Volgen
Sasa Radomirovic
Sasa Radomirovic
Geverifieerd e-mailadres voor surrey.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3232018
Foundations of attack–defense trees
B Kordy, S Mauw, S Radomirović, P Schweitzer
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
3222011
Attack–defense trees
B Kordy, S Mauw, S Radomirović, P Schweitzer
Journal of Logic and Computation 24 (1), 55-87, 2014
1862014
Attacks on RFID protocols
T Van Deursen, S Radomirović
Cryptology ePrint Archive 2008 (310), 1-56, 2009
1252009
Attack trees with sequential conjunction
R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
1012015
Untraceability of RFID protocols
T Van Deursen, S Mauw, S Radomirović
Information Security Theory and Practices. Smart Devices, Convergence and …, 2008
922008
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
842008
Towards a model for security and privacy in the internet of things
S Radomirovic
Proc. First Int’l Workshop on Security of the Internet of Things, 6, 2010
572010
Modeling human errors in security protocols
D Basin, S Radomirovic, L Schmid
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 325-340, 2016
522016
Secure ownership and ownership transfer in RFID systems
T Van Deursen, S Mauw, S Radomirović, P Vullers
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
522009
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018
482018
Algebraic attacks on RFID protocols
T Van Deursen, S Radomirović
Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009
482009
Security of RFID protocols–a case study
T van Deursen, S Radomirović
Electronic Notes in Theoretical Computer Science 244, 41-52, 2009
452009
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
T van Deursen, S Radomirović
Cryptology ePrint Archive 2009 (332), 1-8, 2009
402009
A complete characterization of secure human-server communication
D Basin, S Radomirovic, M Schläepfer
2015 IEEE 28th Computer Security Foundations Symposium, 199-213, 2015
342015
Attacks on RFID protocols
T Deursen, S Radomirovic
IACR EPrint, July, 2008
302008
Improving the security of cryptographic protocol standards
D Basin, C Cremers, K Miyazaki, S Radomirovic, D Watanabe
IEEE Security & Privacy 13 (3), 24-31, 2014
292014
On a new formal proof model for RFID location privacy
T Van Deursen, S Radomirović
Information Processing Letters 110 (2), 57-61, 2009
282009
Security of an RFID protocol for supply chains
T van Deursen, S Radomirovic
2008 IEEE International Conference on e-Business Engineering, 568-573, 2008
272008
Alethea: A provably secure random sample voting protocol
D Basin, S Radomirovic, L Schmid
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 283-297, 2018
262018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20