Follow
Reiner Dojen
Reiner Dojen
Electronic & Computer Engineering, University of Limerick
Verified email at ul.ie
Title
Cited by
Cited by
Year
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications
I Lasc, R Dojen, T Coffey
Computers & Electrical Engineering 37 (2), 160-168, 2011
572011
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node
F Zhang, R Dojen, T Coffey
International Journal of Sensor Networks 10 (4), 192-201, 2011
502011
Formal verification: an imperative step in the design of security protocols
T Coffey, R Dojen, T Flanagan
Computer Networks 43 (5), 601-618, 2003
432003
Design guidelines for security protocols to prevent replay & parallel session attacks
AD Jurcut, T Coffey, R Dojen
computers & Security 45, 255-273, 2014
202014
On establishing and fixing a parallel session attack in a security protocol
R Dojen, A Jurcut, T Coffey, C Gyorodi
Intelligent Distributed Computing, Systems and Applications: Proceedings of …, 2008
202008
Layered proving trees: A novel approach to the automation of logic-based security protocol verification
R Dojen, T Coffey
ACM Transactions on Information and System Security (TISSEC) 8 (3), 287-311, 2005
202005
Establishing and fixing a freshness flaw in a key-distribution and authentication protocol
R Dojen, I Lasc, T Coffey
2008 4th International Conference on Intelligent Computer Communication and …, 2008
162008
A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks
A Jurcut, T Coffey, R Dojen
IEEE transactions on dependable and secure computing 16 (6), 969-983, 2017
152017
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool
A Jurcut, T Coffey, Dojen, R.
Computer Networks, Communications in Computer and Information Science 431 …, 2014
152014
On the prevention and detection of replay attacks using a logic-based verification tool
AD Jurcut, T Coffey, R Dojen
Computer Networks: 21st International Conference, CN 2014, Brunów, Poland …, 2014
152014
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool.
AD Jurcut, T Coffey, R Dojen
J. Commun. 8 (11), 795-805, 2013
152013
On the automated implementation of modal logics used to verify security protocols
T Coffey, R Dojen, T Flanagan
ISICT 3, 329-334, 2003
122003
Design requirements to counter parallel session attacks in security protocols
AD Jurcut, T Coffey, R Dojen
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
112014
A Novel Approach to Security Enhancement of Chaotic DSSS Systems
NX Quyen, CT Nguyen, Barlet-Ros P., R Dojen
IEEE International Conference on Communications and Electronics, 2016
102016
On the formal verification of a cluster based key management protocol for wireless sensor networks
R Dojen, F Zhang, T Coffey
2008 IEEE International Performance, Computing and Communications Conference …, 2008
102008
Automated verification of wireless security protocols using layered proving trees.
M Ventuneac, R Dojen, T Coffey
WSEAS Transactions on Communications 5 (2), 252-258, 2006
102006
A comparative analysis of state-space tools for security protocol verification.
K Healy, T Coffey, R Dojen
WSEAS Transactions on Information Science and Applications 1 (5), 1256-1261, 2004
102004
On Different Approaches to Establish the Security of Cryptographic Protocols.
T Coffey, R Dojen, T Flanagan
Security and Management, 637-643, 2003
102003
Analysis of a mobile communication security protocol
T Coffey, R Dojen
ACM International Conference Proceeding Series 49, 322-328, 2003
92003
Security Protocol Design: A Case Study Using Key Distribution Protocols.
A Jurcut, T Coffey, R Dojen, R Gyorodi
Journal of Computer Science & Control Systems 2 (2), 2009
82009
The system can't perform the operation now. Try again later.
Articles 1–20