Reiner Dojen
Orcid: 0000-0002-2113-5532
According to our database1,
Reiner Dojen
authored at least 22 papers
between 2003 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Proceedings of the ICNCC 2020: The 9th International Conference on Networks, 2020
2019
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks.
IEEE Trans. Dependable Secur. Comput., 2019
2018
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(s<sup>m</sup>) Based on Montgomery Arithmetic.
Secur. Commun. Networks, 2018
2014
Design guidelines for security protocols to prevent replay & parallel session attacks.
Comput. Secur., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
Proceedings of the Computer Networks - 21st International Conference, 2014
2013
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
J. Commun., 2013
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets.
Comput. Secur., 2013
2012
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node.
Int. J. Sens. Networks, 2011
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications.
Int. J. Inf. Secur. Priv., 2011
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications.
Comput. Electr. Eng., 2011
2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
2008
Determining a parallel session attack on a key distribution protocol using a model checker.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008
On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008
2005
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur., 2005
2003
Comput. Networks, 2003
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
On Different Approaches to Establish the Security of Cryptographic Protocols.
Proceedings of the International Conference on Security and Management, 2003