Stephan Wesemeyer
Title
Cited by
Cited by
Year
Eavesdropping near-field contactless payments: a quantitative analysis
TP Diakos, JA Briffa, TWC Brown, S Wesemeyer
The Journal of Engineering 2013 (10), 48-54, 2013
332013
An improved decoding algorithm for the Davey-MacKay construction
JA Briffa, HG Schaathun, S Wesemeyer
2010 IEEE International Conference on Communications, 1-5, 2010
272010
On the automorphism group of various Goppa codes
S Wesemeyer
IEEE Transactions on Information Theory 44 (2), 630-643, 1998
241998
Formal analysis of V2X revocation protocols
J Whitefield, L Chen, F Kargl, A Paverd, S Schneider, H Treharne, ...
International Workshop on Security and Trust Management, 147-163, 2017
192017
Formal security analysis of NFC m-coupon protocols using Casper/FDR
A Alshehri, JA Briffa, S Schneider, S Wesemeyer
2013 5th International Workshop on Near Field Communication (NFC), 1-6, 2013
192013
Iterative soft-decision decoding of linear block codes
P Sweeney, S Wesemeyer
IEE Proceedings-Communications 147 (3), 133-136, 2000
152000
Cloning localization based on feature extraction and k-means clustering
AS Alfraih, JA Briffa, S Wesemeyer
International Workshop on Digital Watermarking, 410-419, 2014
62014
Time-varying block codes for synchronisation errors: Maximum a posteriori decoder and practical issues
JA Briffa, V Buttigieg, S Wesemeyer
The Journal of Engineering 2014 (6), 340-351, 2014
62014
A symbolic analysis of ecc-based direct anonymous attestation
J Whitefield, L Chen, R Sasse, S Schneider, H Treharne, S Wesemeyer
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 127-141, 2019
42019
Anonymous Single-Sign-On for n Designated Services with Traceability
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
European Symposium on Research in Computer Security, 470-490, 2018
42018
Soft-decision decoding algorithms for RS codes
D Burgess, S Wesemeyer, P Sweeney
Proc. Seventh IMA Conf. Cryptography and Coding, 177-181, 1999
41999
SimCommSys: taking the errors out of error-correcting code simulations
JA Briffa, S Wesemeyer
The Journal of Engineering 2014 (6), 332-339, 2014
32014
Suboptimal soft-decision decoding for some RS-codes
S Wesemeyer, P Sweeney
Electronics Letters 34 (10), 983-984, 1998
31998
Forgery localization based on image chroma feature extraction
AS Alfraih, JA Briffa, S Wesemeyer
IET Digital Library, 2013
22013
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
IEEE Transactions on Dependable and Secure Computing, 2019
12019
Anonymous single sign-on with proxy re-verification
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer, N Wilson
IEEE Transactions on Information Forensics and Security 15, 223-236, 2019
12019
Privacy-preserving electronic ticket scheme with fine-grained pricing. CoRR
J Han, L Chen, S Schneider, H Treharne, S Wesemeyer
12017
A multidimensional block coding scheme with iterative decoding
P Sweeney, S Wesemeyer, DRB Burgess
IET Digital Library, 1999
11999
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme
S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
2020
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches
S Wesemeyer, I Boureanu, Z Smith, H Treharne
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20