References of "Radomirovic, Sasa 40000554"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailLocation-private interstellar communication
Jonker, Hugo UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in 23rd Security Protocols Workshop (2015)

Detailed reference viewed: 55 (5 UL)
Full Text
Peer Reviewed
See detailGeneralizing multi-party contract signing
Mauw, Sjouke UL; Radomirovic, Sasa UL

in Proc. 4th Conference on Principles of Security and Trust (POST'15) (2015)

Multi-party contract signing (MPCS) protocols allow a group of signers to exchange signatures on a predefined contract. Previous approaches considered either completely linear protocols or fully parallel ... [more ▼]

Multi-party contract signing (MPCS) protocols allow a group of signers to exchange signatures on a predefined contract. Previous approaches considered either completely linear protocols or fully parallel broadcasting protocols. We introduce the new class of DAG MPCS protocols which combines parallel and linear execution and allows for parallelism even within a signer role. This generalization is useful in practical applications where the set of signers has a hierarchical structure, such as chaining of service level agreements and subcontracting. Our novel DAG MPCS protocols are represented by directed acyclic graphs and equipped with a labeled transition system semantics. We define the notion of abort-chaining sequences and prove that a DAG MPCS protocol satisfies fairness if and only if it does not have an abortchaining sequence. We exhibit several examples of optimistic fair DAG MPCS protocols. The fairness of these protocols follows from our theory and has additionally been verified with our automated tool. We define two complexity measures for DAG MPCS protocols, related to execution time and total number of messages exchanged. We prove lower bounds for fair DAG MPCS protocols in terms of these measures. [less ▲]

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailAttack-Defense Trees
Kordy, Barbara UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Journal of Logic & Computation (2012)

Attack-defense trees are a novel methodology for graphical security modeling and assessment. They extend the well known formalism of attack trees by allowing nodes that represent defensive measures to ... [more ▼]

Attack-defense trees are a novel methodology for graphical security modeling and assessment. They extend the well known formalism of attack trees by allowing nodes that represent defensive measures to appear at any level of the tree. This enlarges the modeling capabilities of attack trees and makes the new formalism suitable for representing interactions between an attacker and a defender. Our formalization supports different semantical approaches for which we provide usage scenarios. We also formalize how to quantitatively analyze attack and defense scenarios using attributes. [less ▲]

Detailed reference viewed: 163 (14 UL)
Full Text
Peer Reviewed
See detailConstructing Optimistic Multi-party Contract Signing Protocols
Kordy, Barbara UL; Radomirovic, Sasa UL

in Computer Security Foundations (CSF 2012) (2012)

Detailed reference viewed: 53 (0 UL)
Full Text
Peer Reviewed
See detailInsider Attacks and Privacy of RFID Protocols
van Deursen, Ton UL; Radomirovic, Sasa UL

in EuroPKI 2011 (2012)

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailmCarve: Carving attributed dump sets
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Abstract book of 20th USENIX Security Symposium (2011)

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailFoundations of Attack-Defense Trees
Kordy, Barbara UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010)

We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic ... [more ▼]

We introduce and give formal definitions of attack–defense trees. We argue that these trees are a simple, yet powerful tool to analyze complex security and privacy problems. Our formalization is generic in the sense that it supports different semantical approaches. We present several semantics for attack–defense trees along with usage scenarios, and we show how to evaluate attributes. [less ▲]

Detailed reference viewed: 67 (2 UL)
Full Text
Peer Reviewed
See detailSecurity protocols for Secret Santa
Mauw, Sjouke UL; Radomirovic, Sasa UL; Ryan, Peter UL

in Proc. 18th Security Protocols Workshop (2010)

Detailed reference viewed: 122 (4 UL)
Full Text
Peer Reviewed
See detailEC-RAC: Enriching a Capacious RFID Attack Collection
van Deursen, Ton UL; Radomirovic, Sasa UL

in 6th Workshop on RFID Security (RFIDSec 2010) (2010)

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailContextual biometric-based authentication for ubiquitous services
Buhan, Ileana; Lenzini, Gabriele UL; Radomirovic, Sasa UL

in Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (2010)

We introduce and comment on the concept of contextual pseudo identity. A contextual pseudo identity is a soft identity token that is built from both a user's biometric and the context. When it comes to ... [more ▼]

We introduce and comment on the concept of contextual pseudo identity. A contextual pseudo identity is a soft identity token that is built from both a user's biometric and the context. When it comes to ubiquitous authentication, a contextual pseudo identity promises better security than that o ered by traditional biometrics-based identity tokens: the use of context improves the tokens' disposability and renewability, which are two essential properties in the protection of a user's real identity. Our algorithm for generating contextual pseudo identities extends a Fuzzy Embedder so that it accepts both biometric and context dependent input. We prove that our way of processing the context preserves the security and reliability properties of the Fuzzy Embedder used in our extension. An example shows how a user can utilize contextual pseudo identity to authenticate to and access ubiquitous services. [less ▲]

Detailed reference viewed: 69 (0 UL)
Full Text
Peer Reviewed
See detailSecure ownership and ownership transfer in RFID systems
van Deursen, Ton UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009)

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailMinimal message complexity of asynchronous multi-party contract signing
Mauw, Sjouke UL; Radomirovic, Sasa UL; Dashti, M. Torabi

in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009)

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailTowards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo
Alcalde, Baptiste UL; Dubois, Eric; Mauw, Sjouke UL et al

in Seventh Australasian Information Security Conference (AISC 2009) (2009)

Detailed reference viewed: 47 (0 UL)
Full Text
Peer Reviewed
See detailAlgebraic attacks on RFID protocols
van Deursen, Ton UL; Radomirovic, Sasa UL

in Third IFIP WG 11.2 International Workshop (2009)

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailOn a new formal proof model for RFID location privacy
van Deursen, Ton UL; Radomirovic, Sasa UL

in Information Processing Letters (2009), 110(2), 57-61

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailSecurity of RFID protocols - A case study
van Deursen, Ton UL; Radomirovic, Sasa UL

in Electronic Notes in Theoretical Computer Science (2009), 244

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailTowards a Decision Model Based on Trust and Security Risk Management
Alcalde, Baptiste UL; Dubois, E.; Mauw, Sjouke UL et al

in Proc. 7th Australasian Information Security Conference - AISC'09 (2009)

Detailed reference viewed: 20 (0 UL)
Peer Reviewed
See detailSecurity of an RFID Protocol for Supply Chains
van Deursen, Ton UL; Radomirovic, Sasa UL

in Proceedings of the 1st Workshop on Advances in RFID, AIR'08 (2008)

Detailed reference viewed: 47 (1 UL)
Full Text
Peer Reviewed
See detailA framework for compositional verification of security protocols
Andova, S.; Cremers, C. J. F.; Gjøsteen, K. et al

in Information & Computation (2008), 206(2-4), 425-459

Detailed reference viewed: 50 (0 UL)
Full Text
Peer Reviewed
See detailChosen-name attacks: An overlooked class of type-flaw attacks
Ceelen, Pieter UL; Mauw, Sjouke UL; Radomirovic, Sasa UL

in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43

In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all ... [more ▼]

In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automatic verification tools are discussed. [less ▲]

Detailed reference viewed: 69 (0 UL)