Seguir
Reiner Dojen
Reiner Dojen
Electronic & Computer Engineering, University of Limerick
Dirección de correo verificada de ul.ie
Título
Citado por
Citado por
Año
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications
I Lasc, R Dojen, T Coffey
Computers & Electrical Engineering 37 (2), 160-168, 2011
592011
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node
F Zhang, R Dojen, T Coffey
International Journal of Sensor Networks 10 (4), 192-201, 2011
502011
Formal verification: an imperative step in the design of security protocols
T Coffey, R Dojen, T Flanagan
Computer Networks 43 (5), 601-618, 2003
432003
Design guidelines for security protocols to prevent replay & parallel session attacks
AD Jurcut, T Coffey, R Dojen
computers & Security 45, 255-273, 2014
202014
On establishing and fixing a parallel session attack in a security protocol
R Dojen, A Jurcut, T Coffey, C Gyorodi
Intelligent Distributed Computing, Systems and Applications: Proceedings of …, 2008
202008
Layered proving trees: A novel approach to the automation of logic-based security protocol verification
R Dojen, T Coffey
ACM Transactions on Information and System Security (TISSEC) 8 (3), 287-311, 2005
202005
Establishing and fixing a freshness flaw in a key-distribution and authentication protocol
R Dojen, I Lasc, T Coffey
2008 4th International Conference on Intelligent Computer Communication and …, 2008
162008
A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks
A Jurcut, T Coffey, R Dojen
IEEE transactions on dependable and secure computing 16 (6), 969-983, 2017
152017
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool
A Jurcut, T Coffey, Dojen, R.
Computer Networks, Communications in Computer and Information Science 431 …, 2014
152014
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
AD Jurcut, T Coffey, R Dojen
J. Commun. 8 (11), 795-805, 2013
152013
On the automated implementation of modal logics used to verify security protocols
T Coffey, R Dojen, T Flanagan
ISICT 3, 329-334, 2003
122003
Design requirements to counter parallel session attacks in security protocols
AD Jurcut, T Coffey, R Dojen
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
112014
A Novel Approach to Security Enhancement of Chaotic DSSS Systems
NX Quyen, CT Nguyen, Barlet-Ros P., R Dojen
IEEE International Conference on Communications and Electronics, 2016
102016
On the formal verification of a cluster based key management protocol for wireless sensor networks
R Dojen, F Zhang, T Coffey
2008 IEEE International Performance, Computing and Communications Conference …, 2008
102008
Automated verification of wireless security protocols using layered proving trees.
M Ventuneac, R Dojen, T Coffey
WSEAS Transactions on Communications 5 (2), 252-258, 2006
102006
A comparative analysis of state-space tools for security protocol verification.
K Healy, T Coffey, R Dojen
WSEAS Transactions on Information Science and Applications 1 (5), 1256-1261, 2004
102004
On Different Approaches to Establish the Security of Cryptographic Protocols.
T Coffey, R Dojen, T Flanagan
Security and Management, 637-643, 2003
102003
Analysis of a mobile communication security protocol
T Coffey, R Dojen
ACM International Conference Proceeding Series 49, 322-328, 2003
92003
Security Protocol Design: A Case Study Using Key Distribution Protocols.
A Jurcut, T Coffey, R Dojen, R Gyorodi
Journal of Computer Science & Control Systems 2 (2), 2009
82009
The concept of layered proving trees and its application to the automation of security protocol verification
R Dojen, T Coffey
ACM Transactions on Information and System Security (TISSEC) 8 (3), 287-311, 2005
82005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20