Author of the publication

Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications.

, , and . MobiSec, volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 278-287. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EWAIP: An empirical Wireless Sensor Network applications implementation platform., and . FGCT, page 72-77. IEEE, (2014)On the automated implementation of modal logics used to verify security protocols., , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 329-334. Trinity College Dublin, (2003)Design guidelines for security protocols to prevent replay & parallel session attacks., , and . Computers & Security, (2014)Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node., , and . IJSNet, 10 (4): 192-201 (2011)Determining a parallel session attack on a key distribution protocol using a model checker., , , and . MoMM, page 150-155. ACM, (2008)A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks., , and . IEEE Trans. Dependable Sec. Comput., 16 (6): 969-983 (2019)Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications., , and . MobiSec, volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 278-287. Springer, (2009)Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications., , and . Computers & Electrical Engineering, 37 (2): 160-168 (2011)On Different Approaches to Establish the Security of Cryptographic Protocols., , and . Security and Management, page 637-643. CSREA Press, (2003)Design requirements to counter parallel session attacks in security protocols., , and . PST, page 298-305. IEEE, (2014)