0-RTT key exchange with full forward secrecy F Günther, B Hale, T Jager, S Lauer Annual International Conference on the Theory and Applications of …, 2017 | 63 | 2017 |
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS C Boyd, B Hale, SF Mjølsnes, D Stebila Cryptographers’ Track at the RSA Conference, 55-71, 2016 | 30 | 2016 |
Efficient post-compromise security beyond one group C Cremers, B Hale, K Kohbrok | 14 | 2019 |
Simple security definitions for and constructions of 0-RTT key exchange B Hale, T Jager, S Lauer, J Schwenk International Conference on Applied Cryptography and Network Security, 20-38, 2017 | 14 | 2017 |
Strengthening SDN security: protocol dialecting and downgrade attacks M Sjoholmsierchio, B Hale, D Lukaszewski, G Xie 2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021 | 5 | 2021 |
The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter C Cremers, B Hale, K Kohbrok 30th USENIX Security Symposium (USENIX Security 21), 1847-1864, 2021 | 5 | 2021 |
There can be no compromise: The necessity of ratcheted authentication in secure messaging B Dowling, B Hale Cryptology ePrint Archive, 2020 | 5 | 2020 |
A Zero Trust Hybrid Security and Safety Risk Analysis Method N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran Journal of Computing and Information Science in Engineering 21 (5), 2021 | 4 | 2021 |
Towards a zero trust hybrid security and safety risk analysis method N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran International Design Engineering Technical Conferences and Computers and …, 2020 | 4 | 2020 |
Secure channels and termination: The last word on TLS C Boyd, B Hale International Conference on Cryptology and Information Security in Latin …, 2017 | 4 | 2017 |
The Bluetooth cyborg: Analysis of the full human-machine passkey entry AKE protocol M Troncoso, B Hale Cryptology ePrint Archive, 2021 | 3 | 2021 |
Computationally analyzing the ISO 9798–2.4 authentication protocol B Hale, C Boyd International Conference on Research in Security Standardisation, 236-255, 2014 | 3 | 2014 |
User-mediated authentication protocols and unforgeability in key collision B Hale International Journal of Information Security 19 (6), 609-621, 2020 | 2 | 2020 |
CARIBE: Cascaded IBE for maximum flexibility and user-side control B Hale, C Carr, D Gligoroski International Conference on Cryptology in Malaysia, 389-408, 2016 | 2 | 2016 |
A Zero-Trust Methodology for Security of Complex Systems With Machine Learning Components B Hale, DL Van Bossuyt, N Papakonstantinou, B O’Halloran International Design Engineering Technical Conferences and Computers and …, 2021 | 1 | 2021 |
Cyber Systems: Their Science, Engineering, and Security J Scrofani, C Bollmann, J Roth, B Hale HICSS, 2021 | 1 | 2021 |
Computationally Modeling User-Mediated Authentication Protocols B Hale Cryptology ePrint Archive, 2019 | 1 | 2019 |
Reducing Asymmetry in Countering Unmanned Aerial Systems C Thiessen, DL Van Bossuyt, B Hale Acquisition Research Program, 2022 | | 2022 |
Securing Software Updates under Receiver Radio Frequency Geolocation Risk B Hayden, M Sweeney, B Hale Naval Postgraduate School, 2022 | | 2022 |
Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security C Bollmann, J Scrofani, J Roth, B Hale Proceedings of the 55th Hawaii International Conference on System Sciences, 2022 | | 2022 |