Obserwuj
Benjamin Dowling
Benjamin Dowling
Zweryfikowany adres z sheffield.ac.uk - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33, 1914-1983, 2020
4482020
A cryptographic analysis of the TLS 1.3 handshake protocol candidates
B Dowling, M Fischlin, F Günther, D Stebila
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1682015
A cryptographic analysis of the TLS 1.3 handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Journal of Cryptology 34 (4), 37, 2021
752021
Secure logging schemes and certificate transparency
B Dowling, F Günther, U Herath, D Stebila
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
702016
A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol
B Dowling, M Fischlin, F Günther, D Stebila
Cryptology ePrint Archive, 2016
552016
A cryptographic analysis of the WireGuard protocol
B Dowling, KG Paterson
Applied Cryptography and Network Security: 16th International Conference …, 2018
542018
Authenticated network time synchronization
B Dowling, D Stebila, G Zaverucha
25th USENIX security symposium (USENIX security 16), 823-840, 2016
472016
Multi-ciphersuite security of the Secure Shell (SSH) protocol
F Bergsma, B Dowling, F Kohlar, J Schwenk, D Stebila
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
462014
Identity confidentiality in 5G mobile telephony systems
H Khan, B Dowling, KM Martin
International Conference on Research in Security Standardisation, 120-142, 2018
332018
Practically-exploitable cryptographic vulnerabilities in matrix
MR Albrecht, S Celi, B Dowling, D Jones
2023 IEEE Symposium on Security and Privacy (SP), 164-181, 2023
232023
Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
B Dowling, TB Hansen, KG Paterson
International Conference on Post-Quantum Cryptography, 483-502, 2020
232020
Modelling ciphersuite and version negotiation in the TLS protocol
B Dowling, D Stebila
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
232015
Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework
B Dowling, P Rösler, J Schwenk
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
182020
Highly efficient privacy-preserving key agreement for wireless body area networks
H Khan, B Dowling, KM Martin
2018 17th IEEE international conference on trust, security and privacy in …, 2018
182018
Secure messaging authentication against active man-in-the-middle attacks
B Dowling, B Hale
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 54-70, 2021
152021
There can be no compromise: The necessity of ratcheted authentication in secure messaging
B Dowling, B Hale
Cryptology ePrint Archive, 2020
102020
Strongly anonymous ratcheted key exchange
B Dowling, E Hauck, D Riepel, P Rösler
International Conference on the Theory and Application of Cryptology and …, 2022
92022
Post quantum noise
Y Angel, B Dowling, A Hülsing, P Schwabe, F Weber
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
92022
Provable security of internet protocols
BJ Dowling
Queensland University of Technology, 2017
72017
Continuous authentication in secure messaging
B Dowling, F Günther, A Poirrier
European Symposium on Research in Computer Security, 361-381, 2022
62022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20