Eavesdropping near‐field contactless payments: a quantitative analysis TP Diakos, JA Briffa, TWC Brown, S Wesemeyer The Journal of Engineering 2013 (10), 48-54, 2013 | 40 | 2013 |
An improved decoding algorithm for the Davey-MacKay construction JA Briffa, HG Schaathun, S Wesemeyer 2010 IEEE International Conference on Communications, 1-5, 2010 | 38 | 2010 |
Formal analysis and implementation of a tpm 2.0-based direct anonymous attestation scheme S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 31 | 2020 |
Formal analysis of v2x revocation protocols J Whitefield, L Chen, F Kargl, A Paverd, S Schneider, H Treharne, ... Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017 | 31 | 2017 |
On the automorphism group of various Goppa codes S Wesemeyer IEEE Transactions on Information Theory 44 (2), 630-643, 1998 | 30 | 1998 |
A symbolic analysis of ecc-based direct anonymous attestation J Whitefield, L Chen, R Sasse, S Schneider, H Treharne, S Wesemeyer 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 127-141, 2019 | 27 | 2019 |
Formal security analysis of NFC M-coupon protocols using Casper/FDR A Alshehri, JA Briffa, S Schneider, S Wesemeyer 2013 5th International Workshop on Near Field Communication (NFC), 1-6, 2013 | 23 | 2013 |
Privacy-preserving electronic ticket scheme with attribute-based credentials J Han, L Chen, S Schneider, H Treharne, S Wesemeyer IEEE Transactions on Dependable and Secure Computing 18 (4), 1836-1849, 2019 | 20 | 2019 |
Anonymous single sign-on with proxy re-verification J Han, L Chen, S Schneider, H Treharne, S Wesemeyer, N Wilson IEEE Transactions on Information Forensics and Security 15, 223-236, 2019 | 18 | 2019 |
Iterative soft-decision decoding of linear block codes P Sweeney, S Wesemeyer IEE Proceedings-Communications 147 (3), 133-136, 2000 | 16 | 2000 |
Anonymous Single-Sign-On for n Designated Services with Traceability J Han, L Chen, S Schneider, H Treharne, S Wesemeyer Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 12 | 2018 |
Extensive security verification of the LoRaWAN key-establishment: Insecurities & patches S Wesemeyer, I Boureanu, Z Smith, H Treharne 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020 | 11 | 2020 |
Time‐varying block codes for synchronisation errors: maximum a posteriori decoder and practical issues JA Briffa, V Buttigieg, S Wesemeyer The Journal of Engineering 2014 (6), 340-351, 2014 | 11 | 2014 |
The 5g key-establishment stack: In-depth formal verification and experimentation R Miller, I Boureanu, S Wesemeyer, CJP Newton Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 8 | 2022 |
Cloning localization based on feature extraction and k-means clustering AS Alfraih, JA Briffa, S Wesemeyer Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014 …, 2015 | 6 | 2015 |
SimCommSys: taking the errors out of error‐correcting code simulations JA Briffa, S Wesemeyer The Journal of Engineering 2014 (6), 332-339, 2014 | 6 | 2014 |
Fine-Grained Trackability in Protocol Executions K Budykho, IC Boureanu, S Wesemeyer, D Romero, M Lewis, Y Rahulan, ... Network and Distributed System Security (NDSS) Symposium 2023, 2023 | 4 | 2023 |
Some soft-decision decoding algorithms for Reed-Solomon codes S Wesemeyer⋆, P Sweeney, DRB Burgess Cryptography and Coding: 7th IMA International Conference Cirencester, UK …, 1999 | 4* | 1999 |
Forgery localization based on image chroma feature extraction AS Alfraih, JA Briffa, S Wesemeyer 5th International Conference on Imaging for Crime Detection and Prevention …, 2013 | 3 | 2013 |
Suboptimal soft-decision decoding for some RS-codes S Wesemeyer, P Sweeney Electronics Letters 34 (10), 983-984, 1998 | 3 | 1998 |