Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Radomirović, Saša"'
Autor:
Ahmadi, Sharar, Le-Papin, Jay, Chen, Liqun, Dongol, Brijesh, Radomirovic, Sasa, Treharne, Helen
Collective remote attestation (CRA) is a security service that aims to efficiently identify compromised (often low-powered) devices in a (heterogeneous) network. The last few years have seen an extensive growth in CRA protocol proposals, showing a va
Externí odkaz:
http://arxiv.org/abs/2407.09203
In voting, disputes arise when a voter claims that the voting authority is dishonest and did not correctly process his ballot while the authority claims to have followed the protocol. A dispute can be resolved if any third party can unambiguously det
Externí odkaz:
http://arxiv.org/abs/2005.03749
Autor:
Basin, David, Dreier, Jannik, Hirschi, Lucca, Radomirović, Saša, Sasse, Ralf, Stettler, Vincent
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3
Externí odkaz:
http://arxiv.org/abs/1806.10360
We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND attack tree formalism increases the expressivity of attack trees by introducing the sequential conjunctive operator SAN
Externí odkaz:
http://arxiv.org/abs/1503.02261
Autor:
Mauw, Sjouke, Radomirovic, Sasa
Multi-party contract signing (MPCS) protocols allow a group of signers to exchange signatures on a predefined contract. Previous approaches considered either completely linear protocols or fully parallel broadcasting protocols. We introduce the new c
Externí odkaz:
http://arxiv.org/abs/1501.03868
Autor:
Andova, Suzana, Cremers, Cas, Gjosteen, Kristian, Mauw, Sjouke, Mjolsnes, Stig F., Radomirovic, Sasa
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a frame
Externí odkaz:
http://arxiv.org/abs/cs/0611062
Publikováno v:
In Digital Investigation March 2017 20 Supplement:S75-S82
Autor:
van Deursen, Ton, Radomirović, Saša
Publikováno v:
In Electronic Notes in Theoretical Computer Science 1 August 2009 244:41-52
Publikováno v:
In Electronic Notes in Theoretical Computer Science 22 February 2008 197(2):31-43
Autor:
Andova, Suzana, Cremers, Cas, Gjøsteen, Kristian, Mauw, Sjouke, Mjølsnes, Stig F., Radomirović, Saša
Publikováno v:
In Information and Computation 2008 206(2):425-459