Follow
Zach Smith
Title
Cited by
Cited by
Year
Distance-bounding protocols: Verification without time and location
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018
652018
maTLS: How to Make TLS middlebox-aware?
H Lee, Z Smith, J Lim, G Choi, S Chun, T Chung, TT Kwon
NDSS, 2019
462019
Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity
I Filimonov, R Horne, S Mauw, Z Smith
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
242019
Extensive security verification of the LoRaWAN key-establishment: Insecurities & patches
S Wesemeyer, I Boureanu, Z Smith, H Treharne
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020
112020
Post-collusion security and distance bounding
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
92019
Feasibility of biomass fuel briquettes from banana plant waste
H Lee, Z Smith
Cincinnati: Engineers Without Borders Greater Cincinnati Professional, 2011
52011
Overview of operational transformation
Z Smith
UMM CSci Senior Seminar Conference, 2012
32012
Automated identification of desynchronisation attacks on shared secrets
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
12018
What’s the use of educational research? Six stories reflecting on research use with communities
S Rudolph, E Mayes, T Molla, S Chiew, N Abhayawickrama, N Maiava, ...
The Australian Educational Researcher, 1-24, 2024
2024
Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Z Smith, H Jonker, S Mauw, H Lee
arXiv preprint arXiv:2201.08686, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–10