Stephan Wesemeyer
Cited by
Cited by
Eavesdropping near-field contactless payments: a quantitative analysis
TP Diakos, JA Briffa, TWC Brown, S Wesemeyer
The Journal of Engineering 2013 (10), 48-54, 2013
An improved decoding algorithm for the Davey-MacKay construction
JA Briffa, HG Schaathun, S Wesemeyer
2010 IEEE International Conference on Communications, 1-5, 2010
On the automorphism group of various Goppa codes
S Wesemeyer
IEEE Transactions on Information Theory 44 (2), 630-643, 1998
Formal security analysis of NFC m-coupon protocols using Casper/FDR
A Alshehri, JA Briffa, S Schneider, S Wesemeyer
2013 5th International Workshop on Near Field Communication (NFC), 1-6, 2013
Iterative soft-decision decoding of linear block codes
P Sweeney, S Wesemeyer
IEE Proceedings-Communications 147 (3), 133-136, 2000
Formal analysis of V2X revocation protocols
J Whitefield, L Chen, F Kargl, A Paverd, S Schneider, H Treharne, ...
International Workshop on Security and Trust Management, 147-163, 2017
Cloning localization based on feature extraction and k-means clustering
AS Alfraih, JA Briffa, S Wesemeyer
International Workshop on Digital Watermarking, 410-419, 2014
Time-varying block codes for synchronisation errors: Maximum a posteriori decoder and practical issues
JA Briffa, V Buttigieg, S Wesemeyer
The Journal of Engineering 2014 (6), 340-351, 2014
Anonymous Single-Sign-On for n Designated Services with Traceability
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
European Symposium on Research in Computer Security, 470-490, 2018
Soft-decision decoding algorithms for RS codes
D Burgess, S Wesemeyer, P Sweeney
Proc. Seventh IMA Conf. Cryptography and Coding, 177-181, 1999
Suboptimal soft-decision decoding for some RS-codes
S Wesemeyer, P Sweeney
Electronics Letters 34 (10), 983-984, 1998
SimCommSys: taking the errors out of error-correcting code simulations
JA Briffa, S Wesemeyer
The Journal of Engineering 2014 (6), 332-339, 2014
Forgery localization based on image chroma feature extraction
AS Alfraih, JA Briffa, S Wesemeyer
IET Digital Library, 2013
A Symbolic Analysis of ECC-based Direct Anonymous Attestation
J Whitefield, L Chen, R Sasse, S Schneider, H Treharne, S Wesemeyer
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 127-141, 2019
Anonymous single sign-on with proxy re-verification
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer, N Wilson
IEEE Transactions on Information Forensics and Security 15, 223-236, 2019
A multidimensional block coding scheme with iterative decoding
P Sweeney, S Wesemeyer, DRB Burgess
IET Digital Library, 1999
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme
S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield
Anonymous Single Sign-on with Proxy Re-Verification
S Wesemeyer, N Wilson
Personalised rail passenger experience and privacy
H Treharne, S Wesemeyer, S Schneider, T Ross, A May, S Cockbill, ...
Cloning localization approach using k-means clustering and support vector machine
AS Alfraih, JA Briffa, S Wesemeyer
Journal of Electronic Imaging 24 (4), 043019, 2015
The system can't perform the operation now. Try again later.
Articles 1–20