Tom Coffey

According to our database1, Tom Coffey authored at least 27 papers between 1992 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks.
IEEE Trans. Dependable Secur. Comput., 2019

2014
Design guidelines for security protocols to prevent replay & parallel session attacks.
Comput. Secur., 2014

Design requirements to counter parallel session attacks in security protocols.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
J. Commun., 2013

On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets.
Comput. Secur., 2013

2012
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node.
Int. J. Sens. Networks, 2011

A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications.
Int. J. Inf. Secur. Priv., 2011

Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications.
Comput. Electr. Eng., 2011

2009
Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

2008
Determining a parallel session attack on a key distribution protocol using a model checker.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008

On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008

On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008

2006
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments
CoRR, 2006

2005
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur., 2005

2003
Formal verification logic for hybrid security protocols.
Comput. Syst. Sci. Eng., 2003

Formal verification: an imperative step in the design of security protocols .
Comput. Networks, 2003

A policy-based security framework for Web-enabled applications.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

Security protocols for 2G and 3G wireless communications.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

On the automated implementation of modal logics used to verify security protocols.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

Analysis of a mobile communication security protocol.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

On Different Approaches to Establish the Security of Cryptographic Protocols.
Proceedings of the International Conference on Security and Management, 2003

1998
Realisation of a minimum-knowledge identification and signature scheme.
Comput. Secur., 1998

1996
Non-repudiation with mandatory proof of receipt.
Comput. Commun. Rev., 1996

1992
Network Security: Design of a Global Secure Link.
Proceedings of the IT Security: The Need for International Cooperation, 1992


  Loading...