Epistemic Model Checking for Privacy.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Verifying List Swarm Attestation Protocols.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Fine-Grained Trackability in Protocol Executions.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Systematic Improvement of Access-Stratum Security in Mobile Networks.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials.
IEEE Trans. Dependable Secur. Comput., 2021
Anonymous Single Sign-On With Proxy Re-Verification.
IEEE Trans. Inf. Forensics Secur., 2020
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Time-Varying Block Codes for Synchronization Errors: MAP Decoder and Practical Issues.
CoRR, 2018
SimCommSys: Taking the errors out of error-correcting code simulations.
CoRR, 2018
Anonymous Single-Sign-On for n Designated Services with Traceability.
Proceedings of the Computer Security, 2018
Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Cloning localization approach using k-means clustering and support vector machine.
J. Electronic Imaging, 2015
Cloning Localization Based on Feature Extraction and K-means Clustering.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Forgery localization based on image chroma feature extraction.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013
An Improved Decoding Algorithm for the Davey-MacKay Construction.
Proceedings of IEEE International Conference on Communications, 2010
Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes.
Proceedings of the Cryptography and Coding, 1999
On the Automorphism Group of Various Goppa Codes.
IEEE Trans. Inf. Theory, 1998