Distance-bounding protocols: Verification without time and location S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua 2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018 | 71 | 2018 |
maTLS: How to Make TLS middlebox-aware? H Lee, Z Smith, J Lim, G Choi, S Chun, T Chung, TT Kwon NDSS, 2019 | 52 | 2019 |
Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity I Filimonov, R Horne, S Mauw, Z Smith Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 24 | 2019 |
Extensive security verification of the LoRaWAN key-establishment: Insecurities & patches S Wesemeyer, I Boureanu, Z Smith, H Treharne 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020 | 13 | 2020 |
Post-collusion security and distance bounding S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 11 | 2019 |
Feasibility of biomass fuel briquettes from banana plant waste H Lee, Z Smith Cincinnati: Engineers Without Borders Greater Cincinnati Professional, 2011 | 5 | 2011 |
Overview of operational transformation Z Smith UMM CSci Senior Seminar Conference, 2012 | 3 | 2012 |
Automated identification of desynchronisation attacks on shared secrets S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 2 | 2018 |
What’s the use of educational research? Six stories reflecting on research use with communities S Rudolph, E Mayes, T Molla, S Chiew, N Abhayawickrama, N Maiava, ... The Australian Educational Researcher, 1-24, 2024 | 1 | 2024 |
Modelling Agent-Skipping Attacks in Message Forwarding Protocols Z Smith, H Jonker, S Mauw, H Lee arXiv preprint arXiv:2201.08686, 2022 | | 2022 |