study combines topics in areas such as Graph, Authorization and Linux kernel.
His primary scientific interests are in Computer security, Distributed computing, Computer network, Server and Access control. His study in Cryptography, Public-key cryptography, Password, Key and Authentication is carried out as part of his Computer security studies. His Distributed computing research includes themes of Scalability and Software deployment.
His research integrates issues of Consistency and Fault tolerance, Replication, State machine replication in his study of Server. The Access control study combines topics in areas such as User interface and Internet privacy. His Byzantine fault tolerance study integrates concerns from other disciplines, such as Protocol and Asynchronous communication.
Michael K. Reiter mostly deals with Computer security, Computer network, Cloud computing, Artificial intelligence and Scalability. His multidisciplinary approach integrates Computer security and Corruption in his work. His work carried out in the field of Computer network brings together such families of science as Virtual machine and Communication complexity.
The concepts of his Cloud computing study are interwoven with issues in World Wide Web, Server, Software and Risk analysis. In his study, Malware is inextricably linked to Machine learning, which falls within the broad field of Artificial intelligence. His Scalability research is multidisciplinary, incorporating perspectives in Byzantine fault tolerance and Protocol.
His scientific interests lie mostly in Artificial neural network, Distributed computing, Computer security, Scalability and Robustness. His study in Artificial neural network is interdisciplinary in nature, drawing from both Adversary and Facial recognition system. His Distributed computing research is multidisciplinary, relying on both Gremlin, Traffic engineering and Microservices.
His Computer security research incorporates themes from Software framework, Software and Face detection. He has researched Scalability in several fields, including Network management, Optimization problem and Heuristics. In his research on the topic of Robustness, Classifier and Theoretical computer science is strongly related with Adversarial system.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Crowds: anonymity for Web transactions
Michael K. Reiter;Aviel D. Rubin.
ACM Transactions on Information and System Security (1998)
False data injection attacks against state estimation in electric power grids
Yao Liu;Peng Ning;Michael K. Reiter.
ACM Transactions on Information and System Security (2011)
The design and analysis of graphical passwords
Ian Jermyn;Alain Mayer;Fabian Monrose;Michael K. Reiter.
usenix security symposium (1999)
Flicker: an execution infrastructure for tcb minimization
Jonathan M. McCune;Bryan J. Parno;Adrian Perrig;Michael K. Reiter.
european conference on computer systems (2008)
Byzantine quorum systems
Dahlia Malkhi;Michael Reiter.
Distributed Computing (1998)
Cross-VM side channels and their use to extract private keys
Yinqian Zhang;Ari Juels;Michael K. Reiter;Thomas Ristenpart.
computer and communications security (2012)
Password hardening based on keystroke dynamics
Fabian Monrose;Michael K. Reiter;Susanne Wetzel.
International Journal of Information Security (2002)
Seeing-is-believing: using camera phones for human-verifiable authentication
Jonathan M. McCune;Adrian Perrig;Michael K. Reiter.
ieee symposium on security and privacy (2005)
On user choice in graphical password schemes
Darren Davis;Fabian Monrose;Michael K. Reiter.
usenix security symposium (2004)
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
Mahmood Sharif;Sruti Bhagavatula;Lujo Bauer;Michael K. Reiter.
computer and communications security (2016)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: