researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2014
2015
2016
2018
2019
2020
2023
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Antonio González-Burgueño
Catherine Meadows
Chris J. Mitchell
Feng Hao
Frank Morgner
Harry Halpin
John D. Ramsdell
Joshua D. Guttman
José Meseguer
Kazuki Yoneyama
Keith M. Martin
Kenneth G. Paterson
Kristof Teichel
Marc Fischlin
Mark Manulis
Maryam Mehrnezhad
Mohammed Shafiul Alam Khan
Paul D. Rowe
Saqib A. Kakvi
Siamak Fayyaz Shahandashti
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
authentication
channel
conference
december
improving
international
iso
key
privacy
proceedings
protocol
protocols
quantum
research
secure
security
ssr
standardisation
standards
SSR (secsr)
Editions
Publications
Viewing Publication 1 - 75 from 75
2023
Security Standardisation Research - 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings
Felix Günther 0001
,
Julia Hesse
, editors,
Volume 13895 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Post-quantum Security for the Extended Access Control Protocol
Marc Fischlin
,
Jonas von der Heyden
,
Marian Margraf
,
Frank Morgner
,
Andreas Wallner
,
Holger Bock
.
secsr 2023
:
22-52
[doi]
Quantum-Resistant MACsec and IPsec for Virtual Private Networks
Stefan-Lukas Gazdag
,
Sophia Grundner-Culemann
,
Tobias Heider
,
Daniel Herzinger
,
Felix Schärtl
,
Joo Yeon Cho
,
Tobias Guggemos
,
Daniel Loebenberger
.
secsr 2023
:
1-21
[doi]
SoK: Anonymous Credentials
Saqib A. Kakvi
,
Keith M. Martin
,
Colin Putman
,
Elizabeth A. Quaglia
.
secsr 2023
:
129-151
[doi]
Vision Paper: Do We Need to Change Some Things? - Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments
Panos Kampanakis
,
Tancrède Lepoint
.
secsr 2023
:
78-102
[doi]
A Study of KEM Generalizations
Bertram Poettering
,
Simon Rastikian
.
secsr 2023
:
53-77
[doi]
On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT
Md. Wasiuddin Pathan Shuvo
,
Md. Nazmul Hoq
,
Suryadipta Majumdar
,
Paria Shirani
.
secsr 2023
:
103-128
[doi]
2020
On Internal Re-keying
Liliya R. Akhmetzyanova
,
Evgeny K. Alekseev
,
Stanislav Smyshlyaev
,
Igor B. Oshkin
.
secsr 2020
:
23-45
[doi]
The Vacuity of the Open Source Security Testing Methodology Manual
Martin R. Albrecht
,
Rikke Bjerg Jensen
.
secsr 2020
:
114-147
[doi]
A Systematic Appraisal of Side Channel Evaluation Strategies
Melissa Azouaoui
,
Davide Bellizia
,
Ileana Buhan
,
Nicolas Debande
,
Sébastien Duval
,
Christophe Giraud 0001
,
Éliane Jaulmes
,
François Koeune
,
Elisabeth Oswald
,
François-Xavier Standaert
,
Carolyn Whitnall
.
secsr 2020
:
46-66
[doi]
On the Memory Fault Resilience of TLS 1.3
Lukas Brandstetter
,
Marc Fischlin
,
Robin Leander Schröder
,
Michael Yonli
.
secsr 2020
:
1-22
[doi]
Taming the Many EdDSAs
Konstantinos Chalkias
,
François Garillot
,
Valeria Nikolaenko
.
secsr 2020
:
67-90
[doi]
Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings
Thyla Van der Merwe
,
Chris J. Mitchell
,
Maryam Mehrnezhad
, editors,
Volume 12529 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Vision: A Critique of Immunity Passports and W3C Decentralized Identifiers
Harry Halpin
.
secsr 2020
:
148-168
[doi]
SoK: Comparison of the Security of Real World RSA Hash-and-Sign Signatures
Saqib A. Kakvi
.
secsr 2020
:
91-113
[doi]
2019
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs
Orr Dunkelman
,
Léo Perrin
.
secsr 2019
:
69-80
[doi]
On the Security of RSA-PSS in the Wild
Saqib A. Kakvi
.
secsr 2019
:
23-34
[doi]
Privacy Preserving AKMA in 5G
Mohsin Khan
,
Philip Ginzboorg
,
Valtteri Niemi
.
secsr 2019
:
45-56
[doi]
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect
Wanpeng Li
,
Chris J. Mitchell
,
Thomas Chen
.
secsr 2019
:
35-44
[doi]
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019
Maryam Mehrnezhad
,
Thyla Van der Merwe
,
Feng Hao
, editors,
ACM,
2019.
[doi]
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors
Justin Whitaker
,
Sathvik Prasad
,
Bradley Reaves
,
William Enck
.
secsr 2019
:
57-68
[doi]
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogeny
Kazuki Yoneyama
.
secsr 2019
:
13-21
[doi]
Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept
Flor Álvarez
,
Lars Almon
,
Ann-Sophie Hahn
,
Matthias Hollick
.
secsr 2019
:
1-12
[doi]
2018
Building Blocks in Standards: Improving Consistency in Standardization with Ontology and Reasoning
Marcello Balduccini
,
Claire Vishik
.
secsr 2018
:
76-94
[doi]
hacspec: Towards Verifiable Crypto Standards
Karthikeyan Bhargavan
,
Franziskus Kiefer
,
Pierre-Yves Strub
.
secsr 2018
:
1-20
[doi]
Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC)
Alessandro Bruni
,
Thorvald Sahl Jørgensen
,
Theis Grønbech Petersen
,
Carsten Schürmann
.
secsr 2018
:
21-36
[doi]
Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings
Cas Cremers
,
Anja Lehmann
, editors,
Volume 11322 of
Lecture Notes in Computer Science
, Springer,
2018.
[doi]
Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols
Harry Halpin
,
Ksenia Ermoshina
,
Francesca Musiani
.
secsr 2018
:
56-75
[doi]
Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification
Darren Hurley-Smith
,
Julio Hernandez-Castro
.
secsr 2018
:
143-163
[doi]
The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party
John Kelsey
.
secsr 2018
:
164-184
[doi]
Defeating the Downgrade Attack on Identity Privacy in 5G
Mohsin Khan
,
Philip Ginzboorg
,
Kimmo Järvinen 0001
,
Valtteri Niemi
.
secsr 2018
:
95-119
[doi]
Identity Confidentiality in 5G Mobile Telephony Systems
Haibat Khan
,
Benjamin Dowling
,
Keith M. Martin
.
secsr 2018
:
120-142
[doi]
Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization Protocols
Kristof Teichel
,
Gregor Hildermeier
.
secsr 2018
:
37-55
[doi]
2016
Security Analysis of the W3C Web Cryptography API
Kelsey Cairns
,
Harry Halpin
,
Graham Steel
.
secsr 2016
:
112-140
[doi]
Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings
Lidong Chen
,
David A. McGrew
,
Chris Mitchell
, editors,
Volume 10074 of
Lecture Notes in Computer Science
, Springer,
2016.
[doi]
Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities
Liqun Chen
,
Rainer Urian
.
secsr 2016
:
141-159
[doi]
Cross-Tool Semantics for Protocol Security Goals
Joshua D. Guttman
,
John D. Ramsdell
,
Paul D. Rowe
.
secsr 2016
:
32-61
[doi]
Secure Multicast Group Management and Key Distribution in IEEE 802.21
Yoshikazu Hanatani
,
Naoki Ogura
,
Yoshihiro Ohba
,
Lidong Chen
,
Subir Das
.
secsr 2016
:
227-243
[doi]
Analysis of a Proposed Hash-Based Signature Standard
Jonathan Katz
.
secsr 2016
:
261-273
[doi]
Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements
Alberto De la Rosa Algarin
,
Steven A. Demurjian
.
secsr 2016
:
187-204
[doi]
State Management for Hash-Based Signatures
David A. McGrew
,
Panos Kampanakis
,
Scott R. Fluhrer
,
Stefan-Lukas Gazdag
,
Denis Butin
,
Johannes A. Buchmann
.
secsr 2016
:
244-260
[doi]
NFC Payment Spy: A Privacy Attack on Contactless Payments
Maryam Mehrnezhad
,
Mohammed Aamir Ali
,
Feng Hao
,
Aad van Moorsel
.
secsr 2016
:
92-111
[doi]
Attribute-Based Access Control Architectures with the eIDAS Protocols
Frank Morgner
,
Paul Bastian
,
Marc Fischlin
.
secsr 2016
:
205-226
[doi]
Reactive and Proactive Standardisation of TLS
Kenneth G. Paterson
,
Thyla Van der Merwe
.
secsr 2016
:
160-186
[doi]
Cryptanalysis of GlobalPlatform Secure Channel Protocols
Mohamed Sabt
,
Jacques Traoré
.
secsr 2016
:
62-91
[doi]
Analyzing and Fixing the QACCE Security of QUIC
Hideki Sakurada
,
Kazuki Yoneyama
,
Yoshikazu Hanatani
,
Maki Yoshida
.
secsr 2016
:
1-31
[doi]
2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to
Daniel J. Bernstein
,
Tung Chou
,
Chitchanok Chuengsatiansup
,
Andreas Hülsing
,
Eran Lambooij
,
Tanja Lange
,
Ruben Niederhagen
,
Christine van Vredendaal
.
secsr 2015
:
109-139
[doi]
Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings
Liqun Chen
,
Shin'ichiro Matsuo
, editors,
Volume 9497 of
Lecture Notes in Computer Science
, Springer,
2015.
[doi]
Analysis of the PKCS#11 API Using the Maude-NPA Tool
Antonio González-Burgueño
,
Sonia Santiago
,
Santiago Escobar
,
Catherine Meadows
,
José Meseguer
.
secsr 2015
:
86-106
[doi]
Formal Support for Standardizing Protocols with State
Joshua D. Guttman
,
Moses D. Liskov
,
John D. Ramsdell
,
Paul D. Rowe
.
secsr 2015
:
246-265
[doi]
A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks
Masatoshi Hokino
,
Yuri Fujiki
,
Sakura Onda
,
Takeaki Kaneko
,
Natsuhiko Sakimura
,
Hiroyuki Sato
.
secsr 2015
:
203-217
[doi]
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures
Jung Yeon Hwang
,
Seung-Hyun Kim
,
Daeseon Choi
,
Seung Hun Jin
,
Boyeon Song
.
secsr 2015
:
43-69
[doi]
Generating Unlinkable IPv6 Addresses
Mwawi Nyirenda Kayuni
,
Mohammed Shafiul Alam Khan
,
Wanpeng Li
,
Chris J. Mitchell
,
Po-Wah Yau
.
secsr 2015
:
185-199
[doi]
Improving Air Interface User Privacy in Mobile Telephony
Mohammed Shafiul Alam Khan
,
Chris J. Mitchell
.
secsr 2015
:
165-184
[doi]
Authenticated Key Exchange over Bitcoin
Patrick McCorry
,
Siamak Fayyaz Shahandashti
,
Dylan Clarke
,
Feng Hao
.
secsr 2015
:
3-20
[doi]
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment
Maryam Mehrnezhad
,
Feng Hao
,
Siamak Fayyaz Shahandashti
.
secsr 2015
:
21-39
[doi]
Non-repudiation Services for the MMS Protocol of IEC 61850
Karl Christoph Ruland
,
Jochen Sassmannshausen
.
secsr 2015
:
70-85
[doi]
Side Channel Cryptanalysis of Streebog
Gautham Sekar
.
secsr 2015
:
154-162
[doi]
First Results of a Formal Analysis of the Network Time Security Specification
Kristof Teichel
,
Dieter Sibold
,
Stefan Milius
.
secsr 2015
:
218-245
[doi]
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks
Zhenfeng Zhang
,
Kang Yang
,
Jiang Zhang
,
Cheng Chen
.
secsr 2015
:
140-153
[doi]
2014
Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping
Alan Anwer Abdulla
,
Harin Sellahewa
,
Sabah A. Jassim
.
secsr 2014
:
151-166
[doi]
Analyzing Proposals for Improving Authentication on the TLS/SSL-Protected Web
Christopher W. Brown
,
Michael Jenkins
.
secsr 2014
:
39-56
[doi]
Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
Liqun Chen
,
Chris J. Mitchell
, editors,
Volume 8893 of
Lecture Notes in Computer Science
, Springer,
2014.
[doi]
Improving the ISO/IEC 11770 Standard for Key Management Techniques
Cas Cremers
,
Marko Horvat
.
secsr 2014
:
215-235
[doi]
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol
Jean Paul Degabriele
,
Victoria Fehr
,
Marc Fischlin
,
Tommaso Gagliardoni
,
Felix Günther
,
Giorgia Azzurra Marson
,
Arno Mittelbach
,
Kenneth G. Paterson
.
secsr 2014
:
1-25
[doi]
A Modular Framework for Multi-Factor Authentication and Key Exchange
Nils Fleischhacker
,
Mark Manulis
,
Amir Azodi
.
secsr 2014
:
190-214
[doi]
Blinded Diffie-Hellman - Preventing Eavesdroppers from Tracking Payments
Duncan Garrett
,
Michael Ward
.
secsr 2014
:
79-92
[doi]
Analysis of the IBM CCA Security API Protocols in Maude-NPA
Antonio González-Burgueño
,
Sonia Santiago
,
Santiago Escobar
,
Catherine Meadows
,
José Meseguer
.
secsr 2014
:
111-130
[doi]
Standardization Transparency - An Out of Body Experience
Phillip H. Griffin
.
secsr 2014
:
57-68
[doi]
Security Goals and Evolving Standards
Joshua D. Guttman
,
Moses D. Liskov
,
Paul D. Rowe
.
secsr 2014
:
93-110
[doi]
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
Britta Hale
,
Colin Boyd
.
secsr 2014
:
236-255
[doi]
The SPEKE Protocol Revisited
Feng Hao
,
Siamak Fayyaz Shahandashti
.
secsr 2014
:
26-38
[doi]
Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode
Jinwoo Lee
,
Pil Joong Lee
.
secsr 2014
:
69-78
[doi]
Secure Modular Password Authentication for the Web Using Channel Bindings
Mark Manulis
,
Douglas Stebila
,
Nick Denham
.
secsr 2014
:
167-189
[doi]
Robustness Modelling and Verification of a Mix Net Protocol
Efstathios Stathakidis
,
Steve A. Schneider
,
James Heather
.
secsr 2014
:
131-150
[doi]
Sign in
or
sign up
to see more results.