• 577 Citations
  • 13 h-Index
20062019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 577 Citations
  • 13 h-Index
  • 25 Conference contribution
  • 12 Article
  • 1 Paper
Article

A construction of short sequences containing all permutations of a set as subsequences

Radomirović, S., 22 Nov 2012, In : Electronic Journal of Combinatorics. 19, 4, p. 1-11 11 p., 31.

Research output: Contribution to journalArticle

Open Access
File
6 Citations (Scopus)
53 Downloads (Pure)

A framework for compositional verification of security protocols

Andova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S. F. & Radomirović, S., 2008, In : Information and Computation. 206, 2-4, p. 425-459 35 p.

Research output: Contribution to journalArticle

Open Access
File
39 Citations (Scopus)
131 Downloads (Pure)

Attack-defense trees

Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., Feb 2014, In : Journal of Logic and Computation. 24, 1, p. 55-87 33 p.

Research output: Contribution to journalArticle

70 Citations (Scopus)

Attacks on RFID Protocols

van Deursen, T. & Radomirović, S., 6 Aug 2009, In : Cryptology ePrint Archive. 2008, 310, p. 1-56 56 p.

Research output: Contribution to journalArticle

Open Access
File
19 Downloads (Pure)

Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks

Ceelen, P., Mauw, S. & Radomirović, S., 22 Feb 2008, In : Electronic Notes in Theoretical Computer Science. 197, 2, p. 31-43 13 p.

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
143 Downloads (Pure)

Force Open: Lightweight black box file repair

Wust, K., Tsankov, P., Radomirovic, S. & Dashti, M. T., Mar 2017, In : Digital Investigation. 20, Suppl., p. S75-S82 8 p.

Research output: Contribution to journalArticle

Open Access
File
167 Downloads (Pure)

Improving the Security of Cryptographic Protocol Standards

Basin, D., Cremers, C., Miyazaki, K., Radomirović, S. & Watanabe, D., 2015, In : IEEE Security and Privacy. 13, 3, p. 24-31 8 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

On a new formal proof model for RFID location privacy

van Deursen, T. & Radomirović, S., 16 Dec 2009, In : Information Processing Letters. 110, 2, p. 57-61 5 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Restricted walks in regular trees

Ciobanu, L. & Radomirović, S., 27 Oct 2006, In : Electronic Journal of Combinatorics. 13, p. 1-18 18 p., R93.

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
49 Downloads (Pure)

Security of RFID Protocols - A Case Study

van Deursen, T. & Radomirović, S., 1 Aug 2009, In : Electronic Notes in Theoretical Computer Science. 244, p. 41-52 12 p.

Research output: Contribution to journalArticle

Open Access
File
23 Citations (Scopus)
120 Downloads (Pure)

Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC

van Deursen, T. & Radomirović, S., 8 Jul 2009, In : Cryptology ePrint Archive. 2009, 332, p. 1-8 8 p.

Research output: Contribution to journalArticle

Open Access
File
19 Downloads (Pure)

Verification of Stateful Cryptographic Protocols with Exclusive OR

Dreier, J., Hirschi, L., Radomirović, S. & Sasse, R., 13 Nov 2019, In : Journal of Computer Security. 34 p.

Research output: Contribution to journalArticle

Open Access
File
82 Downloads (Pure)
Conference contribution

A Complete Characterization of Secure Human-Server Communication

Basin, D., Radomirović, S. & Schläepfer, M., 2015, 2015 IEEE 28th Computer Security Foundations Symposium, CSF 2015: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 199-213 15 p. (Proceedings of the IEEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
12 Citations (Scopus)
179 Downloads (Pure)

A Formal Analysis of 5G Authentication

Basin, D., Dreier, J., Hirschi, L., Radomirović, S., Sasse, R. & Stettler, V., 8 Oct 2018, 25th ACM Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 2018. p. 1383-1396 21 p. 745

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
43 Citations (Scopus)
175 Downloads (Pure)

Alethea: A Provably Secure Random Sample Voting Protocol

Basin, D., Radomirović, S. & Schmid, L., 9 Aug 2018, Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018. IEEE, p. 283-297 15 p. 8429312

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
7 Citations (Scopus)
160 Downloads (Pure)

Algebraic Attacks on RFID Protocols

van Deursen, T. & Radomirović, S., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIPWG 11.2 International Workshop, WISTP2009 Brussels, Belgium, September 1-4, 2009. Proceedings. Markowitch, O., Bilas, A., Hoepman, J-H., Mitchell, C. J. & Quisquater, J-J. (eds.). Berlin: Springer Verlag, p. 38-51 14 p. (Lecture Notes in Computer Science ; vol. 5746 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

Alice and Bob Meet Equational Theories

Basin, D., Keller, M., Radomirović, S. & Sasse, R., 2015, Logic, Rewriting and Concurrency : Essays Dedicated to Jose Meseguer on the Occasion of His 65th Birthday. Martí-Oliet, N., Csaba Ölveczky, P. & Talcott, C. (eds.). Switzerland: Springer International Publishing, p. 160-180 21 p. (Lecture Notes in Computer Science ; vol. 9200).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

An Anti-Pattern for Misuse Cases

Dashti, M. T. & Radomirović, S., 2018, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinodakis, C., Kalloniatis, C., Mylopoulos, J., Anton, A. & Gritzalis, S. (eds.). Switzerland: Springer , Vol. 10683. p. 250-261 12 p. (Lecture Notes in Computer Science; vol. 10683).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
275 Downloads (Pure)

Attack Trees with Sequential Conjunction

Jhawar, R., Kordy, B., Mauw, S., Radomirović, S. & Trujillo-Rasua, R., 2015, ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015 Hamburg, Germany, May 26–28, 2015 Proceedings. Federrath, H. & Gollmann, D. (eds.). Switzerland: Springer International Publishing, p. 339-353 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Citations (Scopus)

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

Dreier, J., Hirschi, L., Radomirović, S. & Sasse, R., 7 Aug 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF). 31st ed. IEEE, p. 359-373 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
15 Citations (Scopus)
190 Downloads (Pure)

Constructing Optimistic Multi-party Contract Signing Protocols

Kordy, B. & Radomirović, S., 2012, 2012 IEEE 25th Computer Security Foundations Symposium, CSF 2012 : Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 215-229 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
5 Citations (Scopus)
141 Downloads (Pure)

Contextual Biometric-Based Authentication for Ubiquitous Services

Buhan, I., Lenzini, G. & Radomirović, S., 2010, Ubiquitous Intelligence and Computing : 7th International Conference, UIC 2010 Xi’an, China, October 26-29, 2010 Proceedings. Yu, Z., Liscano, R., Chen, G., Zhang, D. & Zhou, X. (eds.). Berlin: Springer Verlag, p. 680-693 14 p. (Lecture Notes in Computer Science ; vol. 6406 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Derailing Attacks

Radomirovíc, S. & Dashti, M. T., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 41-46 6 p. (Lecture Notes in Computer Science ; vol. 9379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

EC-RAC: Enriching a Capacious RFID Attack Collection

van Deursen, T. & Radomirović, S., 2010, Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010 Istanbul, Turkey, June 8-9, 2010 Revised Selected Papers. Berna, S. & Yalcin, O. (eds.). Berlin: Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science ; vol. 6370 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Foundations of Attack–Defense Trees

Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., 2011, Formal Aspects of Security and Trust : 7th International Workshop, FAST 2010, Revised Selected Papers. Degano, P., Etalle, S. & Guttman, J. (eds.). Berlin: Springer Verlag, p. 80-95 16 p. (Lecture Notes in Computer Science ; vol. 6561).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

99 Citations (Scopus)

Generalizing multi-party contract signing

Mauw, S. & Radomirović, S., 2015, Principles of Security and Trust: 4th International Conference, POST 2015 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015 London, UK, April 11–18, 2015 Proceedings. Focardi, R. & Myers, A. (eds.). Berlin: Springer Verlag, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Guided Specification and Analysis of a Loyalty Card System

Cuennet, L., Pouly, M. & Radomirović, S., 2016, Graphical Models for Security: Second International Workshop, GraMSec 2015 Verona, Italy, July 13, 2015 Revised Selected Papers. Mauw, S., Kordy, B. & Jajodia, S. (eds.). Springer International Publishing, p. 66-81 16 p. (Lecture Notes in Computer Science; vol. 9390).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Insider Attacks and Privacy of RFID Protocols

Van Deursen, T. & Radomirović, S., 2012, Public Key Infrastructures, Services, and Applications: 8th European Workshop, EuroPKI 2011 Leuven, Belgium, September 15-16, 2011 Revised Selected Papers. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Berlin: Springer Verlag, p. 91-105 15 p. (Lecture Notes in Computer Science ; vol. 7163 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Location-Private Interstellar Communication

Jonker, H., Mauw, S. & Radomirović, S., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 105-115 11 p. (Lecture Notes in Computer Science ; vol. 9379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

mCarve: Carving Attributed Dump Sets

van Deursen, T., Mauw, S. & Radomirović, S., 2011, Proceedings of the 20th USENIX Security Symposium. United States: USENIX Association, p. 107-121 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
11 Downloads (Pure)

Minimal Message Complexity of Asynchronous Multi-party Contract Signing

Mauw, S., Radomirović, S. & Dashti, M. T., 2009, Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, 8-10 July 2009 / Port Jefferson, New York, USA. Los Alamitos: IEEE Computer Society, p. 13-25 13 p. (Proceedings of the IEEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
14 Citations (Scopus)
135 Downloads (Pure)

Modeling human errors in security protocols

Basin, D., Radomirovic, S. & Schmid, L., 2016, IEEE 29th Computer Security Foundations Symposium CSF 2016: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 325-340 16 p. (Proceedings of the IEEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
13 Citations (Scopus)
162 Downloads (Pure)

Secure Ownership and Ownership Transfer in RFID Systems

van Deursen, T., Mauw, S., Radomirović, S. & Vullers, P., 2009, Computer Security - ESORICS 2009 : 14th European Symposium on Research in Computer Security Saint-Malo, France, September 21-23, 2009. Proceedings. Backes, M. & Ning, P. (eds.). Berlin: Springer Verlag, p. 637-654 18 p. (Lecture Notes in Computer Science ; vol. 5789 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Security of an RFID Protocol for Supply Chains

van Deursen, T. & Radomirović, S., 2008, Proceedings of the ICEBE 2008 IEEE International Conference on e-Business Engineering; AiR 2008 IEEE International Workshop on Advances in RFID; EM2I 2008 IEEE International Workshop on E-Marketplace Integration and Interoperability; SOAIC 2008 IEEE International Workshop on Service-Oriented Applications, Integration and Collaboration; SOKM 2008 IEEE International Workshop on Service-Oriented Knowledge Management; BIMA 2008 IEEE International Workshop on Business Intelligence Methodologies and Applications; DKEEE 2008 IEEE International Workshop on Data and Knowledge Engineering for E-service and E-business, October 22-24, 2008 Xi’an, China . Chung, J-Y. & Younas, M. (eds.). Piscataway: Institute of Electrical and Electronics Engineers, p. 568-573 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
15 Citations (Scopus)
162 Downloads (Pure)

Security protocols for secret Santa

Mauw, S., Radomirović, S. & Ryan, P. Y. A., 2014, Security Protocols XVIII : 18th International Workshop Cambridge, UK, March 24-26, 2010 Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 175-184 10 p. (Lecture Notes in Computer Science ; vol. 7061).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Towards a Decision Model Based on Trust and Security Risk Management

Alcade, B., Dubois, E., Mauw, S., Mayer, N. & Radomirović, S., 2009, Information Security 2009: Proceedings of the Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009. Brankovic, L. & Susilo, W. (eds.). Sydney: Australian Computer Society, p. 61-69 9 p. (Conferences in Research and Practice in Information Technology; vol. 98).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Untraceability of RFID Protocols

van Deursen, T., Mauw, S. & Radomirović, S., 2008, Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008 Seville, Spain, May 13-16, 2008. Proceedings. Onieva, J. A., Sauveron, D., Chaumette, S., Gollmann, D. & Markantonakis, K. (eds.). Berlin: Springer Verlag, p. 1-15 15 p. (Lecture Notes in Computer Science ; vol. 5019 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

49 Citations (Scopus)
Paper

An example of proving UC-realization with formal methods

Andova, S., Gjøsteen, K., Kråkmo, L., Mjølsnes, S. F. & Radomirović, S., 9 Jul 2006, p. 46-54. 9 p.

Research output: Contribution to conferencePaper

Open Access
File
18 Downloads (Pure)