BibTeX records: Sasa Radomirovic

download as .bib file

@inproceedings{DBLP:conf/esorics/ArnaboldiAKR23,
  author       = {Luca Arnaboldi and
                  David Aspinall and
                  Christina Kolb and
                  Sasa Radomirovic},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Tactics for Account Access Graphs},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {452--470},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_23},
  doi          = {10.1007/978-3-031-51479-1\_23},
  timestamp    = {Thu, 18 Jan 2024 08:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArnaboldiAKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HammannCRSB22,
  author       = {Sven Hammann and
                  Michael Crabb and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  David A. Basin},
  editor       = {Simone D. J. Barbosa and
                  Cliff Lampe and
                  Caroline Appert and
                  David A. Shamma and
                  Steven Mark Drucker and
                  Julie R. Williamson and
                  Koji Yatani},
  title        = {"I'm Surprised So Much Is Connected"},
  booktitle    = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems,
                  New Orleans, LA, USA, 29 April 2022 - 5 May 2022},
  pages        = {620:1--620:13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491102.3502125},
  doi          = {10.1145/3491102.3502125},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HammannCRSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinDGR21,
  author       = {David A. Basin and
                  Jannik Dreier and
                  Sofia Giampietro and
                  Sasa Radomirovic},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Verifying Table-Based Elections},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2632--2652},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484555},
  doi          = {10.1145/3460120.3484555},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinDGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/AbrahamCR21,
  author       = {Melvin Abraham and
                  Michael Crabb and
                  Sasa Radomirovic},
  editor       = {Simon E. Parkin and
                  Luca Vigan{\`{o}}},
  title        = {"I'm Doing the Best {I} Can." - Understanding Technology
                  Literate Older Adults' Account Management Strategies},
  booktitle    = {Socio-Technical Aspects in Security - 11th International Workshop,
                  {STAST} 2021, Virtual Event, October 8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13176},
  pages        = {86--107},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-10183-0\_5},
  doi          = {10.1007/978-3-031-10183-0\_5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/AbrahamCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DreierHRS20,
  author       = {Jannik Dreier and
                  Lucca Hirschi and
                  Sasa Radomirovic and
                  Ralf Sasse},
  title        = {Verification of stateful cryptographic protocols with exclusive {OR}},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {1--34},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191358},
  doi          = {10.3233/JCS-191358},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DreierHRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS20,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Dispute Resolution in Voting},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00009},
  doi          = {10.1109/CSF49147.2020.00009},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03749,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Dispute Resolution in Voting},
  journal      = {CoRR},
  volume       = {abs/2005.03749},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03749},
  eprinttype    = {arXiv},
  eprint       = {2005.03749},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HammannRSB19,
  author       = {Sven Hammann and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  David A. Basin},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {User Account Access Graphs},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1405--1422},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354193},
  doi          = {10.1145/3319535.3354193},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HammannRSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Radomirovic19,
  author       = {Sasa Radomirovic},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Shaping Our Mental Model of Security},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {51--59},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_5},
  doi          = {10.1007/978-3-030-57043-9\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Radomirovic19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Radomirovic19a,
  author       = {Sasa Radomirovic},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Shaping Our Mental Model of Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_6},
  doi          = {10.1007/978-3-030-57043-9\_6},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Radomirovic19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinDHRSS18,
  author       = {David A. Basin and
                  Jannik Dreier and
                  Lucca Hirschi and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  Vincent Stettler},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {A Formal Analysis of 5G Authentication},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1383--1396},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243846},
  doi          = {10.1145/3243734.3243846},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinDHRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS18,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Alethea: {A} Provably Secure Random Sample Voting Protocol},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {283--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00028},
  doi          = {10.1109/CSF.2018.00028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DreierHRS18,
  author       = {Jannik Dreier and
                  Lucca Hirschi and
                  Sasa Radomirovic and
                  Ralf Sasse},
  title        = {Automated Unbounded Verification of Stateful Cryptographic Protocols
                  with Exclusive {OR}},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {359--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00033},
  doi          = {10.1109/CSF.2018.00033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DreierHRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-10360,
  author       = {David A. Basin and
                  Jannik Dreier and
                  Lucca Hirschi and
                  Sasa Radomirovic and
                  Ralf Sasse and
                  Vincent Stettler},
  title        = {Formal Analysis of 5G Authentication},
  journal      = {CoRR},
  volume       = {abs/1806.10360},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.10360},
  eprinttype    = {arXiv},
  eprint       = {1806.10360},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-10360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WustTRD17,
  author       = {Karl W{\"{u}}st and
                  Petar Tsankov and
                  Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  title        = {Force Open: Lightweight black box file repair},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S75--S82},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.009},
  doi          = {10.1016/J.DIIN.2017.01.009},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WustTRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DashtiR17,
  author       = {Mohammad Torabi Dashti and
                  Sasa Radomirovic},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {An Anti-pattern for Misuse Cases},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {250--261},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_16},
  doi          = {10.1007/978-3-319-72817-9\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DashtiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS16,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Lara Schmid},
  title        = {Modeling Human Errors in Security Protocols},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {325--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.30},
  doi          = {10.1109/CSF.2016.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BasinCMRW15,
  author       = {David A. Basin and
                  Cas Cremers and
                  Kunihiko Miyazaki and
                  Sasa Radomirovic and
                  Dai Watanabe},
  title        = {Improving the Security of Cryptographic Protocol Standards},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {3},
  pages        = {24--31},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2013.162},
  doi          = {10.1109/MSP.2013.162},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BasinCMRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BasinKRS15,
  author       = {David A. Basin and
                  Michel Keller and
                  Sasa Radomirovic and
                  Ralf Sasse},
  editor       = {Narciso Mart{\'{\i}}{-}Oliet and
                  Peter Csaba {\"{O}}lveczky and
                  Carolyn L. Talcott},
  title        = {Alice and Bob Meet Equational Theories},
  booktitle    = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}}
                  Meseguer on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9200},
  pages        = {160--180},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23165-5\_7},
  doi          = {10.1007/978-3-319-23165-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BasinKRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuennetPR15,
  author       = {Laurent Cuennet and
                  Marc Pouly and
                  Sasa Radomirovic},
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Guided Specification and Analysis of a Loyalty Card System},
  booktitle    = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29968-6\_5},
  doi          = {10.1007/978-3-319-29968-6\_5},
  timestamp    = {Thu, 23 Sep 2021 11:47:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CuennetPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BasinRS15,
  author       = {David A. Basin and
                  Sasa Radomirovic and
                  Michael Schl{\"{a}}pfer},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {A Complete Characterization of Secure Human-Server Communication},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {199--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.21},
  doi          = {10.1109/CSF.2015.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BasinRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/MauwR15,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Generalizing Multi-party Contract Signing},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {156--175},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_9},
  doi          = {10.1007/978-3-662-46666-7\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/MauwR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JhawarKMRT15,
  author       = {Ravi Jhawar and
                  Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Rolando Trujillo{-}Rasua},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Attack Trees with Sequential Conjunction},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_23},
  doi          = {10.1007/978-3-319-18467-8\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RadomirovicD15,
  author       = {Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Derailing Attacks},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {41--46},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_5},
  doi          = {10.1007/978-3-319-26096-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RadomirovicD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMR15,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Location-Private Interstellar Communication},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {105--115},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_11},
  doi          = {10.1007/978-3-319-26096-9\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MauwR15,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic},
  title        = {Generalizing Multi-party Contract Signing},
  journal      = {CoRR},
  volume       = {abs/1501.03868},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.03868},
  eprinttype    = {arXiv},
  eprint       = {1501.03868},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MauwR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JhawarKMRT15,
  author       = {Ravi Jhawar and
                  Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Rolando Trujillo{-}Rasua},
  title        = {Attack Trees with Sequential Conjunction},
  journal      = {CoRR},
  volume       = {abs/1503.02261},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.02261},
  eprinttype    = {arXiv},
  eprint       = {1503.02261},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JhawarKMRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/KordyMRS14,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Patrick Schweitzer},
  title        = {Attack-defense trees},
  journal      = {J. Log. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {55--87},
  year         = {2014},
  url          = {https://doi.org/10.1093/logcom/exs029},
  doi          = {10.1093/LOGCOM/EXS029},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/KordyMRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorics/Radomirovic12,
  author       = {Sasa Radomirovic},
  title        = {A Construction of Short Sequences Containing All Permutations of a
                  Set as Subsequences},
  journal      = {Electron. J. Comb.},
  volume       = {19},
  number       = {4},
  pages        = {31},
  year         = {2012},
  url          = {https://doi.org/10.37236/2859},
  doi          = {10.37236/2859},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorics/Radomirovic12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KordyR12,
  author       = {Barbara Kordy and
                  Sasa Radomirovic},
  editor       = {Stephen Chong},
  title        = {Constructing Optimistic Multi-party Contract Signing Protocols},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {215--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.23},
  doi          = {10.1109/CSF.2012.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KordyR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/DeursenR11,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  editor       = {Svetla Petkova{-}Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul},
  title        = {Insider Attacks and Privacy of {RFID} Protocols},
  booktitle    = {Public Key Infrastructures, Services and Applications - 8th European
                  Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7163},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29804-2\_6},
  doi          = {10.1007/978-3-642-29804-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/DeursenR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DeursenMR11,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  title        = {mCarve: Carving Attributed Dump Sets},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Deursen.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DeursenMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KordyMRS10,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Patrick Schweitzer},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Foundations of Attack-Defense Trees},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {80--95},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_6},
  doi          = {10.1007/978-3-642-19751-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KordyMRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/DeursenR10,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {{EC-RAC:} Enriching a Capacious {RFID} Attack Collection},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_8},
  doi          = {10.1007/978-3-642-16822-2\_8},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/DeursenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MauwRR10,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Protocols for Secret Santa},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {175--184},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_26},
  doi          = {10.1007/978-3-662-45921-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MauwRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/BuhanLR10,
  author       = {Ileana Buhan and
                  Gabriele Lenzini and
                  Sasa Radomirovic},
  editor       = {Zhiwen Yu and
                  Ramiro Liscano and
                  Guanling Chen and
                  Daqing Zhang and
                  Xingshe Zhou},
  title        = {Contextual Biometric-Based Authentication for Ubiquitous Services},
  booktitle    = {Ubiquitous Intelligence and Computing - 7th International Conference,
                  {UIC} 2010, Xi'an, China, October 26-29, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6406},
  pages        = {680--693},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16355-5\_51},
  doi          = {10.1007/978-3-642-16355-5\_51},
  timestamp    = {Wed, 11 Nov 2020 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/BuhanLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DeursenR09,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  title        = {On a new formal proof model for {RFID} location privacy},
  journal      = {Inf. Process. Lett.},
  volume       = {110},
  number       = {2},
  pages        = {57--61},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ipl.2009.10.007},
  doi          = {10.1016/J.IPL.2009.10.007},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DeursenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Alcalde0MMR09,
  author       = {Baptiste Alcalde and
                  Eric Dubois and
                  Sjouke Mauw and
                  Nicolas Mayer and
                  Sasa Radomirovic},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Towards a Decision Model Based on Trust and Security Risk Management},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {61--69},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Alcalde.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Alcalde0MMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MauwRD09,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  title        = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {13--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.15},
  doi          = {10.1109/CSF.2009.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MauwRD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DeursenMRV09,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic and
                  Pim Vullers},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Secure Ownership and Ownership Transfer in {RFID} Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {637--654},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_39},
  doi          = {10.1007/978-3-642-04444-1\_39},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DeursenMRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DeursenR09,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Algebraic Attacks on {RFID} Protocols},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {38--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_4},
  doi          = {10.1007/978-3-642-03944-7\_4},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DeursenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeursenR09,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  title        = {Untraceable {RFID} protocols are not trivially composable: Attacks
                  on the revision of {EC-RAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeursenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AndovaCGMMR08,
  author       = {Suzana Andova and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  Sjouke Mauw and
                  Stig Fr. Mj{\o}lsnes and
                  Sasa Radomirovic},
  title        = {A framework for compositional verification of security protocols},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {425--459},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.07.002},
  doi          = {10.1016/J.IC.2007.07.002},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/AndovaCGMMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/DeursenR08,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  title        = {Security of an {RFID} Protocol for Supply Chains},
  booktitle    = {2008 {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2008, Xi'an, China, October 22-24, 2008},
  pages        = {568--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICEBE.2008.44},
  doi          = {10.1109/ICEBE.2008.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/DeursenR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DeursenMR08,
  author       = {Ton van Deursen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Jose Antonio Onieva and
                  Damien Sauveron and
                  Serge Chaumette and
                  Dieter Gollmann and
                  Constantinos Markantonakis},
  title        = {Untraceability of {RFID} Protocols},
  booktitle    = {Information Security Theory and Practices. Smart Devices, Convergence
                  and Next Generation Networks, Second {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5019},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79966-5\_1},
  doi          = {10.1007/978-3-540-79966-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DeursenMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DeursenR09,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Security of {RFID} Protocols - {A} Case Study},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {41--52},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.037},
  doi          = {10.1016/J.ENTCS.2009.07.037},
  timestamp    = {Thu, 09 Mar 2023 13:54:01 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DeursenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeursenR08,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  title        = {Attacks on {RFID} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeursenR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeursenR08a,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  title        = {On a New Formal Proof Model for {RFID} Location Privacy (Extended
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeursenR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CeelenMR08,
  author       = {Pieter Ceelen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {31--43},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.015},
  doi          = {10.1016/J.ENTCS.2007.12.015},
  timestamp    = {Mon, 13 Feb 2023 09:13:20 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CeelenMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorics/CiobanuR06,
  author       = {Laura Ciobanu and
                  Sasa Radomirovic},
  title        = {Restricted Walks in Regular Trees},
  journal      = {Electron. J. Comb.},
  volume       = {13},
  number       = {1},
  year         = {2006},
  url          = {https://doi.org/10.37236/1119},
  doi          = {10.37236/1119},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorics/CiobanuR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0611062,
  author       = {Suzana Andova and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  Sjouke Mauw and
                  Stig Fr. Mj{\o}lsnes and
                  Sasa Radomirovic},
  title        = {A framework for compositional verification of security protocols},
  journal      = {CoRR},
  volume       = {abs/cs/0611062},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0611062},
  eprinttype    = {arXiv},
  eprint       = {cs/0611062},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0611062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics