Tom Coffey
According to our database1,
Tom Coffey
authored at least 27 papers
between 1992 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks.
IEEE Trans. Dependable Secur. Comput., 2019
2014
Design guidelines for security protocols to prevent replay & parallel session attacks.
Comput. Secur., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool.
Proceedings of the Computer Networks - 21st International Conference, 2014
2013
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
J. Commun., 2013
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets.
Comput. Secur., 2013
2012
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node.
Int. J. Sens. Networks, 2011
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications.
Int. J. Inf. Secur. Priv., 2011
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications.
Comput. Electr. Eng., 2011
2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
2008
Determining a parallel session attack on a key distribution protocol using a model checker.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008
On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008
2006
CoRR, 2006
2005
The concept of layered proving trees and its application to the automation of security protocol verification.
ACM Trans. Inf. Syst. Secur., 2005
2003
Formal verification logic for hybrid security protocols.
Comput. Syst. Sci. Eng., 2003
Comput. Networks, 2003
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003
On Different Approaches to Establish the Security of Cryptographic Protocols.
Proceedings of the International Conference on Security and Management, 2003
1998
Comput. Secur., 1998
1996
1992
Network Security: Design of a Global Secure Link.
Proceedings of the IT Security: The Need for International Cooperation, 1992