Reiner Dojen
Reiner Dojen
Electronic & Computer Engineering, University of Limerick
Verified email at ul.ie
TitleCited byYear
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node
F Zhang, R Dojen, T Coffey
International Journal of Sensor Networks 10 (4), 192-201, 2011
462011
Formal verification: an imperative step in the design of security protocols
T Coffey, R Dojen, T Flanagan
Computer Networks 43 (5), 601-618, 2003
402003
Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications
I Lasc, R Dojen, T Coffey
Computers & Electrical Engineering 37 (2), 160-168, 2011
242011
Layered proving trees: a novel approach to the automation of logic-based security protocol verification
R Dojen, T Coffey
ACM Transactions on Information and System Security (TISSEC) 8 (3), 287-311, 2005
192005
Design guidelines for security protocols to prevent replay & parallel session attacks
AD Jurcut, T Coffey, R Dojen
computers & Security 45, 255-273, 2014
152014
Establishing and fixing a freshness flaw in a key-distribution and authentication protocol
R Dojen, I Lasc, T Coffey
2008 4th International Conference on Intelligent Computer Communication and …, 2008
132008
On establishing and fixing a parallel session attack in a security protocol
R Dojen, A Jurcut, T Coffey, C Gyorodi
Intelligent distributed computing, systems and applications, 239-244, 2008
122008
Establishing and fixing security protocols weaknesses using a logic-based verification tool
A Jurcut, T Coffey, R Dojen
Journal of Communication 8 (11), 795-806, 2013
112013
On the prevention and detection of replay attacks using a logic-based verification tool
AD Jurcut, T Coffey, R Dojen
International conference on computer networks, 128-137, 2014
102014
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool
A Jurcut, T Coffey, Dojen, R.
Computer Networks, Communications in Computer and Information Science 431 …, 2014
102014
On the automated implementation of modal logics used to verify security protocols
T Coffey, R Dojen, T Flanagan
Proceedings of the 1st international symposium on Information and …, 2003
102003
On Different Approaches to Establish the Security of Cryptographic Protocols.
T Coffey, R Dojen, T Flanagan
Security and Management, 637-643, 2003
102003
Automated verification of wireless security protocols using layered proving trees.
M Ventuneac, R Dojen, T Coffey
WSEAS Transactions on Communications 5 (2), 252-258, 2006
82006
The concept of layered proving trees and its application to the automation of security protocol verification
R Dojen, T Coffey
ACM Transactions on Information and System Security (TISSEC) 8 (3), 287-311, 2005
82005
Analysis of a mobile communication security protocol
T Coffey, R Dojen
Proceedings of the 1st international symposium on Information and …, 2003
82003
A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks
A Jurcut, T Coffey, R Dojen
IEEE transactions on dependable and secure computing, 2017
72017
A comparative analysis of state-space tools for security protocol verification.
K Healy, T Coffey, R Dojen
WSEAS Transactions on Information Science and Applications 1 (5), 1256-1261, 2004
72004
On the formal verification of a cluster based key management protocol for wireless sensor networks
R Dojen, F Zhang, T Coffey
2008 IEEE International Performance, Computing and Communications Conference …, 2008
62008
Determining a parallel session attack on a key distribution protocol using a model checker
V Paşca, A Jurcuţ, R Dojen, T Coffey
Proceedings of the 6th International Conference on Advances in Mobile …, 2008
62008
A novel approach to the automation of logic-based security protocol verification.
R Dojen, T Coffey
WSEAS Transactions on Information Science and Applications 1 (5), 1243-1247, 2004
62004
The system can't perform the operation now. Try again later.
Articles 1–20