2014 - IEEE Fellow For contributions to computer security and fault-tolerant distributed computing
2008 - ACM Fellow For contributions to computer security and fault-tolerant distributed computing.
Michael K. Reiter focuses on Computer security, Server, Distributed computing, Computer network and Cryptography. His study in Computer security focuses on Password, Side channel attack, S/KEY, Password strength and Encryption. The various areas that Michael K. Reiter examines in his Server study include Consistency, Network topology, Protocol and Network data.
In his study, Hash function is strongly linked to Key, which falls under the umbrella field of Distributed computing. His study focuses on the intersection of Computer network and fields such as Software deployment with connections in the field of Implementation, Extensibility, Resource management and Workload. His Cryptography study combines topics in areas such as Graph, Authorization and Linux kernel.
His primary scientific interests are in Computer security, Distributed computing, Computer network, Server and Access control. His study in Cryptography, Public-key cryptography, Password, Key and Authentication is carried out as part of his Computer security studies. His Distributed computing research includes themes of Scalability and Software deployment.
His research integrates issues of Consistency and Fault tolerance, Replication, State machine replication in his study of Server. The Access control study combines topics in areas such as User interface and Internet privacy. His Byzantine fault tolerance study integrates concerns from other disciplines, such as Protocol and Asynchronous communication.
Michael K. Reiter mostly deals with Computer security, Computer network, Cloud computing, Artificial intelligence and Scalability. His multidisciplinary approach integrates Computer security and Corruption in his work. His work carried out in the field of Computer network brings together such families of science as Virtual machine and Communication complexity.
The concepts of his Cloud computing study are interwoven with issues in World Wide Web, Server, Software and Risk analysis. In his study, Malware is inextricably linked to Machine learning, which falls within the broad field of Artificial intelligence. His Scalability research is multidisciplinary, incorporating perspectives in Byzantine fault tolerance and Protocol.
His scientific interests lie mostly in Artificial neural network, Distributed computing, Computer security, Scalability and Robustness. His study in Artificial neural network is interdisciplinary in nature, drawing from both Adversary and Facial recognition system. His Distributed computing research is multidisciplinary, relying on both Gremlin, Traffic engineering and Microservices.
His Computer security research incorporates themes from Software framework, Software and Face detection. He has researched Scalability in several fields, including Network management, Optimization problem and Heuristics. In his research on the topic of Robustness, Classifier and Theoretical computer science is strongly related with Adversarial system.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
False data injection attacks against state estimation in electric power grids
Yao Liu;Peng Ning;Michael K. Reiter.
ACM Transactions on Information and System Security (2011)
Crowds: anonymity for Web transactions
Michael K. Reiter;Aviel D. Rubin.
ACM Transactions on Information and System Security (1998)
False data injection attacks against state estimation in electric power grids
Yao Liu;Peng Ning;Michael K. Reiter.
computer and communications security (2009)
The design and analysis of graphical passwords
Ian Jermyn;Alain Mayer;Fabian Monrose;Michael K. Reiter.
usenix security symposium (1999)
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
Mahmood Sharif;Sruti Bhagavatula;Lujo Bauer;Michael K. Reiter.
computer and communications security (2016)
Stealing machine learning models via prediction APIs
Florian Tramèr;Fan Zhang;Ari Juels;Michael K. Reiter.
usenix security symposium (2016)
Cross-VM side channels and their use to extract private keys
Yinqian Zhang;Ari Juels;Michael K. Reiter;Thomas Ristenpart.
computer and communications security (2012)
Flicker: an execution infrastructure for tcb minimization
Jonathan M. McCune;Bryan J. Parno;Adrian Perrig;Michael K. Reiter.
european conference on computer systems (2008)
Byzantine quorum systems
Dahlia Malkhi;Michael Reiter.
Distributed Computing (1998)
Seeing-is-believing: using camera phones for human-verifiable authentication
J.M. McCune;A. Perrig;M.K. Reiter.
ieee symposium on security and privacy (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Carnegie Mellon University
Diem Association
Carnegie Mellon University
Carnegie Mellon University
University of North Carolina at Chapel Hill
Carnegie Mellon University
Google (United States)
University of California, Davis
National University of Singapore
University of California, Berkeley
École Polytechnique Fédérale de Lausanne
Hefei University of Technology
Northwestern University
Chinese Academy of Sciences
McGill University
California Institute of Technology
National Institutes of Health
RMIT University
Kumamoto University
Howard Hughes Medical Institute
University of California, Los Angeles
Florida State University
Tehran University of Medical Sciences
Brigham Young University
Yale University
University of Twente