Radomirović, Saša
80  results:
Search for persons X
?
1

Tactics for Account Access Graphs:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
 
?
2

"I'm Doing the Best I Can.": Understanding Technology Liter..:

, In: Socio-Technical Aspects in Security; Lecture Notes in Computer Science,
 
?
3

Session details: Theme: System software and security: SEC -..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
 
?
4

"I'm Surprised So Much Is Connected":

, In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems,
 
?
5

Verifying Table-Based Elections:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Basin, David ; Dreier, Jannik ; Giampietro, Sofia. - p. 2632-2652 , 2021
 
?
6

Shaping Our Mental Model of Security (Transcript of Discuss..:

, In: Security Protocols XXVII; Lecture Notes in Computer Science,
Radomirović, Saša - p. 60-68 , 2020
 
?
7

Dispute Resolution in Voting:

, In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF),
 
?
8

Shaping Our Mental Model of Security:

, In: Security Protocols XXVII; Lecture Notes in Computer Science,
Radomirović, Saša - p. 51-59 , 2020
 
?
9

User Account Access Graphs:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Hammann, Sven ; Radomirović, Saša ; Sasse, Ralf. - p. 1405-1422 , 2019
 
?
10

A Formal Analysis of 5G Authentication:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Basin, David ; Dreier, Jannik ; Hirschi, Lucca... - p. 1383-1396 , 2018
 
?
 
?
13

On a new formal proof model for RFID location privacy:

van Deursen, Ton ; Radomirović, Saša
Information Processing Letters.  110 (2009)  2 - p. 57-61 , 2009
 
?
14

Security of RFID Protocols – A Case Study:

van Deursen, Ton ; Radomirović, Saša
Electronic Notes in Theoretical Computer Science.  244 (2009)  - p. 41-52 , 2009
 
?
 
1-15