• 554 Citations
  • 13 h-Index
20062019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 554 Citations
  • 13 h-Index
  • 25 Conference contribution
  • 12 Article
  • 1 Paper
Filter
Article
2019

Verification of Stateful Cryptographic Protocols with Exclusive OR

Dreier, J., Hirschi, L., Radomirović, S. & Sasse, R., 13 Nov 2019, In : Journal of Computer Security. 34 p.

Research output: Contribution to journalArticle

Open Access
File
72 Downloads (Pure)
2017

Force Open: Lightweight black box file repair

Wust, K., Tsankov, P., Radomirovic, S. & Dashti, M. T., Mar 2017, In : Digital Investigation. 20, Suppl., p. S75-S82 8 p.

Research output: Contribution to journalArticle

Open Access
File
159 Downloads (Pure)
2015

Improving the Security of Cryptographic Protocol Standards

Basin, D., Cremers, C., Miyazaki, K., Radomirović, S. & Watanabe, D., 2015, In : IEEE Security and Privacy. 13, 3, p. 24-31 8 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)
2014

Attack-defense trees

Kordy, B., Mauw, S., Radomirović, S. & Schweitzer, P., Feb 2014, In : Journal of Logic and Computation. 24, 1, p. 55-87 33 p.

Research output: Contribution to journalArticle

66 Citations (Scopus)
2012

A construction of short sequences containing all permutations of a set as subsequences

Radomirović, S., 22 Nov 2012, In : Electronic Journal of Combinatorics. 19, 4, p. 1-11 11 p., 31.

Research output: Contribution to journalArticle

Open Access
File
5 Citations (Scopus)
52 Downloads (Pure)
2009

Attacks on RFID Protocols

van Deursen, T. & Radomirović, S., 6 Aug 2009, In : Cryptology ePrint Archive. 2008, 310, p. 1-56 56 p.

Research output: Contribution to journalArticle

Open Access
File
19 Downloads (Pure)

On a new formal proof model for RFID location privacy

van Deursen, T. & Radomirović, S., 16 Dec 2009, In : Information Processing Letters. 110, 2, p. 57-61 5 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Security of RFID Protocols - A Case Study

van Deursen, T. & Radomirović, S., 1 Aug 2009, In : Electronic Notes in Theoretical Computer Science. 244, p. 41-52 12 p.

Research output: Contribution to journalArticle

Open Access
File
23 Citations (Scopus)
114 Downloads (Pure)

Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC

van Deursen, T. & Radomirović, S., 8 Jul 2009, In : Cryptology ePrint Archive. 2009, 332, p. 1-8 8 p.

Research output: Contribution to journalArticle

Open Access
File
18 Downloads (Pure)
2008

A framework for compositional verification of security protocols

Andova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S. F. & Radomirović, S., 2008, In : Information and Computation. 206, 2-4, p. 425-459 35 p.

Research output: Contribution to journalArticle

Open Access
File
39 Citations (Scopus)
123 Downloads (Pure)

Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks

Ceelen, P., Mauw, S. & Radomirović, S., 22 Feb 2008, In : Electronic Notes in Theoretical Computer Science. 197, 2, p. 31-43 13 p.

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
137 Downloads (Pure)
2006

Restricted walks in regular trees

Ciobanu, L. & Radomirović, S., 27 Oct 2006, In : Electronic Journal of Combinatorics. 13, p. 1-18 18 p., R93.

Research output: Contribution to journalArticle

Open Access
File
49 Downloads (Pure)