Efficient delegated private set intersection on outsourced private datasets A Abadi, S Terzis, R Metere, C Dong IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017 | 80 | 2017 |
Automated cryptographic analysis of the Pedersen commitment scheme R Metere, C Dong International Conference on Mathematical Methods, Models, and Architectures …, 2017 | 38 | 2017 |
Socially-conforming cooperative computation in cloud networks T Li, BB Gupta, R Metere Journal of Parallel and Distributed Computing 117, 274-280, 2018 | 35 | 2018 |
Securing the Electric Vehicle Charging Infrastructure R Metere, M Neaimeh, C Morisset, C Maple, X Bellekens, RM Czekster arXiv preprint arXiv:2105.02905, 2021 | 31 | 2021 |
Modelling load-changing attacks in cyber-physical systems L Arnaboldi, RM Czekster, C Morisset, R Metere Electronic Notes in Theoretical Computer Science 353, 39-60, 2020 | 30 | 2020 |
TrABin: Trustworthy analyses of binaries A Lindner, R Guanciale, R Metere Science of Computer Programming 174, 72-89, 2019 | 22 | 2019 |
Analyzing and patching SPEKE in ISO/IEC F Hao, R Metere, SF Shahandashti, C Dong IEEE Transactions on Information Forensics and Security 13 (11), 2844-2855, 2018 | 18 | 2018 |
Sound transpilation from binary to machine-independent code R Metere, A Lindner, R Guanciale Formal Methods: Foundations and Applications: 20th Brazilian Symposium, SBMF …, 2017 | 10 | 2017 |
Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings RM Czekster, R Metere, C Morisset Applied Sciences 12 (10), 5005, 2022 | 9 | 2022 |
End-to-End Verifiable E-Voting Trial for Polling Station Voting F Hao, S Wang, S Bag, R Procter, SF Shahandashti, M Mehrnezhad, ... IEEE Security & Privacy 18 (6), 6-13, 2020 | 8 | 2020 |
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models RM Czekster, R Metere, C Morisset arXiv preprint arXiv:2204.03676, 2022 | 6 | 2022 |
Poster: Towards a data centric approach for the design and verification of cryptographic protocols L Arnaboldi, R Metere Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 6 | 2019 |
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+ F Li, D Xie, W Gao, K Chen, G Wang, R Metere Journal of Ambient Intelligence and Humanized Computing, 1-10, 2024 | 4 | 2024 |
Automating cryptographic protocol language generation from structured specifications R Metere, L Arnaboldi 2022 IEEE/ACM 10th International Conference on Formal Methods in Software …, 2022 | 4 | 2022 |
ValuED: A Blockchain-based Trading Platform to EncourageStudent Engagement in Higher Education A Abadi, J Xiao, R Metere, R Shillcock PsyArXiv, 2021 | 4 | 2021 |
An Overview of Cyber Security and Privacy on the Electric Vehicle Charging Infrastructure R Metere, Z Pourmirza, S Walker, M Neaimeh arXiv preprint arXiv:2209.07842, 2022 | 3 | 2022 |
Incentive-driven attacker for corrupting two-party protocols Y Wang, R Metere, H Zhou, G Cui, T Li Soft Computing 22 (23), 7733-7740, 2018 | 1 | 2018 |
Enhancing Expressiveness in Stochastic Modelling of Cyber-Physical Systems R Metere, RM Czekster, L Arnaboldi 2024 13th Mediterranean Conference on Embedded Computing (MECO), 1-4, 2024 | | 2024 |
A Direct Lazy Sampling Proof Technique in Probabilistic Relational Hoare Logic R Metere, C Dong arXiv preprint arXiv:2311.16844, 2023 | | 2023 |
Checking and Automating Confidentiality Theory in Isabelle/UTP L Bailey, J Woodcock, S Foster, R Metere arXiv preprint arXiv:2310.10658, 2023 | | 2023 |