default search action
Reiner Dojen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j10]Anca Jurcut, Tom Coffey, Reiner Dojen:
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks. IEEE Trans. Dependable Secur. Comput. 16(6): 969-983 (2019) - 2018
- [j9]Martin Schramm, Reiner Dojen, Michael Heigl:
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic. Secur. Commun. Networks 2018: 4983404:1-4983404:18 (2018) - 2014
- [j8]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design guidelines for security protocols to prevent replay & parallel session attacks. Comput. Secur. 45: 255-273 (2014) - 2013
- [j7]Ioana Lasc, Reiner Dojen, Tom Coffey:
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets. Comput. Secur. 32: 115-129 (2013) - [j6]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool. J. Commun. 8(11): 795-805 (2013) - 2011
- [j5]Ioana Lasc, Reiner Dojen, Tom Coffey:
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. Comput. Electr. Eng. 37(2): 160-168 (2011) - [j4]Ioana Lasc, Reiner Dojen, Tom Coffey:
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications. Int. J. Inf. Secur. Priv. 5(1): 33-49 (2011) - [j3]Fan Zhang, Reiner Dojen, Tom Coffey:
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. Int. J. Sens. Networks 10(4): 192-201 (2011) - 2005
- [j2]Reiner Dojen, Tom Coffey:
The concept of layered proving trees and its application to the automation of security protocol verification. ACM Trans. Inf. Syst. Secur. 8(3): 287-311 (2005) - 2003
- [j1]Tom Coffey, Reiner Dojen, Tomas Flanagan:
Formal verification: an imperative step in the design of security protocols . Comput. Networks 43(5): 601-618 (2003)
Conference and Workshop Papers
- 2020
- [c12]Jinyong Chen, Reiner Dojen, Anca Jurcut:
Detection and Prevention of New Attacks for ID-based Authentication Protocols. ICNCC 2020: 78-86 - 2014
- [c11]Anca Jurcut, Tom Coffey, Reiner Dojen:
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool. CN 2014: 128-137 - [c10]Fan Zhang, Reiner Dojen:
EWAIP: An empirical Wireless Sensor Network applications implementation platform. FGCT 2014: 72-77 - [c9]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design requirements to counter parallel session attacks in security protocols. PST 2014: 298-305 - 2012
- [c8]Anca Jurcut, Tom Coffey, Reiner Dojen:
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. ARES 2012: 410-416 - 2009
- [c7]Reiner Dojen, Vladimir Pasca, Tom Coffey:
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. MobiSec 2009: 278-287 - 2008
- [c6]Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi:
On Establishing and Fixing a Parallel Session Attack in a Security Protocol. IDC 2008: 239-244 - [c5]Reiner Dojen, Fan Zhang, Tom Coffey:
On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks. IPCCC 2008: 499-506 - [c4]Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey:
Determining a parallel session attack on a key distribution protocol using a model checker. MoMM 2008: 150-155 - 2003
- [c3]Tom Coffey, Reiner Dojen, Tomas Flanagan:
On Different Approaches to Establish the Security of Cryptographic Protocols. Security and Management 2003: 637-643 - [c2]Tom Coffey, Reiner Dojen:
Analysis of a mobile communication security protocol. ISICT 2003: 322-328 - [c1]Tom Coffey, Reiner Dojen, Tomas Flanagan:
On the automated implementation of modal logics used to verify security protocols. ISICT 2003: 329-334
Informal and Other Publications
- 2021
- [i1]Jinyong Chen, Reiner Dojen, Anca Jurcut:
Detection and Prevention of New Attacks for ID-based Authentication Protocols. CoRR abs/2101.12604 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint