default search action
Tom Coffey
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j12]Anca Jurcut, Tom Coffey, Reiner Dojen:
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks. IEEE Trans. Dependable Secur. Comput. 16(6): 969-983 (2019) - 2014
- [j11]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design guidelines for security protocols to prevent replay & parallel session attacks. Comput. Secur. 45: 255-273 (2014) - [c14]Anca Jurcut, Tom Coffey, Reiner Dojen:
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool. CN 2014: 128-137 - [c13]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design requirements to counter parallel session attacks in security protocols. PST 2014: 298-305 - 2013
- [j10]Ioana Lasc, Reiner Dojen, Tom Coffey:
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets. Comput. Secur. 32: 115-129 (2013) - [j9]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool. J. Commun. 8(11): 795-805 (2013) - 2012
- [c12]Anca Jurcut, Tom Coffey, Reiner Dojen:
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. ARES 2012: 410-416 - 2011
- [j8]Ioana Lasc, Reiner Dojen, Tom Coffey:
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. Comput. Electr. Eng. 37(2): 160-168 (2011) - [j7]Ioana Lasc, Reiner Dojen, Tom Coffey:
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications. Int. J. Inf. Secur. Priv. 5(1): 33-49 (2011) - [j6]Fan Zhang, Reiner Dojen, Tom Coffey:
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. Int. J. Sens. Networks 10(4): 192-201 (2011)
2000 – 2009
- 2009
- [c11]Reiner Dojen, Vladimir Pasca, Tom Coffey:
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. MobiSec 2009: 278-287 - 2008
- [c10]Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi:
On Establishing and Fixing a Parallel Session Attack in a Security Protocol. IDC 2008: 239-244 - [c9]Reiner Dojen, Fan Zhang, Tom Coffey:
On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks. IPCCC 2008: 499-506 - [c8]Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey:
Determining a parallel session attack on a key distribution protocol using a model checker. MoMM 2008: 150-155 - 2006
- [i1]Mihaela Dînsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey:
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments. CoRR abs/cs/0605033 (2006) - 2005
- [j5]Reiner Dojen, Tom Coffey:
The concept of layered proving trees and its application to the automation of security protocol verification. ACM Trans. Inf. Syst. Secur. 8(3): 287-311 (2005) - 2003
- [j4]Tom Coffey, Reiner Dojen, Tomas Flanagan:
Formal verification: an imperative step in the design of security protocols . Comput. Networks 43(5): 601-618 (2003) - [j3]Thomas Newe, Tom Coffey:
Formal verification logic for hybrid security protocols. Comput. Syst. Sci. Eng. 18(1): 17-25 (2003) - [c7]Tom Coffey, Reiner Dojen, Tomas Flanagan:
On Different Approaches to Establish the Security of Cryptographic Protocols. Security and Management 2003: 637-643 - [c6]Tom Coffey, Reiner Dojen:
Analysis of a mobile communication security protocol. ISICT 2003: 322-328 - [c5]Tom Coffey, Reiner Dojen, Tomas Flanagan:
On the automated implementation of modal logics used to verify security protocols. ISICT 2003: 329-334 - [c4]Thomas Newe, Tom Coffey:
Security protocols for 2G and 3G wireless communications. ISICT 2003: 335-340 - [c3]Tom Coffey, Puneet Saidha, Peter Burrows:
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. ISICT 2003: 351-356 - [c2]Marian Ventuneac, Tom Coffey, Ioan Salomie:
A policy-based security framework for Web-enabled applications. ISICT 2003: 487-492
1990 – 1999
- 1998
- [j2]Tom Coffey, Thomas Newe:
Realisation of a minimum-knowledge identification and signature scheme. Comput. Secur. 17(3): 253-264 (1998) - 1996
- [j1]Tom Coffey, Puneet Saidha:
Non-repudiation with mandatory proof of receipt. Comput. Commun. Rev. 26(1): 6-17 (1996) - 1992
- [c1]Weijun Wang, Tom Coffey:
Network Security: Design of a Global Secure Link. SEC 1992: 101-111
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint