Folgen
Stephan Wesemeyer
Titel
Zitiert von
Zitiert von
Jahr
Eavesdropping near‐field contactless payments: a quantitative analysis
TP Diakos, JA Briffa, TWC Brown, S Wesemeyer
The Journal of Engineering 2013 (10), 48-54, 2013
372013
An improved decoding algorithm for the Davey-MacKay construction
JA Briffa, HG Schaathun, S Wesemeyer
2010 IEEE International Conference on Communications, 1-5, 2010
312010
Formal analysis of V2X revocation protocols
J Whitefield, L Chen, F Kargl, A Paverd, S Schneider, H Treharne, ...
International Workshop on Security and Trust Management, 147-163, 2017
252017
On the automorphism group of various Goppa codes
S Wesemeyer
IEEE Transactions on Information Theory 44 (2), 630-643, 1998
251998
Formal security analysis of NFC M-coupon protocols using Casper/FDR
A Alshehri, JA Briffa, S Schneider, S Wesemeyer
2013 5th International Workshop on Near Field Communication (NFC), 1-6, 2013
212013
Iterative soft-decision decoding of linear block codes
P Sweeney, S Wesemeyer
IEE Proceedings-Communications 147 (3), 133-136, 2000
172000
A symbolic analysis of ecc-based direct anonymous attestation
J Whitefield, L Chen, R Sasse, S Schneider, H Treharne, S Wesemeyer
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 127-141, 2019
162019
Formal analysis and implementation of a TPM 2.0-based direct anonymous attestation scheme
S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
122020
Privacy-preserving electronic ticket scheme with attribute-based credentials
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
IEEE Transactions on Dependable and Secure Computing 18 (4), 1836-1849, 2019
102019
Anonymous single sign-on with proxy re-verification
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer, N Wilson
IEEE Transactions on Information Forensics and Security 15, 223-236, 2019
102019
Time‐varying block codes for synchronisation errors: maximum a posteriori decoder and practical issues
JA Briffa, V Buttigieg, S Wesemeyer
The Journal of Engineering 2014 (6), 340-351, 2014
102014
Anonymous Single-Sign-On for n Designated Services with Traceability
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
European Symposium on Research in Computer Security, 470-490, 2018
62018
Cloning localization based on feature extraction and k-means clustering
AS Alfraih, JA Briffa, S Wesemeyer
International Workshop on Digital Watermarking, 410-419, 2014
62014
SimCommSys: taking the errors out of error‐correcting code simulations
JA Briffa, S Wesemeyer
The Journal of Engineering 2014 (6), 332-339, 2014
62014
Soft-decision decoding algorithms for RS codes
D Burgess, S Wesemeyer, P Sweeney
Proc. Seventh IMA Conf. Cryptography and Coding, 177-181, 1999
41999
Suboptimal soft-decision decoding for some RS-codes
S Wesemeyer, P Sweeney
Electronics Letters 34 (10), 983-984, 1998
41998
Forgery localization based on image chroma feature extraction
AS Alfraih, JA Briffa, S Wesemeyer
5th International Conference on Imaging for Crime Detection and Prevention …, 2013
32013
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches
S Wesemeyer, I Boureanu, Z Smith, H Treharne
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020
22020
Personalised rail passenger experience and privacy
H Treharne, S Wesemeyer, S Schneider, T Ross, A May, S Cockbill, ...
22017
Privacy-preserving electronic ticket scheme with fine-grained pricing. CoRR
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
12017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20