Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Saša Radomirović"'
Autor:
Giampaolo Bella, Saša Radomirović
Publikováno v:
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing.
Publikováno v:
Socio-Technical Aspects in Security ISBN: 9783031101823
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7cd829bbcc311bfc8314fa8f35eae630
https://doi.org/10.1007/978-3-031-10183-0_5
https://doi.org/10.1007/978-3-031-10183-0_5
Publikováno v:
CCS
CCS 2021-ACM SIGSAC Conference on Computer and Communications Security
CCS 2021-ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2632-2652, ⟨10.1145/3460120.3484555⟩
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2632-2652, ⟨10.1145/3460120.3484555⟩
CCS 2021-ACM SIGSAC Conference on Computer and Communications Security
CCS 2021-ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2632-2652, ⟨10.1145/3460120.3484555⟩
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2632-2652, ⟨10.1145/3460120.3484555⟩
International audience; Verifiability is a key requirement for electronic voting. However, the use of cryptographic techniques to achieve it usually requires specialist knowledge to understand; hence voters cannot easily assess the validity of such a
Publikováno v:
Journal of Computer Security
Journal of Computer Security, IOS Press, 2020, 28 (1), pp.1--34. ⟨10.3233/JCS-191358⟩
Journal of Computer Security, 2020, 28 (1), pp.1--34. ⟨10.3233/JCS-191358⟩
Journal of Computer Security, IOS Press, 2020, 28 (1), pp.1--34. ⟨10.3233/JCS-191358⟩
Journal of Computer Security, 2020, 28 (1), pp.1--34. ⟨10.3233/JCS-191358⟩
International audience; In cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptogra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::638c12bce704f0ff46a02eb3f640f33e
https://hal.archives-ouvertes.fr/hal-02358878/document
https://hal.archives-ouvertes.fr/hal-02358878/document
Autor:
Saša Radomirović
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
Security Protocols Workshop
This talk is not on a completed piece of research, it is a work in progress. One of our biggest challenges at the moment is how to improve cyber security and people are at the heart of it. A lot has been written about safety and human error. There’
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a4367dd1c4b995d34faae063337078f
https://doi.org/10.1007/978-3-030-57043-9_6
https://doi.org/10.1007/978-3-030-57043-9_6
Autor:
Saša Radomirović
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
Security Protocols Workshop
The IT industry’s need to distinguish new products with new looks, new experiences, and new user interface designs is bad for cybersecurity. It robs users of the chance to transfer previously acquired security-relevant knowledge to new products and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::db3a1fd7b0caef827bd47ffea36ff798
https://doi.org/10.1007/978-3-030-57043-9_5
https://doi.org/10.1007/978-3-030-57043-9_5
Publikováno v:
CCS
CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
CCS '19 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
The primary authentication method for a user account is rarely the only way to access that account. Accounts can often be accessed through other accounts, using recovery methods, password managers, or single sign-on. This increases each account’s a
Publikováno v:
ACM CCS 2018-25th ACM Conference on Computer and Communications Security
ACM CCS 2018-25th ACM Conference on Computer and Communications Security, Oct 2018, Toronto, Canada. ⟨10.1145/3243734.3243846⟩
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS'18)
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
ACM CCS 2018-25th ACM Conference on Computer and Communications Security, Oct 2018, Toronto, Canada. ⟨10.1145/3243734.3243846⟩
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS'18)
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9b667b32ec0b7ef738f770e2b018ef6f
https://hal.archives-ouvertes.fr/hal-01898050/file/CCS18_finalcrc2_Fixed-Typo.pdf
https://hal.archives-ouvertes.fr/hal-01898050/file/CCS18_finalcrc2_Fixed-Typo.pdf
Publikováno v:
CSF'2018-31st IEEE Computer Security Foundations Symposium
CSF'2018-31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00033⟩
2018 IEEE 31st Computer Security Foundations Symposium (CSF)
IEEE 31th Computer Security Foundations Symposium: CSF 2018: 9-12 July 2018, Oxford, United Kingdom: Proceedings
CSF
CSF'2018-31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00033⟩
2018 IEEE 31st Computer Security Foundations Symposium (CSF)
IEEE 31th Computer Security Foundations Symposium: CSF 2018: 9-12 July 2018, Oxford, United Kingdom: Proceedings
CSF
Exclusive-or (XOR) operations are common in cryptographic protocols, in particular in RFID protocols and electronic payment protocols. Although there are numerous applications, due to the inherent complexity of faithful models of XOR, there is only l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7676a72dba8bdaa7c1ab53407fb2ebae
https://hal.science/hal-01780603/file/paper-final.pdf
https://hal.science/hal-01780603/file/paper-final.pdf
Publikováno v:
IEEE 31th Computer Security Foundations Symposium: CSF 2018: 9-12 July 2018, Oxford, United Kingdom: Proceedings
CSF
CSF
IEEE 31th Computer Security Foundations Symposium: CSF 2018: 9-12 July 2018, Oxford, United Kingdom: Proceedings
ISBN:978-1-5386-6680-7
ISBN:978-1-5386-6681-4
ISBN:978-1-5386-6680-7
ISBN:978-1-5386-6681-4
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d87a63d46ee82389f78214e63a4090f1