Radomirovic, Sasa

Dr

Calculated based on number of publications stored in Pure and citations from Scopus
20062020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2018

    A Formal Analysis of 5G Authentication

    Basin, D., Dreier, J., Hirschi, L., Radomirović, S., Sasse, R. & Stettler, V., 8 Oct 2018, 25th ACM Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 2018. p. 1383-1396 21 p. 745

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    186 Citations (Scopus)
    253 Downloads (Pure)
  • Alethea: A Provably Secure Random Sample Voting Protocol

    Basin, D., Radomirović, S. & Schmid, L., 9 Aug 2018, Proceedings - IEEE 31st Computer Security Foundations Symposium, CSF 2018. IEEE, p. 283-297 15 p. 8429312

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    17 Citations (Scopus)
    301 Downloads (Pure)
  • An Anti-Pattern for Misuse Cases

    Dashti, M. T. & Radomirović, S., 2018, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Katsikas, S. K., Cuppens, F., Cuppens, N., Lambrinodakis, C., Kalloniatis, C., Mylopoulos, J., Anton, A. & Gritzalis, S. (eds.). Switzerland: Springer , Vol. 10683. p. 250-261 12 p. (Lecture Notes in Computer Science; vol. 10683).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    334 Downloads (Pure)
  • Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

    Dreier, J., Hirschi, L., Radomirović, S. & Sasse, R., 7 Aug 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF). 31st ed. IEEE, p. 359-373 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    32 Citations (Scopus)
    218 Downloads (Pure)
  • 2016

    Guided Specification and Analysis of a Loyalty Card System

    Cuennet, L., Pouly, M. & Radomirović, S., 2016, Graphical Models for Security: Second International Workshop, GraMSec 2015 Verona, Italy, July 13, 2015 Revised Selected Papers. Mauw, S., Kordy, B. & Jajodia, S. (eds.). Springer International Publishing, p. 66-81 16 p. (Lecture Notes in Computer Science; vol. 9390).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling human errors in security protocols

    Basin, D., Radomirovic, S. & Schmid, L., 2016, IEEE 29th Computer Security Foundations Symposium CSF 2016: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 325-340 16 p. (Proceedings of the IEEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    27 Citations (Scopus)
    299 Downloads (Pure)
  • 2015

    A Complete Characterization of Secure Human-Server Communication

    Basin, D., Radomirović, S. & Schläepfer, M., 2015, 2015 IEEE 28th Computer Security Foundations Symposium, CSF 2015: Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 199-213 15 p. (Proceedings of the IEEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    18 Citations (Scopus)
    233 Downloads (Pure)
  • Alice and Bob Meet Equational Theories

    Basin, D., Keller, M., Radomirović, S. & Sasse, R., 2015, Logic, Rewriting and Concurrency : Essays Dedicated to Jose Meseguer on the Occasion of His 65th Birthday. Martí-Oliet, N., Csaba Ölveczky, P. & Talcott, C. (eds.). Switzerland: Springer International Publishing, p. 160-180 21 p. (Lecture Notes in Computer Science ; vol. 9200).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Attack Trees with Sequential Conjunction

    Jhawar, R., Kordy, B., Mauw, S., Radomirović, S. & Trujillo-Rasua, R., 2015, ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015 Hamburg, Germany, May 26–28, 2015 Proceedings. Federrath, H. & Gollmann, D. (eds.). Switzerland: Springer International Publishing, p. 339-353 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    66 Citations (Scopus)
  • Derailing Attacks

    Radomirovíc, S. & Dashti, M. T., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 41-46 6 p. (Lecture Notes in Computer Science ; vol. 9379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Generalizing multi-party contract signing

    Mauw, S. & Radomirović, S., 2015, Principles of Security and Trust: 4th International Conference, POST 2015 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015 London, UK, April 11–18, 2015 Proceedings. Focardi, R. & Myers, A. (eds.). Berlin: Springer Verlag, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 9036).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Location-Private Interstellar Communication

    Jonker, H., Mauw, S. & Radomirović, S., 2015, Security Protocols XXIII : 23rd International Workshop Cambridge, UK, March 31 – April 2, 2015 Revised Selected Papers. Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F. & Anderson, J. (eds.). Switzerland: Springer International Publishing, p. 105-115 11 p. (Lecture Notes in Computer Science ; vol. 9379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Security protocols for secret Santa

    Mauw, S., Radomirović, S. & Ryan, P. Y. A., 2014, Security Protocols XVIII : 18th International Workshop Cambridge, UK, March 24-26, 2010 Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 175-184 10 p. (Lecture Notes in Computer Science ; vol. 7061).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2012

    Constructing Optimistic Multi-party Contract Signing Protocols

    Kordy, B. & Radomirović, S., 2012, 2012 IEEE 25th Computer Security Foundations Symposium, CSF 2012 : Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 215-229 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    7 Citations (Scopus)
    203 Downloads (Pure)
  • Insider Attacks and Privacy of RFID Protocols

    Van Deursen, T. & Radomirović, S., 2012, Public Key Infrastructures, Services, and Applications: 8th European Workshop, EuroPKI 2011 Leuven, Belgium, September 15-16, 2011 Revised Selected Papers. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Berlin: Springer Verlag, p. 91-105 15 p. (Lecture Notes in Computer Science ; vol. 7163 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2011

    Foundations of Attack–Defense Trees

    Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., 2011, Formal Aspects of Security and Trust : 7th International Workshop, FAST 2010, Revised Selected Papers. Degano, P., Etalle, S. & Guttman, J. (eds.). Berlin: Springer Verlag, p. 80-95 16 p. (Lecture Notes in Computer Science ; vol. 6561).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    146 Citations (Scopus)
  • mCarve: Carving Attributed Dump Sets

    van Deursen, T., Mauw, S. & Radomirović, S., 2011, Proceedings of the 20th USENIX Security Symposium. United States: USENIX Association, p. 107-121 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    16 Downloads (Pure)
  • 2010

    Contextual Biometric-Based Authentication for Ubiquitous Services

    Buhan, I., Lenzini, G. & Radomirović, S., 2010, Ubiquitous Intelligence and Computing : 7th International Conference, UIC 2010 Xi’an, China, October 26-29, 2010 Proceedings. Yu, Z., Liscano, R., Chen, G., Zhang, D. & Zhou, X. (eds.). Berlin: Springer Verlag, p. 680-693 14 p. (Lecture Notes in Computer Science ; vol. 6406 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • EC-RAC: Enriching a Capacious RFID Attack Collection

    van Deursen, T. & Radomirović, S., 2010, Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010 Istanbul, Turkey, June 8-9, 2010 Revised Selected Papers. Berna, S. & Yalcin, O. (eds.). Berlin: Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science ; vol. 6370 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • 2009

    Algebraic Attacks on RFID Protocols

    van Deursen, T. & Radomirović, S., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIPWG 11.2 International Workshop, WISTP2009 Brussels, Belgium, September 1-4, 2009. Proceedings. Markowitch, O., Bilas, A., Hoepman, J-H., Mitchell, C. J. & Quisquater, J-J. (eds.). Berlin: Springer Verlag, p. 38-51 14 p. (Lecture Notes in Computer Science ; vol. 5746 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Minimal Message Complexity of Asynchronous Multi-party Contract Signing

    Mauw, S., Radomirović, S. & Dashti, M. T., 2009, Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, 8-10 July 2009 / Port Jefferson, New York, USA. Los Alamitos: IEEE Computer Society, p. 13-25 13 p. (Proceedings of the IEEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    19 Citations (Scopus)
    242 Downloads (Pure)
  • Secure Ownership and Ownership Transfer in RFID Systems

    van Deursen, T., Mauw, S., Radomirović, S. & Vullers, P., 2009, Computer Security - ESORICS 2009 : 14th European Symposium on Research in Computer Security Saint-Malo, France, September 21-23, 2009. Proceedings. Backes, M. & Ning, P. (eds.). Berlin: Springer Verlag, p. 637-654 18 p. (Lecture Notes in Computer Science ; vol. 5789 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Citations (Scopus)
  • Towards a Decision Model Based on Trust and Security Risk Management

    Alcade, B., Dubois, E., Mauw, S., Mayer, N. & Radomirović, S., 2009, Information Security 2009: Proceedings of the Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009. Brankovic, L. & Susilo, W. (eds.). Sydney: Australian Computer Society, p. 61-69 9 p. (Conferences in Research and Practice in Information Technology; vol. 98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2008

    Security of an RFID Protocol for Supply Chains

    van Deursen, T. & Radomirović, S., 2008, Proceedings of the ICEBE 2008 IEEE International Conference on e-Business Engineering; AiR 2008 IEEE International Workshop on Advances in RFID; EM2I 2008 IEEE International Workshop on E-Marketplace Integration and Interoperability; SOAIC 2008 IEEE International Workshop on Service-Oriented Applications, Integration and Collaboration; SOKM 2008 IEEE International Workshop on Service-Oriented Knowledge Management; BIMA 2008 IEEE International Workshop on Business Intelligence Methodologies and Applications; DKEEE 2008 IEEE International Workshop on Data and Knowledge Engineering for E-service and E-business, October 22-24, 2008 Xi’an, China . Chung, J-Y. & Younas, M. (eds.). Piscataway: Institute of Electrical and Electronics Engineers, p. 568-573 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    15 Citations (Scopus)
    207 Downloads (Pure)
  • Untraceability of RFID Protocols

    van Deursen, T., Mauw, S. & Radomirović, S., 2008, Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008 Seville, Spain, May 13-16, 2008. Proceedings. Onieva, J. A., Sauveron, D., Chaumette, S., Gollmann, D. & Markantonakis, K. (eds.). Berlin: Springer Verlag, p. 1-15 15 p. (Lecture Notes in Computer Science ; vol. 5019 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Citations (Scopus)