Volgen
Britta Hale
Britta Hale
Geverifieerd e-mailadres voor nps.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
0-RTT key exchange with full forward secrecy
F Günther, B Hale, T Jager, S Lauer
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1092017
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS
C Boyd, B Hale, SF Mjølsnes, D Stebila
Cryptographers’ Track at the RSA Conference, 55-71, 2016
472016
A zero trust hybrid security and safety risk analysis method
N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran
Journal of Computing and Information Science in Engineering 21 (5), 050907, 2021
412021
The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter
C Cremers, B Hale, K Kohbrok
30th USENIX Security Symposium (USENIX Security 21), 1847-1864, 2021
292021
Strengthening SDN security: Protocol dialecting and downgrade attacks
M Sjoholmsierchio, B Hale, D Lukaszewski, G Xie
2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021
282021
A zero-trust methodology for security of complex systems with machine learning components
B Hale, DL Van Bossuyt, N Papakonstantinou, B O’Halloran
International design engineering technical conferences and computers and …, 2021
252021
Secure messaging authentication against active man-in-the-middle attacks
B Dowling, B Hale
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 54-70, 2021
192021
Simple security definitions for and constructions of 0-RTT key exchange
B Hale, T Jager, S Lauer, J Schwenk
Applied Cryptography and Network Security: 15th International Conference …, 2017
182017
Efficient post-compromise security beyond one group
C Cremers, B Hale, K Kohbrok
172019
The Bluetooth cyborg: Analysis of the full human-machine passkey entry AKE protocol
M Troncoso, B Hale
Cryptology ePrint Archive, 2021
152021
System analysis of counter-unmanned aerial systems kill chain in an operational environment
CS Tan, DL Van Bossuyt, B Hale
Systems 9 (4), 79, 2021
142021
There can be no compromise: The necessity of ratcheted authentication in secure messaging
B Dowling, B Hale
Cryptology ePrint Archive, 2020
132020
Towards a zero trust hybrid security and safety risk analysis method
N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran
International design engineering technical conferences and computers and …, 2020
102020
A note on hybrid signature schemes
N Bindel, B Hale
Cryptology ePrint Archive, 2023
82023
A systems analysis of energy usage and effectiveness of a counter-unmanned aerial system using a cyber-attack approach
CH Lee, C Thiessen, DL Van Bossuyt, B Hale
Drones 6 (8), 198, 2022
82022
On end-to-end encryption
B Hale, C Komlo
Cryptology ePrint Archive, 2022
82022
Revisiting Post-Compromise Security Guarantees in Group Messaging.
C Cremers, B Hale, K Kohbrok
CISPA, 2019
72019
Multi-mission engineering with zero trust: A modeling methodology and application to contested offshore wind farms
DL Van Bossuyt, B Hale, RM Arlitt, N Papakonstantinou
International Design Engineering Technical Conferences and Computers and …, 2022
62022
Model driven engineering for resilience of systems with black box and ai-based components
N Papakonstantinou, B Hale, J Linnosmaa, J Salonen, DL Van Bossuyt
2022 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2022
62022
Software-defined networks: Protocol dialects
M Sjoholmsierchio
Monterey, CA; Naval Postgraduate School, 2019
62019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20