Britta Hale

Orcid: 0000-0003-1131-2109

According to our database1, Britta Hale authored at least 30 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Introduction to the Minitrack on Critical Infrastructure and Cyber Systems.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Zero-Trust for the System Design Lifecycle.
J. Comput. Inf. Sci. Eng., December, 2023

Guardianship in Group Key Exchange for Limited Environments.
IACR Cryptol. ePrint Arch., 2023

Authenticated Continuous Key Agreement: Active MitM Detection and Prevention.
IACR Cryptol. ePrint Arch., 2023

A Note on Hybrid Signature Schemes.
IACR Cryptol. ePrint Arch., 2023

Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Utilizing the Messaging Layer Security Protocol in a Lossy Communications Aerial Swarm.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components.
Proceedings of the Artificial Intelligence and Cybersecurity: Theory and Applications, 2023

2022
On End-to-End Encryption.
IACR Cryptol. ePrint Arch., 2022

Securing Software Updates under Receiver Radio Frequency Geolocation Risk.
Proceedings of the IEEE Military Communications Conference, 2022

Blockchain-based Authenticated Stego-Channels: A Security Framework and Construction.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
System Analysis of Counter-Unmanned Aerial Systems Kill Chain in an Operational Environment.
Syst., 2021

A Zero Trust Hybrid Security and Safety Risk Analysis Method.
J. Comput. Inf. Sci. Eng., 2021

The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol.
IACR Cryptol. ePrint Arch., 2021

The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter.
Proceedings of the 30th USENIX Security Symposium, 2021

Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Secure Messaging Authentication against Active Man-in-the-Middle Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
User-mediated authentication protocols and unforgeability in key collision.
Int. J. Inf. Sec., 2020

There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging.
IACR Cryptol. ePrint Arch., 2020

2019
Computationally Modeling User-Mediated Authentication Protocols.
IACR Cryptol. ePrint Arch., 2019

Revisiting Post-Compromise Security Guarantees in Group Messaging.
IACR Cryptol. ePrint Arch., 2019

2017
0-RTT Key Exchange with Full Forward Secrecy.
IACR Cryptol. ePrint Arch., 2017

Secure Channels and Termination: The Last Word on TLS.
IACR Cryptol. ePrint Arch., 2017

Simple Security Definitions for and Constructions of 0-RTT Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

2015
Speeding: On Low-Latency Key Exchange.
IACR Cryptol. ePrint Arch., 2015

CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite.
IACR Cryptol. ePrint Arch., 2015

From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
IACR Cryptol. ePrint Arch., 2015

2014
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014


  Loading...