2008 |
7 | EE | Reiner Dojen,
Anca Jurcut,
Tom Coffey,
Cornelia Györödi:
On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
IDC 2008: 239-244 |
6 | EE | Vladimir Pasca,
Anca Jurcut,
Reiner Dojen,
Tom Coffey:
Determining a parallel session attack on a key distribution protocol using a model checker.
MoMM 2008: 150-155 |
2005 |
5 | EE | Reiner Dojen,
Tom Coffey:
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur. 8(3): 287-311 (2005) |
2003 |
4 | EE | Tom Coffey,
Reiner Dojen:
Analysis of a mobile communication security protocol.
ISICT 2003: 322-328 |
3 | EE | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
On the automated implementation of modal logics used to verify security protocols.
ISICT 2003: 329-334 |
2 | | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
On Different Approaches to Establish the Security of Cryptographic Protocols.
Security and Management 2003: 637-643 |
1 | EE | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
Formal verification: an imperative step in the design of security protocols .
Computer Networks 43(5): 601-618 (2003) |