20062021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • A Complete Characterization of Secure Human-Server Communication

    Basin, D., Radomirović, S. & Schläepfer, M., 7 Sep 2015, 2015 IEEE 28th Computer Security Foundations Symposium. IEEE, p. 199-213 15 p. (Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    15 Citations (Scopus)
    18 Downloads (Pure)
  • A formal analysis of 5g authentication

    Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R. & Stettler, V., Oct 2018, CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1383-1396 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    104 Citations (Scopus)
    16 Downloads (Pure)
  • Alethea: A provably secure random sample voting protocol

    Basin, D., Radomirovic, S. & Schmid, L., 9 Aug 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, p. 283-297 15 p. (IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    12 Citations (Scopus)
    8 Downloads (Pure)
  • Algebraic attacks on RFID protocols

    van Deursen, T. & Radomirović, S., 2009, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: WISTP 2009. Springer, p. 38-51 14 p. (Lecture Notes in Computer Science; vol. 5746).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Alice and Bob meet equational theories

    Basin, D., Keller, M., Radomirović, S. & Sasse, R., 2015, Logic, Rewriting and Concurrency. Ölveczky, P. C., Talcott, C. & Martí-Oliet, N. (eds.). Springer, p. 160-180 21 p. (Lecture Notes in Computer Science; vol. 9200).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An Anti-pattern for Misuse Cases

    Torabi Dashti, M. & Radomirović, S., 2018, Computer Security. SECPRE 2017, CyberICPS 2017. Springer, p. 250-261 12 p. (Lecture Notes in Computer Science; vol. 10683).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    4 Downloads (Pure)
  • Attack trees with sequential conjunction

    Jhawar, R., Kordy, B., Mauw, S., Radomirović, S. & Trujillo-Rasua, R., 2015, ICT Systems Security and Privacy Protection: SEC 2015. Federrath, H. & Gollmann, D. (eds.). Springer, p. 339-353 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Citations (Scopus)
  • Automated unbounded verification of stateful cryptographic protocols with exclusive OR

    Dreier, J., Hirschi, L., Radomirovic, S. & Sasse, R., 9 Aug 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, p. 359-373 15 p. (IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    20 Citations (Scopus)
    7 Downloads (Pure)
  • Constructing optimistic multi-party contract signing protocols

    Kordy, B. & Radomirović, S., 13 Aug 2012, 2012 IEEE 25th Computer Security Foundations Symposium. IEEE, p. 215-229 15 p. (Proceedings of the Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Contextual biometric-based authentication for ubiquitous services

    Buhan, I., Lenzini, G. & Radomirović, S., 2010, Ubiquitous Intelligence and Computing: UIC 2010. Yu, Z., Zhou, X., Liscano, R., Zhang, D. & Chen, G. (eds.). Springer, p. 680-693 14 p. (Lecture Notes in Computer Science; vol. 6406).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Derailing attacks

    Radomirovíc, S. & Dashti, M. T., 2015, Security Protocols XXIII. Stajano, F., Anderson, J., Christianson, B., Malcolm, J., Švenda, P. & Matyáš, V. (eds.). Springer, p. 41-46 6 p. (Lecture Notes in Computer Science; vol. 9379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Dispute Resolution in Voting

    Basin, D., Radomirovic, S. & Schmid, L., 4 Aug 2020, 2020 IEEE 33rd Computer Security Foundations Symposium (CSF). IEEE, 9155114. (IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    9 Downloads (Pure)
  • EC-RAC: Enriching a capacious RFID attack collection

    van Deursen, T. & Radomirović, S., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Springer, p. 75-90 16 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Foundations of attack-defense trees

    Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., 2011, Formal Aspects of Security and Trust: FAST 2010. Springer, p. 80-95 16 p. (Lecture Notes in Computer Science; vol. 6561).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    127 Citations (Scopus)
  • Generalizing multi-party contract signing

    Mauw, S. & Radomirović, S., 2015, Principles of Security and Trust: POST 2015. Focardi, R. & Myers, A. (eds.). Springer, p. 156-175 20 p. (Lecture Notes in Computer Science; vol. 9036).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Guided specification and analysis of a loyalty card system

    Cuennet, L., Pouly, M. & Radomirović, S., 2016, GraMSec 2015: Graphical Models for Security. Mauw, S., Kordy, B. & Jajodia, S. (eds.). Vol. 9390. p. 66-81 16 p. (Lecture Notes in Computer Science; vol. 9390).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Insider attacks and privacy of RFID protocols

    van Deursen, T. & Radomirović, S., 2012, Public Key Infrastructures, Services, and Applications. EuroPKI 2011. Springer, p. 91-105 15 p. (Lecture Notes in Computer Science; vol. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Location-private interstellar communication

    Jonker, H., Mauw, S. & Radomirović, S., 2015, Security Protocols XXIII. Stajano, F., Anderson, J., Christianson, B., Malcolm, J., Švenda, P. & Matyáš, V. (eds.). Springer, p. 105-115 11 p. (Lecture Notes in Computer Science; vol. 9379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • MCarve: Carving attributed dump sets

    van Deursen, T., Mauw, S. & Radomirović, S., 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 107-121 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Minimal message complexity of asynchronous multi-party contract signing

    Mauw, S., Radomirović, S. & Dashti, M. T., 4 Sep 2009, 2009 22nd IEEE Computer Security Foundations Symposium. IEEE, p. 13-25 13 p. (IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Modeling human errors in security protocols

    Basin, D., Radomirovic, S. & Schmid, L., 11 Aug 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF). IEEE, p. 325-340 6 p. (IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    20 Citations (Scopus)
    10 Downloads (Pure)
  • Secure ownership and ownership transfer in RFID systems

    van Deursen, T., Mauw, S., Radomirović, S. & Vullers, P., 2009, Computer Security - ESORICS 2009. Springer, p. 637-654 18 p. (Lecture Notes in Computer Science; vol. 5789).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Security of an RFID protocol for supply chains

    van Deursen, T. & Radomirović, S., 2 Dec 2008, 2008 IEEE International Conference on e-Business Engineering. IEEE, p. 568-573 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Security protocols for secret Santa

    Mauw, S., Radomirović, S. & Ryan, P. Y. A., 2014, Security Protocols XVIII. Christianson, B. & Malcolm, J. (eds.). Springer, p. 175-184 10 p. (Lecture Notes in Computer Science; vol. 7061).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Shaping our mental model of security

    Radomirović, S., 2020, Security Protocols XXVII. Security Protocols 2019. Anderson, J., Stajano, F., Christianson, B. & Matyáš, V. (eds.). Springer, p. 51-59 9 p. (Lecture Notes in Computer Science; vol. 12287).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    11 Downloads (Pure)
  • Untraceability of RFID protocols

    van Deursen, T., Mauw, S. & Radomirović, S., 2008, Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: WISTP 2008. Springer, p. 1-15 15 p. (Lecture Notes in Computer Science; vol. 5019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Citations (Scopus)
  • User account access graphs

    Hammann, S., Radomirović, S., Sasse, R. & Basin, D., 6 Nov 2019, CCS 2019: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1405-1422 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Verifying Table-Based Elections

    Basin, D., Dreier, J., Giampietro, S. & Radomirovic, S., 12 Nov 2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2632–2652 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    3 Downloads (Pure)