Foundations of attack–defense trees B Kordy, S Mauw, S Radomirović, P Schweitzer International Workshop on Formal Aspects in Security and Trust, 80-95, 2010 | 255 | 2010 |
Attack–defense trees B Kordy, S Mauw, S Radomirović, P Schweitzer Journal of Logic and Computation 24 (1), 55-87, 2014 | 152 | 2014 |
A formal analysis of 5G authentication D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 144 | 2018 |
Attacks on RFID protocols T Van Deursen, S Radomirović Cryptology ePrint Archive 2008 (310), 1-56, 2009 | 115 | 2009 |
Untraceability of RFID protocols T Van Deursen, S Mauw, S Radomirović IFIP International Workshop on Information Security Theory and Practices, 1-15, 2008 | 89 | 2008 |
Attack trees with sequential conjunction R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua IFIP International Information Security and Privacy Conference, 339-353, 2015 | 77 | 2015 |
A framework for compositional verification of security protocols S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović Information and Computation 206 (2-4), 425-459, 2008 | 77 | 2008 |
Secure ownership and ownership transfer in RFID systems T Van Deursen, S Mauw, S Radomirović, P Vullers European Symposium on Research in Computer Security, 637-654, 2009 | 53 | 2009 |
Algebraic attacks on RFID protocols T Van Deursen, S Radomirović IFIP International Workshop on Information Security Theory and Practices, 38-51, 2009 | 47 | 2009 |
Towards a Model for Security and Privacy in the Internet of Things S Radomirovic Proc. First Int’l Workshop on Security of the Internet of Things, 6, 2010 | 43 | 2010 |
Security of RFID protocols–a case study T van Deursen, S Radomirović Electronic Notes in Theoretical Computer Science 244, 41-52, 2009 | 43 | 2009 |
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC T van Deursen, S Radomirović Cryptology ePrint Archive 2009 (332), 1-8, 2009 | 37 | 2009 |
Modeling human errors in security protocols D Basin, S Radomirovic, L Schmid 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 325-340, 2016 | 31 | 2016 |
A complete characterization of secure human-server communication D Basin, S Radomirovic, M Schläepfer 2015 IEEE 28th Computer Security Foundations Symposium, 199-213, 2015 | 27 | 2015 |
On a new formal proof model for RFID location privacy T Van Deursen, S Radomirović Information Processing Letters 110 (2), 57-61, 2009 | 27 | 2009 |
Improving the security of cryptographic protocol standards D Basin, C Cremers, K Miyazaki, S Radomirovic, D Watanabe IEEE Security & Privacy 13 (3), 24-31, 2014 | 26 | 2014 |
Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo B Alcalde, E Dubois, S Mauw, N Mayer, S Radomirovic Seventh Australasian Information Security Conference (AISC 2009), 61-69, 2009 | 26 | 2009 |
Security of an RFID protocol for supply chains T van Deursen, S Radomirovic 2008 IEEE International Conference on e-Business Engineering, 568-573, 2008 | 26 | 2008 |
Attacks on RFID protocols T Deursen, S Radomirovic IACR EPrint, July, 2008 | 26 | 2008 |
Automated unbounded verification of stateful cryptographic protocols with exclusive OR J Dreier, L Hirschi, S Radomirovic, R Sasse 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018 | 24 | 2018 |