The SCEAS System
Navigation Menu

Search the dblp DataBase


Reiner Dojen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tom Coffey, Reiner Dojen, Tomas Flanagan
    On Different Approaches to Establish the Security of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:637-643 [Conf]
  2. Tom Coffey, Reiner Dojen, Tomas Flanagan
    Formal verification: an imperative step in the design of security protocols . [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:43, n:5, pp:601-618 [Journal]
  3. Reiner Dojen, Tom Coffey
    The concept of layered proving trees and its application to the automation of security protocol verification. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:3, pp:287-311 [Journal]
  4. Tom Coffey, Reiner Dojen, Tomas Flanagan
    On the automated implementation of modal logics used to verify security protocols. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:329-334 [Conf]
  5. Tom Coffey, Reiner Dojen
    Analysis of a mobile communication security protocol. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:322-328 [Conf]

  6. Determining a parallel session attack on a key distribution protocol using a model checker. [Citation Graph (, )][DBLP]

  7. On Establishing and Fixing a Parallel Session Attack in a Security Protocol. [Citation Graph (, )][DBLP]

  8. Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002