A comprehensive symbolic analysis of TLS 1.3 C Cremers, M Horvat, J Hoyland, S Scott, T Van Der Merwe Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 305 | 2017 |
Oblivious dns over https (odoh): A practical privacy enhancement to dns S Singanamalla, S Chunhapanya, M Vavruša, T Verma, P Wu, M Fayed, ... arXiv preprint arXiv:2011.10121, 2020 | 44 | 2020 |
A tale of two models: Formal verification of KEMTLS via Tamarin S Celi, J Hoyland, D Stebila, T Wiggers European Symposium on Research in Computer Security, 63-83, 2022 | 9 | 2022 |
Respect the ORIGIN! a best-case evaluation of connection coalescing in the wild S Singanamalla, MT Paracha, S Ahmad, J Hoyland, L Valenta, Y Safronov, ... Proceedings of the 22nd ACM Internet Measurement Conference, 664-678, 2022 | 5 | 2022 |
An analysis of TLS 1.3 and its use in composite protocols. J Hoyland Royal Holloway, University of London, 2018 | 3 | 2018 |
RFC 9257: Guidance for External Pre-Shared Key (PSK) Usage in TLS R Housley, J Hoyland, M Sethi, CA Wood RFC Editor, 2022 | | 2022 |
Generating Concurrency Checks Automatically J Hoyland, M Hague Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs …, 2016 | | 2016 |
Analysing The OAuth Protocol J Hoyland BA Thesis, University of Oxford, 2012 | | 2012 |