Author of the publication

Distance Hijacking Attacks on Distance Bounding Protocols.

, , , and . IEEE Symposium on Security and Privacy, page 113-127. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for compositional verification of security protocols., , , , , and . Inf. Comput., 206 (2-4): 425-459 (2008)Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal., and . Des. Codes Cryptogr., 74 (1): 183-218 (2015)Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 129-148. Springer, (2012)Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol.. ACNS, volume 5536 of Lecture Notes in Computer Science, page 20-33. (2009)Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2.. ESORICS, volume 6879 of Lecture Notes in Computer Science, page 315-334. Springer, (2011)Distance Hijacking Attacks on Distance Bounding Protocols., , , and . IEEE Symposium on Security and Privacy, page 113-127. IEEE Computer Society, (2012)Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs., , and . CSF, page 231-245. IEEE Computer Society, (2010)Distance Hijacking Attacks on Distance Bounding Protocols., , and . NDSS, The Internet Society, (2012)One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability., and . IACR Cryptology ePrint Archive, (2011)Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol.. IACR Cryptology ePrint Archive, (2008)