Login / Signup
Reiner Dojen
ORCID
Publication Activity (10 Years)
Years Active: 2003-2021
Publications (10 Years): 4
Top Topics
Authentication Protocol
Security Protocols
Design Guidelines
Attack Detection
Top Venues
Comput. Secur.
FGCT
CoRR
PST
</>
Publications
</>
Jinyong Chen
,
Reiner Dojen
,
Anca Jurcut
Detection and Prevention of New Attacks for ID-based Authentication Protocols.
CoRR
(2021)
Jinyong Chen
,
Reiner Dojen
,
Anca Jurcut
Detection and Prevention of New Attacks for ID-based Authentication Protocols.
ICNCC
(2020)
Anca Jurcut
,
Tom Coffey
,
Reiner Dojen
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks.
IEEE Trans. Dependable Secur. Comput.
16 (6) (2019)
Martin Schramm
,
Reiner Dojen
,
Michael Heigl
) Based on Montgomery Arithmetic.
Secur. Commun. Networks
2018 (2018)
Anca Jurcut
,
Tom Coffey
,
Reiner Dojen
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
CN
(2014)
Fan Zhang
,
Reiner Dojen
EWAIP: An empirical Wireless Sensor Network applications implementation platform.
FGCT
(2014)
Anca D. Jurcut
,
Tom Coffey
,
Reiner Dojen
Design requirements to counter parallel session attacks in security protocols.
PST
(2014)
Anca D. Jurcut
,
Tom Coffey
,
Reiner Dojen
Design guidelines for security protocols to prevent replay & parallel session attacks.
Comput. Secur.
45 (2014)
Ioana Lasc
,
Reiner Dojen
,
Tom Coffey
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets.
Comput. Secur.
32 (2013)
Anca D. Jurcut
,
Tom Coffey
,
Reiner Dojen
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
J. Commun.
8 (11) (2013)
Anca Jurcut
,
Tom Coffey
,
Reiner Dojen
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
ARES
(2012)
Fan Zhang
,
Reiner Dojen
,
Tom Coffey
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node.
Int. J. Sens. Networks
10 (4) (2011)
Ioana Lasc
,
Reiner Dojen
,
Tom Coffey
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications.
Int. J. Inf. Secur. Priv.
5 (1) (2011)
Ioana Lasc
,
Reiner Dojen
,
Tom Coffey
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications.
Comput. Electr. Eng.
37 (2) (2011)
Reiner Dojen
,
Vladimir Pasca
,
Tom Coffey
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications.
MobiSec
(2009)
Vladimir Pasca
,
Anca Jurcut
,
Reiner Dojen
,
Tom Coffey
Determining a parallel session attack on a key distribution protocol using a model checker.
MoMM
(2008)
Reiner Dojen
,
Fan Zhang
,
Tom Coffey
On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks.
IPCCC
(2008)
Reiner Dojen
,
Anca Jurcut
,
Tom Coffey
,
Cornelia Györödi
On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
IDC
(2008)
Reiner Dojen
,
Tom Coffey
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur.
8 (3) (2005)
Tom Coffey
,
Reiner Dojen
,
Tomas Flanagan
On the automated implementation of modal logics used to verify security protocols.
ISICT
(2003)
Tom Coffey
,
Reiner Dojen
,
Tomas Flanagan
Formal verification: an imperative step in the design of security protocols .
Comput. Networks
43 (5) (2003)
Tom Coffey
,
Reiner Dojen
Analysis of a mobile communication security protocol.
ISICT
(2003)
Tom Coffey
,
Reiner Dojen
,
Tomas Flanagan
On Different Approaches to Establish the Security of Cryptographic Protocols.
Security and Management
(2003)