Tom Coffey
From MaRDI portal
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Impersonation attacks on a mobile security protocol for end-to-end communications Security and Privacy in Mobile Information and Communication Systems | 2010-04-24 | Paper |
| On Establishing and Fixing a Parallel Session Attack in a Security Protocol Studies in Computational Intelligence | 2009-03-12 | Paper |
| Formal verification: an imperative step in the design of security protocols Computer Networks | 2004-11-23 | Paper |
Research outcomes over time
This page was built for person: Tom Coffey