Sasa Radomirovic

Orcid: 0000-0001-5285-2297

According to our database1, Sasa Radomirovic authored at least 46 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Tactics for Account Access Graphs.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
"I'm Surprised So Much Is Connected".
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
"I'm Doing the Best I Can." - Understanding Technology Literate Older Adults' Account Management Strategies.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

Verifying Table-Based Elections.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Verification of stateful cryptographic protocols with exclusive OR.
J. Comput. Secur., 2020

Dispute Resolution in Voting.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Shaping Our Mental Model of Security (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019

Shaping Our Mental Model of Security.
Proceedings of the Security Protocols XXVII, 2019

User Account Access Graphs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Alethea: A Provably Secure Random Sample Voting Protocol.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

A Formal Analysis of 5G Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Force Open: Lightweight black box file repair.
Digit. Investig., 2017

An Anti-pattern for Misuse Cases.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

2016
Modeling Human Errors in Security Protocols.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Improving the Security of Cryptographic Protocol Standards.
IEEE Secur. Priv., 2015

Derailing Attacks.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Location-Private Interstellar Communication.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Attack Trees with Sequential Conjunction.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generalizing Multi-party Contract Signing.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Guided Specification and Analysis of a Loyalty Card System.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

A Complete Characterization of Secure Human-Server Communication.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Alice and Bob Meet Equational Theories.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
Attack-defense trees.
J. Log. Comput., 2014

2012
A Construction of Short Sequences Containing All Permutations of a Set as Subsequences.
Electron. J. Comb., 2012

Constructing Optimistic Multi-party Contract Signing Protocols.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
mCarve: Carving Attributed Dump Sets.
Proceedings of the 20th USENIX Security Symposium, 2011

Insider Attacks and Privacy of RFID Protocols.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2010
Contextual Biometric-Based Authentication for Ubiquitous Services.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

Security Protocols for Secret Santa.
Proceedings of the Security Protocols XVIII, 2010

EC-RAC: Enriching a Capacious RFID Attack Collection.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Foundations of Attack-Defense Trees.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

2009
On a new formal proof model for RFID location privacy.
Inf. Process. Lett., 2009

Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC.
IACR Cryptol. ePrint Arch., 2009

Algebraic Attacks on RFID Protocols.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Secure Ownership and Ownership Transfer in RFID Systems.
Proceedings of the Computer Security, 2009

Minimal Message Complexity of Asynchronous Multi-party Contract Signing.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Towards a Decision Model Based on Trust and Security Risk Management.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
A framework for compositional verification of security protocols.
Inf. Comput., 2008

On a New Formal Proof Model for RFID Location Privacy (Extended Version).
IACR Cryptol. ePrint Arch., 2008

Attacks on RFID Protocols.
IACR Cryptol. ePrint Arch., 2008

Security of RFID Protocols - A Case Study.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Untraceability of RFID Protocols.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Security of an RFID Protocol for Supply Chains.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

2006
Restricted Walks in Regular Trees.
Electron. J. Comb., 2006


  Loading...