A formal analysis of 5G authentication D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 447 | 2018 |
Foundations of attack–defense trees B Kordy, S Mauw, S Radomirović, P Schweitzer Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 370 | 2011 |
Attack–defense trees B Kordy, S Mauw, S Radomirović, P Schweitzer Journal of Logic and Computation 24 (1), 55-87, 2014 | 217 | 2014 |
Attacks on RFID protocols T Van Deursen, S Radomirović Cryptology ePrint Archive 2008 (310), 1-56, 2009 | 129 | 2009 |
Attack trees with sequential conjunction R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua IFIP International Information Security and Privacy Conference, 339-353, 2015 | 127 | 2015 |
Untraceability of RFID protocols T Van Deursen, S Mauw, S Radomirović Information Security Theory and Practices. Smart Devices, Convergence and …, 2008 | 95 | 2008 |
A framework for compositional verification of security protocols S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović Information and Computation 206 (2-4), 425-459, 2008 | 88 | 2008 |
Towards a model for security and privacy in the internet of things S Radomirovic Proc. First Int’l Workshop on Security of the Internet of Things 6, 2010 | 65 | 2010 |
Modeling human errors in security protocols D Basin, S Radomirovic, L Schmid 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 325-340, 2016 | 62 | 2016 |
Secure ownership and ownership transfer in RFID systems T Van Deursen, S Mauw, S Radomirović, P Vullers Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 55 | 2009 |
Automated unbounded verification of stateful cryptographic protocols with exclusive OR J Dreier, L Hirschi, S Radomirovic, R Sasse 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018 | 51 | 2018 |
Algebraic attacks on RFID protocols T Van Deursen, S Radomirović Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009 | 51 | 2009 |
Security of RFID protocols–a case study T van Deursen, S Radomirović Electronic Notes in Theoretical Computer Science 244, 41-52, 2009 | 48 | 2009 |
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC T van Deursen, S Radomirović Cryptology ePrint Archive 2009 (332), 1-8, 2009 | 42 | 2009 |
A complete characterization of secure human-server communication D Basin, S Radomirovic, M Schläepfer 2015 IEEE 28th Computer Security Foundations Symposium, 199-213, 2015 | 35 | 2015 |
Alethea: A provably secure random sample voting protocol D Basin, S Radomirovic, L Schmid 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 283-297, 2018 | 32 | 2018 |
Attacks on RFID protocols T Deursen, S Radomirovic IACR EPrint, July, 2008 | 32 | 2008 |
Improving the security of cryptographic protocol standards D Basin, C Cremers, K Miyazaki, S Radomirovic, D Watanabe IEEE Security & Privacy 13 (3), 24-31, 2014 | 30 | 2014 |
On a new formal proof model for RFID location privacy T Van Deursen, S Radomirović Information Processing Letters 110 (2), 57-61, 2009 | 29 | 2009 |
Minimal message complexity of asynchronous multi-party contract signing S Mauw, S Radomirovic, MT Dashti 2009 22nd IEEE Computer Security Foundations Symposium, 13-25, 2009 | 29 | 2009 |