Profil

RADOMIROVIC Sasa

Main Referenced Co-authors
MAUW, Sjouke  (13)
VAN DEURSEN, Ton  (9)
KORDY, Barbara  (3)
ALCALDE, Baptiste  (2)
Mayer, N. (2)
Main Referenced Keywords
Attack Trees (2); Attack-Defense Trees (2); Attributes (1); authentication (1); automatic verification (1);
Main Referenced Disciplines
Computer science (21)

Publications (total 21)

The most downloaded
275 downloads
Mauw, S., Radomirovic, S., & Ryan, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag. https://hdl.handle.net/10993/25936

The most cited

167 citations (Scopus®)

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer. https://hdl.handle.net/10993/11461

Mauw, S., & Radomirovic, S. (2015). Generalizing multi-party contract signing. In Proc. 4th Conference on Principles of Security and Trust (POST'15). London, UK, Unknown/unspecified: Springer Verlag.
Peer reviewed

Jonker, H., Mauw, S., & Radomirovic, S. (2015). Location-private interstellar communication. In 23rd Security Protocols Workshop. Springer-Verlag. doi:10.1007/978-3-319-26096-9_11
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2012). Attack-Defense Trees. Journal of Logic and Computation. doi:10.1093/logcom/exs029
Peer reviewed

van Deursen, T., & Radomirovic, S. (2012). Insider Attacks and Privacy of RFID Protocols. In EuroPKI 2011 (pp. 91-105). Springer.
Peer reviewed

Kordy, B., & Radomirovic, S. (2012). Constructing Optimistic Multi-party Contract Signing Protocols. In Computer Security Foundations (CSF 2012) (pp. 215-229). IEEE.
Peer reviewed

van Deursen, T., Mauw, S., & Radomirovic, S. (2011). mCarve: Carving attributed dump sets. Abstract book of 20th USENIX Security Symposium, 107-121.
Peer reviewed

van Deursen, T., & Radomirovic, S. (2010). EC-RAC: Enriching a Capacious RFID Attack Collection. In 6th Workshop on RFID Security (RFIDSec 2010) (pp. 75–90). Springer.
Peer reviewed

Mauw, S., Radomirovic, S., & Ryan, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag.
Peer reviewed

Kordy, B., Mauw, S., Radomirovic, S., & Schweitzer, P. (2010). Foundations of Attack-Defense Trees. In Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (pp. 80-95). Springer.
Peer reviewed

Buhan, I., Lenzini, G., & Radomirovic, S. (2010). Contextual biometric-based authentication for ubiquitous services. In Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (pp. 680-693). Springer. doi:10.1007/978-3-642-16355-5_51
Peer reviewed

van Deursen, T., & Radomirovic, S. (2009). Algebraic attacks on RFID protocols. In Third IFIP WG 11.2 International Workshop (pp. 38-51). Springer.
Peer reviewed

van Deursen, T., & Radomirovic, S. (2009). Security of RFID protocols - A case study. Electronic Notes in Theoretical Computer Science, 244, 41-52. doi:10.1016/j.entcs.2009.07.037
Peer reviewed

Mauw, S., Radomirovic, S., & Dashti, M. T. (2009). Minimal message complexity of asynchronous multi-party contract signing. Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), 13–25. doi:10.1109/CSF.2009.15
Peer reviewed

van Deursen, T., Mauw, S., Radomirovic, S., & Vullers, P. (2009). Secure ownership and ownership transfer in RFID systems. In Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (pp. 637-654). Springer.
Peer reviewed

Alcalde, B., Dubois, E., Mauw, S., Mayer, N., & Radomirovic, S. (2009). Towards a Decision Model Based on Trust and Security Risk Management. In Proc. 7th Australasian Information Security Conference - AISC'09 (pp. 61–69). Australian Computer Society.
Peer reviewed

Alcalde, B., Dubois, E., Mauw, S., Mayer, N., & Radomirovic, S. (2009). Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo. In Seventh Australasian Information Security Conference (AISC 2009) (pp. 61-69).
Peer reviewed

van Deursen, T., & Radomirovic, S. (2009). On a new formal proof model for RFID location privacy. Information Processing Letters, 110 (2), 57-61. doi:10.1016/j.ipl.2009.10.007
Peer Reviewed verified by ORBi

Ceelen, P., Mauw, S., & Radomirovic, S. (2008). Chosen-name attacks: An overlooked class of type-flaw attacks. Electronic Notes in Theoretical Computer Science, 197 (2), 31-43. doi:10.1016/j.entcs.2007.12.015
Peer reviewed

van Deursen, T., Mauw, S., & Radomirovic, S. (2008). Untraceability of RFID Protocols. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (pp. 1–15). Springer. doi:10.1080/09500690802287155
Peer reviewed

van Deursen, T., & Radomirovic, S. (2008). Security of an RFID Protocol for Supply Chains. Proceedings of the 1st Workshop on Advances in RFID, AIR'08, 568–573. doi:10.1109/ICEBE.2008.44
Peer reviewed

Andova, S., Cremers, C. J. F., Gjøsteen, K., Mauw, S., Mjølsnes, S. F., & Radomirovic, S. (2008). A framework for compositional verification of security protocols. Information and Computation, 206 (2-4), 425-459. doi:10.1016/j.ic.2007.07.002
Peer reviewed

Contact ORBilu