TitleCited byYear
Design guidelines for security protocols to prevent replay & parallel session attacks
AD Jurcut, T Coffey, R Dojen
computers & Security 45, 255-273, 2014
On establishing and fixing a parallel session attack in a security protocol
R Dojen, A Jurcut, T Coffey, C Gyorodi
Intelligent distributed computing, systems and applications, 239-244, 2008
Establishing and fixing security protocols weaknesses using a logic-based verification tool
A Jurcut, T Coffey, R Dojen
Journal of Communication 8 (11), 795-806, 2013
Secure communication channel architecture for software defined mobile networks
M Liyanage, A Braeken, AD Jurcut, M Ylianttila, A Gurtov
Computer Networks 114, 32-50, 2017
On the prevention and detection of replay attacks using a logic-based verification tool
AD Jurcut, T Coffey, R Dojen
International conference on computer networks, 128-137, 2014
A novel security protocol attack detection logic with unique fault discovery capability for freshness attacks and interleaving session attacks
A Jurcut, T Coffey, R Dojen
IEEE transactions on dependable and secure computing, 2017
Determining a parallel session attack on a key distribution protocol using a model checker
V Paşca, A Jurcuţ, R Dojen, T Coffey
Proceedings of the 6th International Conference on Advances in Mobile …, 2008
On the Security Verification of a Short Message Service Protocol
AD Jurcut, M Liyanage, J Chen, C Gyorodi, J He
2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018
AGE: authentication in gadget-free healthcare environments
T Kumar, A Braeken, AD Jurcut, M Liyanage, M Ylianttila
Information Technology and Management, 1-20, 2019
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
A Braeken, M Liyanage, AD Jurcut
Wireless Personal Communications, 1-20, 2019
Design requirements to counter parallel session attacks in security protocols
AD Jurcut, T Coffey, R Dojen
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Symmetry in Security Protocol Cryptographic Messages--A Serious Weakness Exploitable by Parallel Session Attacks
A Jurcut, T Coffey, R Dojen
2012 Seventh International Conference on Availability, Reliability and …, 2012
Security Protocol Design: A Case Study Using Key Distribution Protocols.
A Jurcut, T Coffey, R Dojen, R Gyorodi
Journal of Computer Science & Control Systems 2 (2), 2009
Analysis of a key-establishment security protocol
A Jurcut, T Coffey, R Dojen, R Gyorodi
Journal of Computer Science and Control Systems, 2008
Automated Logic-Based Technique for Formal Verification of Security Protocols
AD Jurcut
Journal of Advances in Computer Networks (JACN 2018) 6 (ISSN: 1793-8244), 77-85, 2018
Securing the Communication of Industrial Internet
M Liyanage, A Sodhro, P Kumar, AD Jurcut, A Gurtov
RECODIS: ”Resilient Communication Services Protecting End-user Applications …, 2019
Introduction to IoT Security
AD Jurcut, R Ranaweera, L Xu
IoT Security : Advances in Authentication 1, 37, 2019
Insider threats in Cyber Security: The enemy within the gates
G Mazzarolo, AD Jurcut
arXiv preprint arXiv:1911.09575, 2019
Machine-Learning Techniques for Detecting Attacks in SDN
MS Elsayed, NA Le-Khac, S Dev, AD Jurcut
arXiv preprint arXiv:1910.00817, 2019
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
P Ranaweera, AD Jurcut, M Liyanage
The system can't perform the operation now. Try again later.
Articles 1–20