Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications I Lasc, R Dojen, T Coffey Computers & Electrical Engineering 37 (2), 160-168, 2011 | 61 | 2011 |
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node F Zhang, R Dojen, T Coffey International Journal of Sensor Networks 10 (4), 192-201, 2011 | 50 | 2011 |
Formal verification: an imperative step in the design of security protocols T Coffey, R Dojen, T Flanagan Computer Networks 43 (5), 601-618, 2003 | 44 | 2003 |
On establishing and fixing a parallel session attack in a security protocol R Dojen, A Jurcut, T Coffey, C Gyorodi Intelligent Distributed Computing, Systems and Applications: Proceedings of …, 2008 | 21 | 2008 |
Design guidelines for security protocols to prevent replay & parallel session attacks AD Jurcut, T Coffey, R Dojen computers & Security 45, 255-273, 2014 | 20 | 2014 |
Layered proving trees: A novel approach to the automation of logic-based security protocol verification R Dojen, T Coffey ACM Transactions on Information and System Security (TISSEC) 8 (3), 287-311, 2005 | 20 | 2005 |
Establishing and fixing a freshness flaw in a key-distribution and authentication protocol R Dojen, I Lasc, T Coffey 2008 4th International Conference on Intelligent Computer Communication and …, 2008 | 16 | 2008 |
A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks A Jurcut, T Coffey, R Dojen IEEE transactions on dependable and secure computing 16 (6), 969-983, 2017 | 15 | 2017 |
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool A Jurcut, T Coffey, Dojen, R. Computer Networks, Communications in Computer and Information Science 431 …, 2014 | 15 | 2014 |
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool. AD Jurcut, T Coffey, R Dojen J. Commun. 8 (11), 795-805, 2013 | 15 | 2013 |
Design requirements to counter parallel session attacks in security protocols AD Jurcut, T Coffey, R Dojen 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 12 | 2014 |
On the automated implementation of modal logics used to verify security protocols T Coffey, R Dojen, T Flanagan ISICT 3, 329-334, 2003 | 12 | 2003 |
A Novel Approach to Security Enhancement of Chaotic DSSS Systems NX Quyen, CT Nguyen, Barlet-Ros P., R Dojen IEEE International Conference on Communications and Electronics, 2016 | 10 | 2016 |
On the formal verification of a cluster based key management protocol for wireless sensor networks R Dojen, F Zhang, T Coffey 2008 IEEE International Performance, Computing and Communications Conference …, 2008 | 10 | 2008 |
Automated verification of wireless security protocols using layered proving trees. M Ventuneac, R Dojen, T Coffey WSEAS Transactions on Communications 5 (2), 252-258, 2006 | 10 | 2006 |
A comparative analysis of state-space tools for security protocol verification. K Healy, T Coffey, R Dojen WSEAS Transactions on Information Science and Applications 1 (5), 1256-1261, 2004 | 10 | 2004 |
On Different Approaches to Establish the Security of Cryptographic Protocols. T Coffey, R Dojen, T Flanagan Security and Management, 637-643, 2003 | 10 | 2003 |
Analysis of a mobile communication security protocol T Coffey, R Dojen ACM International Conference Proceeding Series 49, 322-328, 2003 | 9 | 2003 |
Security Protocol Design: A Case Study Using Key Distribution Protocols. A Jurcut, T Coffey, R Dojen, R Gyorodi Journal of Computer Science & Control Systems 2 (2), 2009 | 8 | 2009 |
The concept of layered proving trees and its application to the automation of security protocol verification R Dojen, T Coffey ACM Transactions on Information and System Security (TISSEC) 8 (3), 287-311, 2005 | 8 | 2005 |