Follow
Britta Hale
Britta Hale
Verified email at nps.edu
Title
Cited by
Cited by
Year
0-RTT key exchange with full forward secrecy
F Günther, B Hale, T Jager, S Lauer
Annual International Conference on the Theory and Applications of …, 2017
632017
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS
C Boyd, B Hale, SF Mjølsnes, D Stebila
Cryptographers’ Track at the RSA Conference, 55-71, 2016
302016
Efficient post-compromise security beyond one group
C Cremers, B Hale, K Kohbrok
142019
Simple security definitions for and constructions of 0-RTT key exchange
B Hale, T Jager, S Lauer, J Schwenk
International Conference on Applied Cryptography and Network Security, 20-38, 2017
142017
Strengthening SDN security: protocol dialecting and downgrade attacks
M Sjoholmsierchio, B Hale, D Lukaszewski, G Xie
2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021
52021
The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter
C Cremers, B Hale, K Kohbrok
30th USENIX Security Symposium (USENIX Security 21), 1847-1864, 2021
52021
There can be no compromise: The necessity of ratcheted authentication in secure messaging
B Dowling, B Hale
Cryptology ePrint Archive, 2020
52020
A Zero Trust Hybrid Security and Safety Risk Analysis Method
N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran
Journal of Computing and Information Science in Engineering 21 (5), 2021
42021
Towards a zero trust hybrid security and safety risk analysis method
N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran
International Design Engineering Technical Conferences and Computers and …, 2020
42020
Secure channels and termination: The last word on TLS
C Boyd, B Hale
International Conference on Cryptology and Information Security in Latin …, 2017
42017
The Bluetooth cyborg: Analysis of the full human-machine passkey entry AKE protocol
M Troncoso, B Hale
Cryptology ePrint Archive, 2021
32021
Computationally analyzing the ISO 9798–2.4 authentication protocol
B Hale, C Boyd
International Conference on Research in Security Standardisation, 236-255, 2014
32014
User-mediated authentication protocols and unforgeability in key collision
B Hale
International Journal of Information Security 19 (6), 609-621, 2020
22020
CARIBE: Cascaded IBE for maximum flexibility and user-side control
B Hale, C Carr, D Gligoroski
International Conference on Cryptology in Malaysia, 389-408, 2016
22016
A Zero-Trust Methodology for Security of Complex Systems With Machine Learning Components
B Hale, DL Van Bossuyt, N Papakonstantinou, B O’Halloran
International Design Engineering Technical Conferences and Computers and …, 2021
12021
Cyber Systems: Their Science, Engineering, and Security
J Scrofani, C Bollmann, J Roth, B Hale
HICSS, 2021
12021
Computationally Modeling User-Mediated Authentication Protocols
B Hale
Cryptology ePrint Archive, 2019
12019
Reducing Asymmetry in Countering Unmanned Aerial Systems
C Thiessen, DL Van Bossuyt, B Hale
Acquisition Research Program, 2022
2022
Securing Software Updates under Receiver Radio Frequency Geolocation Risk
B Hayden, M Sweeney, B Hale
Naval Postgraduate School, 2022
2022
Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security
C Bollmann, J Scrofani, J Roth, B Hale
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20