Radomirovic, Sasa

Dr

Calculated based on number of publications stored in Pure and citations from Scopus
20062020

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2020

    Verification of Stateful Cryptographic Protocols with Exclusive OR

    Dreier, J., Hirschi, L., Radomirović, S. & Sasse, R., 4 Feb 2020, In: Journal of Computer Security. 28, 1, 34 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    326 Downloads (Pure)
  • 2018

    A Formal Analysis of 5G Authentication

    Basin, D., Dreier, J., Hirschi, L., Radomirović, S., Sasse, R. & Stettler, V., 8 Oct 2018, 25th ACM Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 2018. p. 1383-1396 21 p. 745

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    186 Citations (Scopus)
    253 Downloads (Pure)
  • Alethea: A Provably Secure Random Sample Voting Protocol

    Basin, D., Radomirović, S. & Schmid, L., 9 Aug 2018, Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018. IEEE, p. 283-297 15 p. 8429312

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    17 Citations (Scopus)
    301 Downloads (Pure)
  • An Anti-Pattern for Misuse Cases

    Dashti, M. T. & Radomirović, S., 2018, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinodakis, C., Kalloniatis, C., Mylopoulos, J., Anton, A. & Gritzalis, S. (eds.). Switzerland: Springer , Vol. 10683. p. 250-261 12 p. (Lecture Notes in Computer Science; vol. 10683).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    334 Downloads (Pure)
  • Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

    Dreier, J., Hirschi, L., Radomirović, S. & Sasse, R., 7 Aug 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF). 31st ed. IEEE, p. 359-373 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    32 Citations (Scopus)
    218 Downloads (Pure)
  • 2017

    Force Open: Lightweight black box file repair

    Wust, K., Tsankov, P., Radomirovic, S. & Dashti, M. T., Mar 2017, In: Digital Investigation. 20, Suppl., p. S75-S82 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    183 Downloads (Pure)
  • 2016

    Guided Specification and Analysis of a Loyalty Card System

    Cuennet, L., Pouly, M. & Radomirović, S., 2016, Graphical Models for Security: Second International Workshop, GraMSec 2015 Verona, Italy, July 13, 2015 Revised Selected Papers. Mauw, S., Kordy, B. & Jajodia, S. (eds.). Springer International Publishing, p. 66-81 16 p. (Lecture Notes in Computer Science; vol. 9390).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling human errors in security protocols

    Basin, D., Radomirovic, S. & Schmid, L., 2016, IEEE 29th Computer Security Foundations Symposium CSF 2016: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 325-340 16 p. (Proceedings of the IEEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    27 Citations (Scopus)
    299 Downloads (Pure)
  • 2015

    A Complete Characterization of Secure Human-Server Communication

    Basin, D., Radomirović, S. & Schläepfer, M., 2015, 2015 IEEE 28th Computer Security Foundations Symposium, CSF 2015: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 199-213 15 p. (Proceedings of the IEEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    18 Citations (Scopus)
    233 Downloads (Pure)
  • Alice and Bob Meet Equational Theories

    Basin, D., Keller, M., Radomirović, S. & Sasse, R., 2015, Logic, Rewriting and Concurrency : Essays Dedicated to Jose Meseguer on the Occasion of His 65th Birthday. Martí-Oliet, N., Csaba Ölveczky, P. & Talcott, C. (eds.). Switzerland: Springer International Publishing, p. 160-180 21 p. (Lecture Notes in Computer Science ; vol. 9200).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Attack Trees with Sequential Conjunction

    Jhawar, R., Kordy, B., Mauw, S., Radomirović, S. & Trujillo-Rasua, R., 2015, ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015 Hamburg, Germany, May 26–28, 2015 Proceedings. Federrath, H. & Gollmann, D. (eds.). Switzerland: Springer International Publishing, p. 339-353 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    66 Citations (Scopus)
  • Derailing Attacks

    Radomirovíc, S. & Dashti, M. T., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 41-46 6 p. (Lecture Notes in Computer Science ; vol. 9379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Generalizing multi-party contract signing

    Mauw, S. & Radomirović, S., 2015, Principles of Security and Trust: 4th International Conference, POST 2015 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015 London, UK, April 11–18, 2015 Proceedings. Focardi, R. & Myers, A. (eds.). Berlin: Springer Verlag, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 9036).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Improving the Security of Cryptographic Protocol Standards

    Basin, D., Cremers, C., Miyazaki, K., Radomirović, S. & Watanabe, D., 2015, In: IEEE Security and Privacy. 13, 3, p. 24-31 8 p.

    Research output: Contribution to journalArticlepeer-review

    17 Citations (Scopus)
  • Location-Private Interstellar Communication

    Jonker, H., Mauw, S. & Radomirović, S., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 105-115 11 p. (Lecture Notes in Computer Science ; vol. 9379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Attack-defense trees

    Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., Feb 2014, In: Journal of Logic and Computation. 24, 1, p. 55-87 33 p.

    Research output: Contribution to journalArticlepeer-review

    96 Citations (Scopus)
  • Security protocols for secret Santa

    Mauw, S., Radomirović, S. & Ryan, P. Y. A., 2014, Security Protocols XVIII : 18th International Workshop Cambridge, UK, March 24-26, 2010 Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 175-184 10 p. (Lecture Notes in Computer Science ; vol. 7061).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2012

    A construction of short sequences containing all permutations of a set as subsequences

    Radomirović, S., 22 Nov 2012, In: Electronic Journal of Combinatorics. 19, 4, p. 1-11 11 p., 31.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    12 Citations (Scopus)
    70 Downloads (Pure)
  • Constructing Optimistic Multi-party Contract Signing Protocols

    Kordy, B. & Radomirović, S., 2012, 2012 IEEE 25th Computer Security Foundations Symposium, CSF 2012 : Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 215-229 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    7 Citations (Scopus)
    203 Downloads (Pure)
  • Insider Attacks and Privacy of RFID Protocols

    Van Deursen, T. & Radomirović, S., 2012, Public Key Infrastructures, Services, and Applications: 8th European Workshop, EuroPKI 2011 Leuven, Belgium, September 15-16, 2011 Revised Selected Papers. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Berlin: Springer Verlag, p. 91-105 15 p. (Lecture Notes in Computer Science ; vol. 7163 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2011

    Foundations of Attack–Defense Trees

    Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., 2011, Formal Aspects of Security and Trust : 7th International Workshop, FAST 2010, Revised Selected Papers. Degano, P., Etalle, S. & Guttman, J. (eds.). Berlin: Springer Verlag, p. 80-95 16 p. (Lecture Notes in Computer Science ; vol. 6561).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    146 Citations (Scopus)
  • mCarve: Carving Attributed Dump Sets

    van Deursen, T., Mauw, S. & Radomirović, S., 2011, Proceedings of the 20th USENIX Security Symposium. United States: USENIX Association, p. 107-121 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    16 Downloads (Pure)
  • 2010

    Contextual Biometric-Based Authentication for Ubiquitous Services

    Buhan, I., Lenzini, G. & Radomirović, S., 2010, Ubiquitous Intelligence and Computing : 7th International Conference, UIC 2010 Xi’an, China, October 26-29, 2010 Proceedings. Yu, Z., Liscano, R., Chen, G., Zhang, D. & Zhou, X. (eds.). Berlin: Springer Verlag, p. 680-693 14 p. (Lecture Notes in Computer Science ; vol. 6406 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • EC-RAC: Enriching a Capacious RFID Attack Collection

    van Deursen, T. & Radomirović, S., 2010, Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010 Istanbul, Turkey, June 8-9, 2010 Revised Selected Papers. Berna, S. & Yalcin, O. (eds.). Berlin: Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science ; vol. 6370 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • 2009

    Algebraic Attacks on RFID Protocols

    van Deursen, T. & Radomirović, S., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIPWG 11.2 International Workshop, WISTP2009 Brussels, Belgium, September 1-4, 2009. Proceedings. Markowitch, O., Bilas, A., Hoepman, J-H., Mitchell, C. J. & Quisquater, J-J. (eds.). Berlin: Springer Verlag, p. 38-51 14 p. (Lecture Notes in Computer Science ; vol. 5746 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Attacks on RFID Protocols

    van Deursen, T. & Radomirović, S., 6 Aug 2009, In: Cryptology ePrint Archive. 2008, 310, p. 1-56 56 p.

    Research output: Contribution to journalArticle

    Open Access
    File
    138 Downloads (Pure)
  • Minimal Message Complexity of Asynchronous Multi-party Contract Signing

    Mauw, S., Radomirović, S. & Dashti, M. T., 2009, Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, 8-10 July 2009 / Port Jefferson, New York, USA. Los Alamitos: IEEE Computer Society, p. 13-25 13 p. (Proceedings of the IEEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    19 Citations (Scopus)
    242 Downloads (Pure)
  • On a new formal proof model for RFID location privacy

    van Deursen, T. & Radomirović, S., 16 Dec 2009, In: Information Processing Letters. 110, 2, p. 57-61 5 p.

    Research output: Contribution to journalArticlepeer-review

    11 Citations (Scopus)
  • Secure Ownership and Ownership Transfer in RFID Systems

    van Deursen, T., Mauw, S., Radomirović, S. & Vullers, P., 2009, Computer Security - ESORICS 2009 : 14th European Symposium on Research in Computer Security Saint-Malo, France, September 21-23, 2009. Proceedings. Backes, M. & Ning, P. (eds.). Berlin: Springer Verlag, p. 637-654 18 p. (Lecture Notes in Computer Science ; vol. 5789 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Citations (Scopus)
  • Security of RFID Protocols - A Case Study

    van Deursen, T. & Radomirović, S., 1 Aug 2009, In: Electronic Notes in Theoretical Computer Science. 244, p. 41-52 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    23 Citations (Scopus)
    121 Downloads (Pure)
  • Towards a Decision Model Based on Trust and Security Risk Management

    Alcade, B., Dubois, E., Mauw, S., Mayer, N. & Radomirović, S., 2009, Information Security 2009: Proceedings of the Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009. Brankovic, L. & Susilo, W. (eds.). Sydney: Australian Computer Society, p. 61-69 9 p. (Conferences in Research and Practice in Information Technology; vol. 98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC

    van Deursen, T. & Radomirović, S., 8 Jul 2009, In: Cryptology ePrint Archive. 2009, 332, p. 1-8 8 p.

    Research output: Contribution to journalArticle

    Open Access
    File
    33 Downloads (Pure)
  • 2008

    A framework for compositional verification of security protocols

    Andova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S. F. & Radomirović, S., 2008, In: Information and Computation. 206, 2-4, p. 425-459 35 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    41 Citations (Scopus)
    148 Downloads (Pure)
  • Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks

    Ceelen, P., Mauw, S. & Radomirović, S., 22 Feb 2008, In: Electronic Notes in Theoretical Computer Science. 197, 2, p. 31-43 13 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    4 Citations (Scopus)
    154 Downloads (Pure)
  • Security of an RFID Protocol for Supply Chains

    van Deursen, T. & Radomirović, S., 2008, Proceedings of the ICEBE 2008 IEEE International Conference on e-Business Engineering; AiR 2008 IEEE International Workshop on Advances in RFID; EM2I 2008 IEEE International Workshop on E-Marketplace Integration and Interoperability; SOAIC 2008 IEEE International Workshop on Service-Oriented Applications, Integration and Collaboration; SOKM 2008 IEEE International Workshop on Service-Oriented Knowledge Management; BIMA 2008 IEEE International Workshop on Business Intelligence Methodologies and Applications; DKEEE 2008 IEEE International Workshop on Data and Knowledge Engineering for E-service and E-business, October 22-24, 2008 Xi’an, China . Chung, J-Y. & Younas, M. (eds.). Piscataway: Institute of Electrical and Electronics Engineers, p. 568-573 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    15 Citations (Scopus)
    207 Downloads (Pure)
  • Untraceability of RFID Protocols

    van Deursen, T., Mauw, S. & Radomirović, S., 2008, Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008 Seville, Spain, May 13-16, 2008. Proceedings. Onieva, J. A., Sauveron, D., Chaumette, S., Gollmann, D. & Markantonakis, K. (eds.). Berlin: Springer Verlag, p. 1-15 15 p. (Lecture Notes in Computer Science ; vol. 5019 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Citations (Scopus)
  • 2006

    An example of proving UC-realization with formal methods

    Andova, S., Gjøsteen, K., Kråkmo, L., Mjølsnes, S. F. & Radomirović, S., 9 Jul 2006, p. 46-54. 9 p.

    Research output: Contribution to conferencePaper

    Open Access
    File
    31 Downloads (Pure)
  • Restricted walks in regular trees

    Ciobanu, L. & Radomirović, S., 27 Oct 2006, In: Electronic Journal of Combinatorics. 13, p. 1-18 18 p., R93.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Citation (Scopus)
    82 Downloads (Pure)