• 554 Citations
  • 13 h-Index
20062019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 554 Citations
  • 13 h-Index
  • 25 Conference contribution
  • 12 Article
  • 1 Paper
Filter
Conference contribution
2018

A Formal Analysis of 5G Authentication

Basin, D., Dreier, J., Hirschi, L., Radomirović, S., Sasse, R. & Stettler, V., 8 Oct 2018, 25th ACM Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 2018. p. 1383-1396 21 p. 745

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
39 Citations (Scopus)
162 Downloads (Pure)

Alethea: A Provably Secure Random Sample Voting Protocol

Basin, D., Radomirović, S. & Schmid, L., 9 Aug 2018, Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018. IEEE, p. 283-297 15 p. 8429312

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
143 Downloads (Pure)

An Anti-Pattern for Misuse Cases

Dashti, M. T. & Radomirović, S., 2018, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinodakis, C., Kalloniatis, C., Mylopoulos, J., Anton, A. & Gritzalis, S. (eds.). Switzerland: Springer , Vol. 10683. p. 250-261 12 p. (Lecture Notes in Computer Science; vol. 10683).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
266 Downloads (Pure)

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

Dreier, J., Hirschi, L., Radomirović, S. & Sasse, R., 7 Aug 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF). 31st ed. IEEE, p. 359-373 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
13 Citations (Scopus)
168 Downloads (Pure)
2016

Guided Specification and Analysis of a Loyalty Card System

Cuennet, L., Pouly, M. & Radomirović, S., 2016, Graphical Models for Security: Second International Workshop, GraMSec 2015 Verona, Italy, July 13, 2015 Revised Selected Papers. Mauw, S., Kordy, B. & Jajodia, S. (eds.). Springer International Publishing, p. 66-81 16 p. (Lecture Notes in Computer Science; vol. 9390).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modeling human errors in security protocols

Basin, D., Radomirovic, S. & Schmid, L., 2016, IEEE 29th Computer Security Foundations Symposium CSF 2016: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 325-340 16 p. (Proceedings of the IEEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
11 Citations (Scopus)
153 Downloads (Pure)
2015

A Complete Characterization of Secure Human-Server Communication

Basin, D., Radomirović, S. & Schläepfer, M., 2015, 2015 IEEE 28th Computer Security Foundations Symposium, CSF 2015: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 199-213 15 p. (Proceedings of the IEEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
11 Citations (Scopus)
169 Downloads (Pure)

Alice and Bob Meet Equational Theories

Basin, D., Keller, M., Radomirović, S. & Sasse, R., 2015, Logic, Rewriting and Concurrency : Essays Dedicated to Jose Meseguer on the Occasion of His 65th Birthday. Martí-Oliet, N., Csaba Ölveczky, P. & Talcott, C. (eds.). Switzerland: Springer International Publishing, p. 160-180 21 p. (Lecture Notes in Computer Science ; vol. 9200).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Attack Trees with Sequential Conjunction

Jhawar, R., Kordy, B., Mauw, S., Radomirović, S. & Trujillo-Rasua, R., 2015, ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015 Hamburg, Germany, May 26–28, 2015 Proceedings. Federrath, H. & Gollmann, D. (eds.). Switzerland: Springer International Publishing, p. 339-353 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Derailing Attacks

Radomirovíc, S. & Dashti, M. T., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 41-46 6 p. (Lecture Notes in Computer Science ; vol. 9379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Generalizing multi-party contract signing

Mauw, S. & Radomirović, S., 2015, Principles of Security and Trust: 4th International Conference, POST 2015 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015 London, UK, April 11–18, 2015 Proceedings. Focardi, R. & Myers, A. (eds.). Berlin: Springer Verlag, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Location-Private Interstellar Communication

Jonker, H., Mauw, S. & Radomirović, S., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 105-115 11 p. (Lecture Notes in Computer Science ; vol. 9379).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Security protocols for secret Santa

Mauw, S., Radomirović, S. & Ryan, P. Y. A., 2014, Security Protocols XVIII : 18th International Workshop Cambridge, UK, March 24-26, 2010 Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 175-184 10 p. (Lecture Notes in Computer Science ; vol. 7061).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2012

Constructing Optimistic Multi-party Contract Signing Protocols

Kordy, B. & Radomirović, S., 2012, 2012 IEEE 25th Computer Security Foundations Symposium, CSF 2012 : Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 215-229 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
5 Citations (Scopus)
130 Downloads (Pure)

Insider Attacks and Privacy of RFID Protocols

Van Deursen, T. & Radomirović, S., 2012, Public Key Infrastructures, Services, and Applications: 8th European Workshop, EuroPKI 2011 Leuven, Belgium, September 15-16, 2011 Revised Selected Papers. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Berlin: Springer Verlag, p. 91-105 15 p. (Lecture Notes in Computer Science ; vol. 7163 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2011

Foundations of Attack–Defense Trees

Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., 2011, Formal Aspects of Security and Trust : 7th International Workshop, FAST 2010, Revised Selected Papers. Degano, P., Etalle, S. & Guttman, J. (eds.). Berlin: Springer Verlag, p. 80-95 16 p. (Lecture Notes in Computer Science ; vol. 6561).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

97 Citations (Scopus)

mCarve: Carving Attributed Dump Sets

van Deursen, T., Mauw, S. & Radomirović, S., 2011, Proceedings of the 20th USENIX Security Symposium. United States: USENIX Association, p. 107-121 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
11 Downloads (Pure)
2010

Contextual Biometric-Based Authentication for Ubiquitous Services

Buhan, I., Lenzini, G. & Radomirović, S., 2010, Ubiquitous Intelligence and Computing : 7th International Conference, UIC 2010 Xi’an, China, October 26-29, 2010 Proceedings. Yu, Z., Liscano, R., Chen, G., Zhang, D. & Zhou, X. (eds.). Berlin: Springer Verlag, p. 680-693 14 p. (Lecture Notes in Computer Science ; vol. 6406 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

EC-RAC: Enriching a Capacious RFID Attack Collection

van Deursen, T. & Radomirović, S., 2010, Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010 Istanbul, Turkey, June 8-9, 2010 Revised Selected Papers. Berna, S. & Yalcin, O. (eds.). Berlin: Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science ; vol. 6370 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)
2009

Algebraic Attacks on RFID Protocols

van Deursen, T. & Radomirović, S., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIPWG 11.2 International Workshop, WISTP2009 Brussels, Belgium, September 1-4, 2009. Proceedings. Markowitch, O., Bilas, A., Hoepman, J-H., Mitchell, C. J. & Quisquater, J-J. (eds.). Berlin: Springer Verlag, p. 38-51 14 p. (Lecture Notes in Computer Science ; vol. 5746 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

Minimal Message Complexity of Asynchronous Multi-party Contract Signing

Mauw, S., Radomirović, S. & Dashti, M. T., 2009, Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, 8-10 July 2009 / Port Jefferson, New York, USA. Los Alamitos: IEEE Computer Society, p. 13-25 13 p. (Proceedings of the IEEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
14 Citations (Scopus)
130 Downloads (Pure)

Secure Ownership and Ownership Transfer in RFID Systems

van Deursen, T., Mauw, S., Radomirović, S. & Vullers, P., 2009, Computer Security - ESORICS 2009 : 14th European Symposium on Research in Computer Security Saint-Malo, France, September 21-23, 2009. Proceedings. Backes, M. & Ning, P. (eds.). Berlin: Springer Verlag, p. 637-654 18 p. (Lecture Notes in Computer Science ; vol. 5789 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Towards a Decision Model Based on Trust and Security Risk Management

Alcade, B., Dubois, E., Mauw, S., Mayer, N. & Radomirović, S., 2009, Information Security 2009: Proceedings of the Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009. Brankovic, L. & Susilo, W. (eds.). Sydney: Australian Computer Society, p. 61-69 9 p. (Conferences in Research and Practice in Information Technology; vol. 98).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2008

Security of an RFID Protocol for Supply Chains

van Deursen, T. & Radomirović, S., 2008, Proceedings of the ICEBE 2008 IEEE International Conference on e-Business Engineering; AiR 2008 IEEE International Workshop on Advances in RFID; EM2I 2008 IEEE International Workshop on E-Marketplace Integration and Interoperability; SOAIC 2008 IEEE International Workshop on Service-Oriented Applications, Integration and Collaboration; SOKM 2008 IEEE International Workshop on Service-Oriented Knowledge Management; BIMA 2008 IEEE International Workshop on Business Intelligence Methodologies and Applications; DKEEE 2008 IEEE International Workshop on Data and Knowledge Engineering for E-service and E-business, October 22-24, 2008 Xi’an, China . Chung, J-Y. & Younas, M. (eds.). Piscataway: Institute of Electrical and Electronics Engineers, p. 568-573 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
15 Citations (Scopus)
156 Downloads (Pure)

Untraceability of RFID Protocols

van Deursen, T., Mauw, S. & Radomirović, S., 2008, Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008 Seville, Spain, May 13-16, 2008. Proceedings. Onieva, J. A., Sauveron, D., Chaumette, S., Gollmann, D. & Markantonakis, K. (eds.). Berlin: Springer Verlag, p. 1-15 15 p. (Lecture Notes in Computer Science ; vol. 5019 ).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

48 Citations (Scopus)