dblp.uni-trier.dewww.uni-trier.de

Tom Coffey

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
14EEReiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi: On Establishing and Fixing a Parallel Session Attack in a Security Protocol. IDC 2008: 239-244
13EEVladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey: Determining a parallel session attack on a key distribution protocol using a model checker. MoMM 2008: 150-155
2006
12EEMihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey: Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments CoRR abs/cs/0605033: (2006)
2005
11EEReiner Dojen, Tom Coffey: The concept of layered proving trees and its application to the automation of security protocol verification. ACM Trans. Inf. Syst. Secur. 8(3): 287-311 (2005)
2003
10EETom Coffey, Reiner Dojen: Analysis of a mobile communication security protocol. ISICT 2003: 322-328
9EETom Coffey, Reiner Dojen, Tomas Flanagan: On the automated implementation of modal logics used to verify security protocols. ISICT 2003: 329-334
8EET. Newe, Tom Coffey: Security protocols for 2G and 3G wireless communications. ISICT 2003: 335-340
7EETom Coffey, Puneet Saidha, Peter Burrows: Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. ISICT 2003: 351-356
6EEMarian Ventuneac, Tom Coffey, Ioan Salomie: A policy-based security framework for Web-enabled applications. ISICT 2003: 487-492
5 Tom Coffey, Reiner Dojen, Tomas Flanagan: On Different Approaches to Establish the Security of Cryptographic Protocols. Security and Management 2003: 637-643
4 T. Newe, Tom Coffey: Formal verification logic for hybrid security protocols. Comput. Syst. Sci. Eng. 18(1): 17-25 (2003)
3EETom Coffey, Reiner Dojen, Tomas Flanagan: Formal verification: an imperative step in the design of security protocols . Computer Networks 43(5): 601-618 (2003)
1998
2EETom Coffey, T. Newe: Realisation of a minimum-knowledge identification and signature scheme. Computers & Security 17(3): 253-264 (1998)
1992
1 Weijun Wang, Tom Coffey: Network Security: Design of a Global Secure Link. SEC 1992: 101-111

Coauthor Index

1Claudiu Anghel [12]
2Peter Burrows [7]
3Mihaela Dinsoreanu [12]
4Reiner Dojen [3] [5] [9] [10] [11] [13] [14]
5Tomas Flanagan [3] [5] [9]
6Cristian Godja [12]
7Cornelia Györödi [14]
8Anca Jurcut [13] [14]
9T. Newe [2] [4] [8]
10Vladimir Pasca [13]
11Puneet Saidha [7]
12Ioan Salomie [6] [12]
13Marian Ventuneac [6]
14Weijun Wang [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)