Search the dblp DataBase
Tom Coffey :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tom Coffey , Reiner Dojen , Tomas Flanagan On Different Approaches to Establish the Security of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:637-643 [Conf ] Weijun Wang , Tom Coffey Network Security: Design of a Global Secure Link. [Citation Graph (0, 0)][DBLP ] SEC, 1992, pp:101-111 [Conf ] Tom Coffey , Reiner Dojen , Tomas Flanagan Formal verification: an imperative step in the design of security protocols . [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:43, n:5, pp:601-618 [Journal ] Tom Coffey , T. Newe Realisation of a minimum-knowledge identification and signature scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:3, pp:253-264 [Journal ] T. Newe , Tom Coffey Formal verification logic for hybrid security protocols. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2003, v:18, n:1, pp:17-25 [Journal ] Reiner Dojen , Tom Coffey The concept of layered proving trees and its application to the automation of security protocol verification. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:3, pp:287-311 [Journal ] Marian Ventuneac , Tom Coffey , Ioan Salomie A policy-based security framework for Web-enabled applications. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:487-492 [Conf ] Tom Coffey , Reiner Dojen , Tomas Flanagan On the automated implementation of modal logics used to verify security protocols. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:329-334 [Conf ] Tom Coffey , Puneet Saidha , Peter Burrows Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:351-356 [Conf ] T. Newe , Tom Coffey Security protocols for 2G and 3G wireless communications. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:335-340 [Conf ] Tom Coffey , Reiner Dojen Analysis of a mobile communication security protocol. [Citation Graph (0, 0)][DBLP ] ISICT, 2003, pp:322-328 [Conf ] Mihaela Dinsoreanu , Cristian Godja , Claudiu Anghel , Ioan Salomie , Tom Coffey Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Determining a parallel session attack on a key distribution protocol using a model checker. [Citation Graph (, )][DBLP ] On Establishing and Fixing a Parallel Session Attack in a Security Protocol. [Citation Graph (, )][DBLP ] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs