![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Britta Hale
Person information
Refine list
![note](https://dblp.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i15]Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri:
Cryptography is Rocket Science: Analysis of BPSec. IACR Cryptol. ePrint Arch. 2025: 23 (2025) - 2024
- [c18]Britta Hale, Nick Tsamis, James Scrofani, Chad A. Bollmann:
Introduction to the Minitrack on Critical Infrastructure and Cyber Systems. HICSS 2024: 7353-7354 - 2023
- [j4]Douglas L. Van Bossuyt, Britta Hale, Ryan M. Arlitt
, Nikolaos Papakonstantinou:
Zero-Trust for the System Design Lifecycle. J. Comput. Inf. Sci. Eng. 23(6) (2023) - [c17]Elyssa Dietz, Duane Davis, Britta Hale:
Utilizing the Messaging Layer Security Protocol in a Lossy Communications Aerial Swarm. HICSS 2023: 6591-6600 - [c16]Britta Hale, James Scrofani, Chad A. Bollmann:
Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security. HICSS 2023: 6704-6705 - [p1]Douglas L. Van Bossuyt, Nikolaos Papakonstantinou, Britta Hale, Jarno Salonen, Bryan O'Halloran:
Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components. Artificial Intelligence and Cybersecurity 2023: 47-66 - [i14]Benjamin Dowling, Britta Hale:
Authenticated Continuous Key Agreement: Active MitM Detection and Prevention. IACR Cryptol. ePrint Arch. 2023: 228 (2023) - [i13]Nina Bindel, Britta Hale:
A Note on Hybrid Signature Schemes. IACR Cryptol. ePrint Arch. 2023: 423 (2023) - [i12]Elsie Mestl Fondevik, Britta Hale, Xisen Tian:
Guardianship in Group Key Exchange for Limited Environments. IACR Cryptol. ePrint Arch. 2023: 1761 (2023) - 2022
- [c15]Vikram Kanth, Britta Hale:
Blockchain-based Authenticated Stego-Channels: A Security Framework and Construction. Blockchain 2022: 208-215 - [c14]Chad A. Bollmann, James Scrofani, John D. Roth, Britta Hale:
Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security. HICSS 2022: 1-2 - [c13]Blake Hayden, Matthew Sweeney, Britta Hale:
Securing Software Updates under Receiver Radio Frequency Geolocation Risk. MILCOM 2022: 643-648 - [i11]Britta Hale, Chelsea Komlo:
On End-to-End Encryption. IACR Cryptol. ePrint Arch. 2022: 449 (2022) - 2021
- [j3]Nikolaos Papakonstantinou
, Douglas L. Van Bossuyt, Joonas Linnosmaa
, Britta Hale, Bryan M. O'Halloran:
A Zero Trust Hybrid Security and Safety Risk Analysis Method. J. Comput. Inf. Sci. Eng. 21(5) (2021) - [j2]Choon Seng Tan
, Douglas L. Van Bossuyt
, Britta Hale
:
System Analysis of Counter-Unmanned Aerial Systems Kill Chain in an Operational Environment. Syst. 9(4): 79 (2021) - [c12]Benjamin Dowling
, Britta Hale:
Secure Messaging Authentication against Active Man-in-the-Middle Attacks. EuroS&P 2021: 54-70 - [c11]James Scrofani, Chad A. Bollmann, John D. Roth, Britta Hale:
Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security. HICSS 2021: 1-2 - [c10]Michael Troncoso, Britta Hale:
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. NDSS 2021 - [c9]Michael Sjoholmsierchio, Britta Hale, Daniel Lukaszewski, Geoffrey G. Xie:
Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. NetSoft 2021: 321-329 - [c8]Cas Cremers, Britta Hale, Konrad Kohbrok:
The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter. USENIX Security Symposium 2021: 1847-1864 - [i10]Michael Troncoso, Britta Hale:
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. IACR Cryptol. ePrint Arch. 2021: 83 (2021) - 2020
- [j1]Britta Hale
:
User-mediated authentication protocols and unforgeability in key collision. Int. J. Inf. Sec. 19(6): 609-621 (2020) - [i9]Michael Sjoholmsierchio, Britta Hale, Daniel Lukaszewski, Geoffrey G. Xie:
Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. CoRR abs/2010.11870 (2020) - [i8]Benjamin Dowling, Britta Hale:
There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging. IACR Cryptol. ePrint Arch. 2020: 541 (2020)
2010 – 2019
- 2019
- [i7]Cas Cremers, Britta Hale, Konrad Kohbrok:
Revisiting Post-Compromise Security Guarantees in Group Messaging. IACR Cryptol. ePrint Arch. 2019: 477 (2019) - [i6]Britta Hale:
Computationally Modeling User-Mediated Authentication Protocols. IACR Cryptol. ePrint Arch. 2019: 1239 (2019) - 2018
- [c7]Britta Hale
:
User-Mediated Authentication Protocols and Unforgeability in Key Collision. ProvSec 2018: 387-396 - 2017
- [c6]Britta Hale
, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Simple Security Definitions for and Constructions of 0-RTT Key Exchange. ACNS 2017: 20-38 - [c5]Felix Günther, Britta Hale
, Tibor Jager, Sebastian Lauer:
0-RTT Key Exchange with Full Forward Secrecy. EUROCRYPT (3) 2017: 519-548 - [c4]Colin Boyd, Britta Hale
:
Secure Channels and Termination: The Last Word on TLS. LATINCRYPT 2017: 44-65 - [i5]Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer:
0-RTT Key Exchange with Full Forward Secrecy. IACR Cryptol. ePrint Arch. 2017: 223 (2017) - [i4]Colin Boyd, Britta Hale:
Secure Channels and Termination: The Last Word on TLS. IACR Cryptol. ePrint Arch. 2017: 784 (2017) - 2016
- [c3]Colin Boyd, Britta Hale
, Stig Frode Mjølsnes
, Douglas Stebila
:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c2]Britta Hale
, Christopher Carr, Danilo Gligoroski:
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control. Mycrypt 2016: 389-408 - 2015
- [i3]Britta Hale, Christopher Carr, Danilo Gligoroski:
CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite. IACR Cryptol. ePrint Arch. 2015: 1035 (2015) - [i2]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptol. ePrint Arch. 2015: 1150 (2015) - [i1]Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Speeding: On Low-Latency Key Exchange. IACR Cryptol. ePrint Arch. 2015: 1214 (2015) - 2014
- [c1]Britta Hale
, Colin Boyd:
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR 2014: 236-255
Coauthor Index
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint