Sasa Radomirovic
Orcid: 0000-0001-5285-2297
According to our database1,
Sasa Radomirovic
authored at least 48 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
"I'm Doing the Best I Can." - Understanding Technology Literate Older Adults' Account Management Strategies.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
J. Comput. Secur., 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the Graphical Models for Security - Second International Workshop, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the Logic, Rewriting, and Concurrency, 2015
2014
2012
A Construction of Short Sequences Containing All Permutations of a Set as Subsequences.
Electron. J. Comb., 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Public Key Infrastructures, Services and Applications, 2011
2010
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
2009
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
Proceedings of the Computer Security, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
2007
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007
2006