| 2008 |
| 7 | EE | Reiner Dojen,
Anca Jurcut,
Tom Coffey,
Cornelia Györödi:
On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
IDC 2008: 239-244 |
| 6 | EE | Vladimir Pasca,
Anca Jurcut,
Reiner Dojen,
Tom Coffey:
Determining a parallel session attack on a key distribution protocol using a model checker.
MoMM 2008: 150-155 |
| 2005 |
| 5 | EE | Reiner Dojen,
Tom Coffey:
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur. 8(3): 287-311 (2005) |
| 2003 |
| 4 | EE | Tom Coffey,
Reiner Dojen:
Analysis of a mobile communication security protocol.
ISICT 2003: 322-328 |
| 3 | EE | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
On the automated implementation of modal logics used to verify security protocols.
ISICT 2003: 329-334 |
| 2 | | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
On Different Approaches to Establish the Security of Cryptographic Protocols.
Security and Management 2003: 637-643 |
| 1 | EE | Tom Coffey,
Reiner Dojen,
Tomas Flanagan:
Formal verification: an imperative step in the design of security protocols .
Computer Networks 43(5): 601-618 (2003) |