Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sasa Radomirovic
@inproceedings{DBLP:conf/esorics/ArnaboldiAKR23, author = {Luca Arnaboldi and David Aspinall and Christina Kolb and Sasa Radomirovic}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Tactics for Account Access Graphs}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {452--470}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_23}, doi = {10.1007/978-3-031-51479-1\_23}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArnaboldiAKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HammannCRSB22, author = {Sven Hammann and Michael Crabb and Sasa Radomirovic and Ralf Sasse and David A. Basin}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {"I'm Surprised So Much Is Connected"}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {620:1--620:13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3502125}, doi = {10.1145/3491102.3502125}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HammannCRSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinDGR21, author = {David A. Basin and Jannik Dreier and Sofia Giampietro and Sasa Radomirovic}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Verifying Table-Based Elections}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2632--2652}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484555}, doi = {10.1145/3460120.3484555}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasinDGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/AbrahamCR21, author = {Melvin Abraham and Michael Crabb and Sasa Radomirovic}, editor = {Simon E. Parkin and Luca Vigan{\`{o}}}, title = {"I'm Doing the Best {I} Can." - Understanding Technology Literate Older Adults' Account Management Strategies}, booktitle = {Socio-Technical Aspects in Security - 11th International Workshop, {STAST} 2021, Virtual Event, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13176}, pages = {86--107}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-10183-0\_5}, doi = {10.1007/978-3-031-10183-0\_5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/AbrahamCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DreierHRS20, author = {Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse}, title = {Verification of stateful cryptographic protocols with exclusive {OR}}, journal = {J. Comput. Secur.}, volume = {28}, number = {1}, pages = {1--34}, year = {2020}, url = {https://doi.org/10.3233/JCS-191358}, doi = {10.3233/JCS-191358}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DreierHRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS20, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Dispute Resolution in Voting}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {1--16}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00009}, doi = {10.1109/CSF49147.2020.00009}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03749, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Dispute Resolution in Voting}, journal = {CoRR}, volume = {abs/2005.03749}, year = {2020}, url = {https://arxiv.org/abs/2005.03749}, eprinttype = {arXiv}, eprint = {2005.03749}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HammannRSB19, author = {Sven Hammann and Sasa Radomirovic and Ralf Sasse and David A. Basin}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {User Account Access Graphs}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1405--1422}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354193}, doi = {10.1145/3319535.3354193}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HammannRSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Radomirovic19, author = {Sasa Radomirovic}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Shaping Our Mental Model of Security}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {51--59}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_5}, doi = {10.1007/978-3-030-57043-9\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Radomirovic19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Radomirovic19a, author = {Sasa Radomirovic}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Shaping Our Mental Model of Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {60--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_6}, doi = {10.1007/978-3-030-57043-9\_6}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Radomirovic19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinDHRSS18, author = {David A. Basin and Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse and Vincent Stettler}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {A Formal Analysis of 5G Authentication}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1383--1396}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243846}, doi = {10.1145/3243734.3243846}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasinDHRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS18, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Alethea: {A} Provably Secure Random Sample Voting Protocol}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {283--297}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00028}, doi = {10.1109/CSF.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DreierHRS18, author = {Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse}, title = {Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive {OR}}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {359--373}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00033}, doi = {10.1109/CSF.2018.00033}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DreierHRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-10360, author = {David A. Basin and Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse and Vincent Stettler}, title = {Formal Analysis of 5G Authentication}, journal = {CoRR}, volume = {abs/1806.10360}, year = {2018}, url = {http://arxiv.org/abs/1806.10360}, eprinttype = {arXiv}, eprint = {1806.10360}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-10360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WustTRD17, author = {Karl W{\"{u}}st and Petar Tsankov and Sasa Radomirovic and Mohammad Torabi Dashti}, title = {Force Open: Lightweight black box file repair}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S75--S82}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.009}, doi = {10.1016/J.DIIN.2017.01.009}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WustTRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DashtiR17, author = {Mohammad Torabi Dashti and Sasa Radomirovic}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {An Anti-pattern for Misuse Cases}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {250--261}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_16}, doi = {10.1007/978-3-319-72817-9\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DashtiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS16, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Modeling Human Errors in Security Protocols}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {325--340}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.30}, doi = {10.1109/CSF.2016.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BasinCMRW15, author = {David A. Basin and Cas Cremers and Kunihiko Miyazaki and Sasa Radomirovic and Dai Watanabe}, title = {Improving the Security of Cryptographic Protocol Standards}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {3}, pages = {24--31}, year = {2015}, url = {https://doi.org/10.1109/MSP.2013.162}, doi = {10.1109/MSP.2013.162}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BasinCMRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BasinKRS15, author = {David A. Basin and Michel Keller and Sasa Radomirovic and Ralf Sasse}, editor = {Narciso Mart{\'{\i}}{-}Oliet and Peter Csaba {\"{O}}lveczky and Carolyn L. Talcott}, title = {Alice and Bob Meet Equational Theories}, booktitle = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}} Meseguer on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9200}, pages = {160--180}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23165-5\_7}, doi = {10.1007/978-3-319-23165-5\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BasinKRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuennetPR15, author = {Laurent Cuennet and Marc Pouly and Sasa Radomirovic}, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Guided Specification and Analysis of a Loyalty Card System}, booktitle = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, pages = {66--81}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29968-6\_5}, doi = {10.1007/978-3-319-29968-6\_5}, timestamp = {Thu, 23 Sep 2021 11:47:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CuennetPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS15, author = {David A. Basin and Sasa Radomirovic and Michael Schl{\"{a}}pfer}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {A Complete Characterization of Secure Human-Server Communication}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {199--213}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.21}, doi = {10.1109/CSF.2015.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/MauwR15, author = {Sjouke Mauw and Sasa Radomirovic}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Generalizing Multi-party Contract Signing}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {156--175}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_9}, doi = {10.1007/978-3-662-46666-7\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/MauwR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JhawarKMRT15, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Rolando Trujillo{-}Rasua}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Attack Trees with Sequential Conjunction}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {339--353}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_23}, doi = {10.1007/978-3-319-18467-8\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/JhawarKMRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RadomirovicD15, author = {Sasa Radomirovic and Mohammad Torabi Dashti}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Derailing Attacks}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {41--46}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_5}, doi = {10.1007/978-3-319-26096-9\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/RadomirovicD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMR15, author = {Hugo Jonker and Sjouke Mauw and Sasa Radomirovic}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {105--115}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_11}, doi = {10.1007/978-3-319-26096-9\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MauwR15, author = {Sjouke Mauw and Sasa Radomirovic}, title = {Generalizing Multi-party Contract Signing}, journal = {CoRR}, volume = {abs/1501.03868}, year = {2015}, url = {http://arxiv.org/abs/1501.03868}, eprinttype = {arXiv}, eprint = {1501.03868}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MauwR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JhawarKMRT15, author = {Ravi Jhawar and Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Rolando Trujillo{-}Rasua}, title = {Attack Trees with Sequential Conjunction}, journal = {CoRR}, volume = {abs/1503.02261}, year = {2015}, url = {http://arxiv.org/abs/1503.02261}, eprinttype = {arXiv}, eprint = {1503.02261}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JhawarKMRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/KordyMRS14, author = {Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Patrick Schweitzer}, title = {Attack-defense trees}, journal = {J. Log. Comput.}, volume = {24}, number = {1}, pages = {55--87}, year = {2014}, url = {https://doi.org/10.1093/logcom/exs029}, doi = {10.1093/LOGCOM/EXS029}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/KordyMRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorics/Radomirovic12, author = {Sasa Radomirovic}, title = {A Construction of Short Sequences Containing All Permutations of a Set as Subsequences}, journal = {Electron. J. Comb.}, volume = {19}, number = {4}, pages = {31}, year = {2012}, url = {https://doi.org/10.37236/2859}, doi = {10.37236/2859}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorics/Radomirovic12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KordyR12, author = {Barbara Kordy and Sasa Radomirovic}, editor = {Stephen Chong}, title = {Constructing Optimistic Multi-party Contract Signing Protocols}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {215--229}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.23}, doi = {10.1109/CSF.2012.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KordyR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/DeursenR11, author = {Ton van Deursen and Sasa Radomirovic}, editor = {Svetla Petkova{-}Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul}, title = {Insider Attacks and Privacy of {RFID} Protocols}, booktitle = {Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7163}, pages = {91--105}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29804-2\_6}, doi = {10.1007/978-3-642-29804-2\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/DeursenR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DeursenMR11, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic}, title = {mCarve: Carving Attributed Dump Sets}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Deursen.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DeursenMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KordyMRS10, author = {Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Patrick Schweitzer}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {Foundations of Attack-Defense Trees}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {80--95}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_6}, doi = {10.1007/978-3-642-19751-2\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KordyMRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/DeursenR10, author = {Ton van Deursen and Sasa Radomirovic}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {{EC-RAC:} Enriching a Capacious {RFID} Attack Collection}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {75--90}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_8}, doi = {10.1007/978-3-642-16822-2\_8}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/DeursenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MauwRR10, author = {Sjouke Mauw and Sasa Radomirovic and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Protocols for Secret Santa}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {175--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_26}, doi = {10.1007/978-3-662-45921-8\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/MauwRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/BuhanLR10, author = {Ileana Buhan and Gabriele Lenzini and Sasa Radomirovic}, editor = {Zhiwen Yu and Ramiro Liscano and Guanling Chen and Daqing Zhang and Xingshe Zhou}, title = {Contextual Biometric-Based Authentication for Ubiquitous Services}, booktitle = {Ubiquitous Intelligence and Computing - 7th International Conference, {UIC} 2010, Xi'an, China, October 26-29, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6406}, pages = {680--693}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16355-5\_51}, doi = {10.1007/978-3-642-16355-5\_51}, timestamp = {Wed, 11 Nov 2020 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/uic/BuhanLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DeursenR09, author = {Ton van Deursen and Sasa Radomirovic}, title = {On a new formal proof model for {RFID} location privacy}, journal = {Inf. Process. Lett.}, volume = {110}, number = {2}, pages = {57--61}, year = {2009}, url = {https://doi.org/10.1016/j.ipl.2009.10.007}, doi = {10.1016/J.IPL.2009.10.007}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DeursenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Alcalde0MMR09, author = {Baptiste Alcalde and Eric Dubois and Sjouke Mauw and Nicolas Mayer and Sasa Radomirovic}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Towards a Decision Model Based on Trust and Security Risk Management}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {61--69}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Alcalde.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Alcalde0MMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MauwRD09, author = {Sjouke Mauw and Sasa Radomirovic and Mohammad Torabi Dashti}, title = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {13--25}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.15}, doi = {10.1109/CSF.2009.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MauwRD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DeursenMRV09, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic and Pim Vullers}, editor = {Michael Backes and Peng Ning}, title = {Secure Ownership and Ownership Transfer in {RFID} Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {637--654}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_39}, doi = {10.1007/978-3-642-04444-1\_39}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DeursenMRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DeursenR09, author = {Ton van Deursen and Sasa Radomirovic}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Algebraic Attacks on {RFID} Protocols}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {38--51}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_4}, doi = {10.1007/978-3-642-03944-7\_4}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DeursenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeursenR09, author = {Ton van Deursen and Sasa Radomirovic}, title = {Untraceable {RFID} protocols are not trivially composable: Attacks on the revision of {EC-RAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2009}, url = {http://eprint.iacr.org/2009/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeursenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AndovaCGMMR08, author = {Suzana Andova and Cas Cremers and Kristian Gj{\o}steen and Sjouke Mauw and Stig Fr. Mj{\o}lsnes and Sasa Radomirovic}, title = {A framework for compositional verification of security protocols}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {425--459}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.07.002}, doi = {10.1016/J.IC.2007.07.002}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/AndovaCGMMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/DeursenR08, author = {Ton van Deursen and Sasa Radomirovic}, title = {Security of an {RFID} Protocol for Supply Chains}, booktitle = {2008 {IEEE} International Conference on e-Business Engineering, {ICEBE} 2008, Xi'an, China, October 22-24, 2008}, pages = {568--573}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICEBE.2008.44}, doi = {10.1109/ICEBE.2008.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/DeursenR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DeursenMR08, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic}, editor = {Jose Antonio Onieva and Damien Sauveron and Serge Chaumette and Dieter Gollmann and Constantinos Markantonakis}, title = {Untraceability of {RFID} Protocols}, booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second {IFIP} {WG} 11.2 International Workshop, {WISTP} 2008, Seville, Spain, May 13-16, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5019}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79966-5\_1}, doi = {10.1007/978-3-540-79966-5\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DeursenMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DeursenR09, author = {Ton van Deursen and Sasa Radomirovic}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Security of {RFID} Protocols - {A} Case Study}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {41--52}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.037}, doi = {10.1016/J.ENTCS.2009.07.037}, timestamp = {Thu, 09 Mar 2023 13:54:01 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DeursenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeursenR08, author = {Ton van Deursen and Sasa Radomirovic}, title = {Attacks on {RFID} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2008}, url = {http://eprint.iacr.org/2008/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeursenR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeursenR08a, author = {Ton van Deursen and Sasa Radomirovic}, title = {On a New Formal Proof Model for {RFID} Location Privacy (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2008}, url = {http://eprint.iacr.org/2008/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeursenR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CeelenMR08, author = {Pieter Ceelen and Sjouke Mauw and Sasa Radomirovic}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {31--43}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.015}, doi = {10.1016/J.ENTCS.2007.12.015}, timestamp = {Mon, 13 Feb 2023 09:13:20 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CeelenMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorics/CiobanuR06, author = {Laura Ciobanu and Sasa Radomirovic}, title = {Restricted Walks in Regular Trees}, journal = {Electron. J. Comb.}, volume = {13}, number = {1}, year = {2006}, url = {https://doi.org/10.37236/1119}, doi = {10.37236/1119}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorics/CiobanuR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0611062, author = {Suzana Andova and Cas Cremers and Kristian Gj{\o}steen and Sjouke Mauw and Stig Fr. Mj{\o}lsnes and Sasa Radomirovic}, title = {A framework for compositional verification of security protocols}, journal = {CoRR}, volume = {abs/cs/0611062}, year = {2006}, url = {http://arxiv.org/abs/cs/0611062}, eprinttype = {arXiv}, eprint = {cs/0611062}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0611062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.