dblp.uni-trier.dewww.uni-trier.de

Reiner Dojen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
7EEReiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi: On Establishing and Fixing a Parallel Session Attack in a Security Protocol. IDC 2008: 239-244
6EEVladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey: Determining a parallel session attack on a key distribution protocol using a model checker. MoMM 2008: 150-155
2005
5EEReiner Dojen, Tom Coffey: The concept of layered proving trees and its application to the automation of security protocol verification. ACM Trans. Inf. Syst. Secur. 8(3): 287-311 (2005)
2003
4EETom Coffey, Reiner Dojen: Analysis of a mobile communication security protocol. ISICT 2003: 322-328
3EETom Coffey, Reiner Dojen, Tomas Flanagan: On the automated implementation of modal logics used to verify security protocols. ISICT 2003: 329-334
2 Tom Coffey, Reiner Dojen, Tomas Flanagan: On Different Approaches to Establish the Security of Cryptographic Protocols. Security and Management 2003: 637-643
1EETom Coffey, Reiner Dojen, Tomas Flanagan: Formal verification: an imperative step in the design of security protocols . Computer Networks 43(5): 601-618 (2003)

Coauthor Index

1Tom Coffey [1] [2] [3] [4] [5] [6] [7]
2Tomas Flanagan [1] [2] [3]
3Cornelia Györödi [7]
4Anca Jurcut [6] [7]
5Vladimir Pasca [6]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)