Stephan Wesemeyer
Cited by
Cited by
Eavesdropping near‐field contactless payments: a quantitative analysis
TP Diakos, JA Briffa, TWC Brown, S Wesemeyer
The Journal of Engineering 2013 (10), 48-54, 2013
An improved decoding algorithm for the Davey-MacKay construction
JA Briffa, HG Schaathun, S Wesemeyer
2010 IEEE International Conference on Communications, 1-5, 2010
Formal analysis and implementation of a tpm 2.0-based direct anonymous attestation scheme
S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Formal analysis of v2x revocation protocols
J Whitefield, L Chen, F Kargl, A Paverd, S Schneider, H Treharne, ...
Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017
On the automorphism group of various Goppa codes
S Wesemeyer
IEEE Transactions on Information Theory 44 (2), 630-643, 1998
A symbolic analysis of ecc-based direct anonymous attestation
J Whitefield, L Chen, R Sasse, S Schneider, H Treharne, S Wesemeyer
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 127-141, 2019
Formal security analysis of NFC M-coupon protocols using Casper/FDR
A Alshehri, JA Briffa, S Schneider, S Wesemeyer
2013 5th International Workshop on Near Field Communication (NFC), 1-6, 2013
Privacy-preserving electronic ticket scheme with attribute-based credentials
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
IEEE Transactions on Dependable and Secure Computing 18 (4), 1836-1849, 2019
Anonymous single sign-on with proxy re-verification
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer, N Wilson
IEEE Transactions on Information Forensics and Security 15, 223-236, 2019
Iterative soft-decision decoding of linear block codes
P Sweeney, S Wesemeyer
IEE Proceedings-Communications 147 (3), 133-136, 2000
Anonymous Single-Sign-On for n Designated Services with Traceability
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
Extensive security verification of the LoRaWAN key-establishment: Insecurities & patches
S Wesemeyer, I Boureanu, Z Smith, H Treharne
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020
Time‐varying block codes for synchronisation errors: maximum a posteriori decoder and practical issues
JA Briffa, V Buttigieg, S Wesemeyer
The Journal of Engineering 2014 (6), 340-351, 2014
The 5g key-establishment stack: In-depth formal verification and experimentation
R Miller, I Boureanu, S Wesemeyer, CJP Newton
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
Cloning localization based on feature extraction and k-means clustering
AS Alfraih, JA Briffa, S Wesemeyer
Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014 …, 2015
SimCommSys: taking the errors out of error‐correcting code simulations
JA Briffa, S Wesemeyer
The Journal of Engineering 2014 (6), 332-339, 2014
Fine-Grained Trackability in Protocol Executions
K Budykho, IC Boureanu, S Wesemeyer, D Romero, M Lewis, Y Rahulan, ...
Network and Distributed System Security (NDSS) Symposium 2023, 2023
Some soft-decision decoding algorithms for Reed-Solomon codes
S Wesemeyer⋆, P Sweeney, DRB Burgess
Cryptography and Coding: 7th IMA International Conference Cirencester, UK …, 1999
Forgery localization based on image chroma feature extraction
AS Alfraih, JA Briffa, S Wesemeyer
5th International Conference on Imaging for Crime Detection and Prevention …, 2013
Suboptimal soft-decision decoding for some RS-codes
S Wesemeyer, P Sweeney
Electronics Letters 34 (10), 983-984, 1998
The system can't perform the operation now. Try again later.
Articles 1–20