Reiner Dojen

Orcid: 0000-0002-2113-5532

According to our database1, Reiner Dojen authored at least 22 papers between 2003 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Detection and Prevention of New Attacks for ID-based Authentication Protocols.
Proceedings of the ICNCC 2020: The 9th International Conference on Networks, 2020

2019
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks.
IEEE Trans. Dependable Secur. Comput., 2019

2018
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(s<sup>m</sup>) Based on Montgomery Arithmetic.
Secur. Commun. Networks, 2018

2014
Design guidelines for security protocols to prevent replay & parallel session attacks.
Comput. Secur., 2014

Design requirements to counter parallel session attacks in security protocols.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

EWAIP: An empirical Wireless Sensor Network applications implementation platform.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014

On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
J. Commun., 2013

On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets.
Comput. Secur., 2013

2012
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node.
Int. J. Sens. Networks, 2011

A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications.
Int. J. Inf. Secur. Priv., 2011

Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications.
Comput. Electr. Eng., 2011

2009
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

2008
Determining a parallel session attack on a key distribution protocol using a model checker.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008

On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008

On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008

2005
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur., 2005

2003
Formal verification: an imperative step in the design of security protocols .
Comput. Networks, 2003

On the automated implementation of modal logics used to verify security protocols.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

Analysis of a mobile communication security protocol.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

On Different Approaches to Establish the Security of Cryptographic Protocols.
Proceedings of the International Conference on Security and Management, 2003


  Loading...