0-RTT key exchange with full forward secrecy F Günther, B Hale, T Jager, S Lauer Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 109 | 2017 |
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS C Boyd, B Hale, SF Mjølsnes, D Stebila Cryptographers’ Track at the RSA Conference, 55-71, 2016 | 47 | 2016 |
A zero trust hybrid security and safety risk analysis method N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran Journal of Computing and Information Science in Engineering 21 (5), 050907, 2021 | 41 | 2021 |
The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter C Cremers, B Hale, K Kohbrok 30th USENIX Security Symposium (USENIX Security 21), 1847-1864, 2021 | 29 | 2021 |
Strengthening SDN security: Protocol dialecting and downgrade attacks M Sjoholmsierchio, B Hale, D Lukaszewski, G Xie 2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021 | 28 | 2021 |
A zero-trust methodology for security of complex systems with machine learning components B Hale, DL Van Bossuyt, N Papakonstantinou, B O’Halloran International design engineering technical conferences and computers and …, 2021 | 25 | 2021 |
Secure messaging authentication against active man-in-the-middle attacks B Dowling, B Hale 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 54-70, 2021 | 19 | 2021 |
Simple security definitions for and constructions of 0-RTT key exchange B Hale, T Jager, S Lauer, J Schwenk Applied Cryptography and Network Security: 15th International Conference …, 2017 | 18 | 2017 |
Efficient post-compromise security beyond one group C Cremers, B Hale, K Kohbrok | 17 | 2019 |
The Bluetooth cyborg: Analysis of the full human-machine passkey entry AKE protocol M Troncoso, B Hale Cryptology ePrint Archive, 2021 | 15 | 2021 |
System analysis of counter-unmanned aerial systems kill chain in an operational environment CS Tan, DL Van Bossuyt, B Hale Systems 9 (4), 79, 2021 | 14 | 2021 |
There can be no compromise: The necessity of ratcheted authentication in secure messaging B Dowling, B Hale Cryptology ePrint Archive, 2020 | 13 | 2020 |
Towards a zero trust hybrid security and safety risk analysis method N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran International design engineering technical conferences and computers and …, 2020 | 10 | 2020 |
A note on hybrid signature schemes N Bindel, B Hale Cryptology ePrint Archive, 2023 | 8 | 2023 |
A systems analysis of energy usage and effectiveness of a counter-unmanned aerial system using a cyber-attack approach CH Lee, C Thiessen, DL Van Bossuyt, B Hale Drones 6 (8), 198, 2022 | 8 | 2022 |
On end-to-end encryption B Hale, C Komlo Cryptology ePrint Archive, 2022 | 8 | 2022 |
Revisiting Post-Compromise Security Guarantees in Group Messaging. C Cremers, B Hale, K Kohbrok CISPA, 2019 | 7 | 2019 |
Multi-mission engineering with zero trust: A modeling methodology and application to contested offshore wind farms DL Van Bossuyt, B Hale, RM Arlitt, N Papakonstantinou International Design Engineering Technical Conferences and Computers and …, 2022 | 6 | 2022 |
Model driven engineering for resilience of systems with black box and ai-based components N Papakonstantinou, B Hale, J Linnosmaa, J Salonen, DL Van Bossuyt 2022 Annual Reliability and Maintainability Symposium (RAMS), 1-7, 2022 | 6 | 2022 |
Software-defined networks: Protocol dialects M Sjoholmsierchio Monterey, CA; Naval Postgraduate School, 2019 | 6 | 2019 |