Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Stephan Wesemeyer
@inproceedings{DBLP:conf/asiaccs/CulnaneBSWT23, author = {Chris Culnane and Ioana Boureanu and Jean Snyman and Stephan Wesemeyer and Helen Treharne}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Formalising Application-Driven Authentication {\&} Access-Control based on Users' Companion Devices}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {884--898}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595800}, doi = {10.1145/3579856.3595800}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/CulnaneBSWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MillerBWSZ23, author = {Rhys Miller and Ioana Boureanu and Stephan Wesemeyer and Zhili Sun and Hemant Zope}, title = {Systematic Improvement of Access-Stratum Security in Mobile Networks}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {542--557}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00039}, doi = {10.1109/EUROSP57164.2023.00039}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MillerBWSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BudykhoBWRLRRS23, author = {Ksenia Budykho and Ioana Boureanu and Stephan Wesemeyer and Daniel Romero and Matt Lewis and Yogaratnam Rahulan and Fortunat Rajaona and Steve Schneider}, title = {Fine-Grained Trackability in Protocol Executions}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/fine-grained-trackability-in-protocol-executions/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BudykhoBWRLRRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Le-PapinDTW23, author = {Jay Le{-}Papin and Brijesh Dongol and Helen Treharne and Stephan Wesemeyer}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Verifying List Swarm Attestation Protocols}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {163--174}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3581778}, doi = {10.1145/3558482.3581778}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/Le-PapinDTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/MillerBWN22, author = {Rhys Miller and Ioana Boureanu and Stephan Wesemeyer and Christopher J. P. Newton}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {237--251}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517421}, doi = {10.1145/3488932.3517421}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/MillerBWN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanCSTW21, author = {Jinguang Han and Liqun Chen and Steve Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1836--1849}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2940946}, doi = {10.1109/TDSC.2019.2940946}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanCSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HanCSTWW20, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer and Nick Wilson}, title = {Anonymous Single Sign-On With Proxy Re-Verification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {223--236}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2919926}, doi = {10.1109/TIFS.2019.2919926}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HanCSTWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WesemeyerNTCSW20, author = {Stephan Wesemeyer and Christopher J. P. Newton and Helen Treharne and Liqun Chen and Ralf Sasse and Jorden Whitefield}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Formal Analysis and Implementation of a {TPM} 2.0-based Direct Anonymous Attestation Scheme}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {784--798}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3372197}, doi = {10.1145/3320269.3372197}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WesemeyerNTCSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WesemeyerBST20, author = {Stephan Wesemeyer and Ioana Boureanu and Zach Smith and Helen Treharne}, title = {Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities {\&} Patches}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {425--444}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00034}, doi = {10.1109/EUROSP48549.2020.00034}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/WesemeyerBST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WhitefieldCSSTW19, author = {Jorden Whitefield and Liqun Chen and Ralf Sasse and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {A Symbolic Analysis of ECC-Based Direct Anonymous Attestation}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {127--141}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00019}, doi = {10.1109/EUROSP.2019.00019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/WhitefieldCSSTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HanCSTW18, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Anonymous Single-Sign-On for n Designated Services with Traceability}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {470--490}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_23}, doi = {10.1007/978-3-319-99073-6\_23}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HanCSTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-08522, author = {Johann A. Briffa and Stephan Wesemeyer}, title = {SimCommSys: Taking the errors out of error-correcting code simulations}, journal = {CoRR}, volume = {abs/1802.08522}, year = {2018}, url = {http://arxiv.org/abs/1802.08522}, eprinttype = {arXiv}, eprint = {1802.08522}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-08522.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-08595, author = {Johann A. Briffa and Victor Buttigieg and Stephan Wesemeyer}, title = {Time-Varying Block Codes for Synchronization Errors: {MAP} Decoder and Practical Issues}, journal = {CoRR}, volume = {abs/1802.08595}, year = {2018}, url = {http://arxiv.org/abs/1802.08595}, eprinttype = {arXiv}, eprint = {1802.08595}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-08595.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07201, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Anonymous Single-Sign-On for n designated services with traceability}, journal = {CoRR}, volume = {abs/1804.07201}, year = {2018}, url = {http://arxiv.org/abs/1804.07201}, eprinttype = {arXiv}, eprint = {1804.07201}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07201.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-07642, author = {Jinguang Han and Liqun Chen and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer and Nick Wilson}, title = {Anonymous Single Sign-on with Proxy Re-Verification}, journal = {CoRR}, volume = {abs/1811.07642}, year = {2018}, url = {http://arxiv.org/abs/1811.07642}, eprinttype = {arXiv}, eprint = {1811.07642}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-07642.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WhitefieldCKPST17, author = {Jorden Whitefield and Liqun Chen and Frank Kargl and Andrew Paverd and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Formal Analysis of {V2X} Revocation Protocols}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {147--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_10}, doi = {10.1007/978-3-319-68063-7\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WhitefieldCKPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WhitefieldCKPST17, author = {Jorden Whitefield and Liqun Chen and Frank Kargl and Andrew Paverd and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, title = {Formal Analysis of {V2X} Revocation Protocols}, journal = {CoRR}, volume = {abs/1704.07216}, year = {2017}, url = {http://arxiv.org/abs/1704.07216}, eprinttype = {arXiv}, eprint = {1704.07216}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WhitefieldCKPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/AlfraihBW15, author = {Areej S. Alfraih and Johann A. Briffa and Stephan Wesemeyer}, title = {Cloning localization approach using k-means clustering and support vector machine}, journal = {J. Electronic Imaging}, volume = {24}, number = {4}, pages = {043019}, year = {2015}, url = {https://doi.org/10.1117/1.JEI.24.4.043019}, doi = {10.1117/1.JEI.24.4.043019}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/AlfraihBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/AlfraihBW14, author = {Areej S. Alfraih and Johann A. Briffa and Stephan Wesemeyer}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Cloning Localization Based on Feature Extraction and K-means Clustering}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {410--419}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_31}, doi = {10.1007/978-3-319-19321-2\_31}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/AlfraihBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdp/AlfraihBW13, author = {Areej S. Alfraih and Johann A. Briffa and Stephan Wesemeyer}, title = {Forgery localization based on image chroma feature extraction}, booktitle = {5th International Conference on Imaging for Crime Detection and Prevention, {ICDP} 2013, London, UK, 16-17 December 2013}, pages = {1--5}, publisher = {{IET} / {IEEE}}, year = {2013}, url = {https://doi.org/10.1049/ic.2013.0279}, doi = {10.1049/IC.2013.0279}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdp/AlfraihBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/BriffaSW10, author = {Johann A. Briffa and Hans Georg Schaathun and Stephan Wesemeyer}, title = {An Improved Decoding Algorithm for the Davey-MacKay Construction}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502293}, doi = {10.1109/ICC.2010.5502293}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/BriffaSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/WesemeyerSB99, author = {Stephan Wesemeyer and Peter Sweeney and David R. B. Burgess}, editor = {Michael Walker}, title = {Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {290--299}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_33}, doi = {10.1007/3-540-46665-7\_33}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/WesemeyerSB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Wesemeyer98, author = {Stephan Wesemeyer}, title = {On the Automorphism Group of Various Goppa Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {2}, pages = {630--643}, year = {1998}, url = {https://doi.org/10.1109/18.661509}, doi = {10.1109/18.661509}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/Wesemeyer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.