The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tom Coffey: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tom Coffey, Reiner Dojen, Tomas Flanagan
    On Different Approaches to Establish the Security of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:637-643 [Conf]
  2. Weijun Wang, Tom Coffey
    Network Security: Design of a Global Secure Link. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:101-111 [Conf]
  3. Tom Coffey, Reiner Dojen, Tomas Flanagan
    Formal verification: an imperative step in the design of security protocols . [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:43, n:5, pp:601-618 [Journal]
  4. Tom Coffey, T. Newe
    Realisation of a minimum-knowledge identification and signature scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:253-264 [Journal]
  5. T. Newe, Tom Coffey
    Formal verification logic for hybrid security protocols. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2003, v:18, n:1, pp:17-25 [Journal]
  6. Reiner Dojen, Tom Coffey
    The concept of layered proving trees and its application to the automation of security protocol verification. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:3, pp:287-311 [Journal]
  7. Marian Ventuneac, Tom Coffey, Ioan Salomie
    A policy-based security framework for Web-enabled applications. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:487-492 [Conf]
  8. Tom Coffey, Reiner Dojen, Tomas Flanagan
    On the automated implementation of modal logics used to verify security protocols. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:329-334 [Conf]
  9. Tom Coffey, Puneet Saidha, Peter Burrows
    Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:351-356 [Conf]
  10. T. Newe, Tom Coffey
    Security protocols for 2G and 3G wireless communications. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:335-340 [Conf]
  11. Tom Coffey, Reiner Dojen
    Analysis of a mobile communication security protocol. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:322-328 [Conf]
  12. Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey
    Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  13. Determining a parallel session attack on a key distribution protocol using a model checker. [Citation Graph (, )][DBLP]


  14. On Establishing and Fixing a Parallel Session Attack in a Security Protocol. [Citation Graph (, )][DBLP]


  15. Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. [Citation Graph (, )][DBLP]


Search in 0.038secs, Finished in 0.038secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002