2008 |
14 | EE | Reiner Dojen,
Anca Jurcut,
Tom Coffey,
Cornelia Györödi:
On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
IDC 2008: 239-244 |
13 | EE | Vladimir Pasca,
Anca Jurcut,
Reiner Dojen,
Tom Coffey:
Determining a parallel session attack on a key distribution protocol using a model checker.
MoMM 2008: 150-155 |
2006 |
12 | EE | Mihaela Dinsoreanu,
Cristian Godja,
Claudiu Anghel,
Ioan Salomie,
Tom Coffey:
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments
CoRR abs/cs/0605033: (2006) |
2005 |
11 | EE | Reiner Dojen,
Tom Coffey:
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur. 8(3): 287-311 (2005) |
2003 |
10 | EE | Tom Coffey,
Reiner Dojen:
Analysis of a mobile communication security protocol.
ISICT 2003: 322-328 |
9 | EE | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
On the automated implementation of modal logics used to verify security protocols.
ISICT 2003: 329-334 |
8 | EE | T. Newe,
Tom Coffey:
Security protocols for 2G and 3G wireless communications.
ISICT 2003: 335-340 |
7 | EE | Tom Coffey,
Puneet Saidha,
Peter Burrows:
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt.
ISICT 2003: 351-356 |
6 | EE | Marian Ventuneac,
Tom Coffey,
Ioan Salomie:
A policy-based security framework for Web-enabled applications.
ISICT 2003: 487-492 |
5 | | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
On Different Approaches to Establish the Security of Cryptographic Protocols.
Security and Management 2003: 637-643 |
4 | | T. Newe,
Tom Coffey:
Formal verification logic for hybrid security protocols.
Comput. Syst. Sci. Eng. 18(1): 17-25 (2003) |
3 | EE | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
Formal verification: an imperative step in the design of security protocols .
Computer Networks 43(5): 601-618 (2003) |
1998 |
2 | EE | Tom Coffey,
T. Newe:
Realisation of a minimum-knowledge identification and signature scheme.
Computers & Security 17(3): 253-264 (1998) |
1992 |
1 | | Weijun Wang,
Tom Coffey:
Network Security: Design of a Global Secure Link.
SEC 1992: 101-111 |