Follow
Britta Hale
Britta Hale
Verified email at nps.edu - Homepage
Title
Cited by
Cited by
Year
0-RTT key exchange with full forward secrecy
F Günther, B Hale, T Jager, S Lauer
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1122017
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS
C Boyd, B Hale, SF Mjølsnes, D Stebila
Cryptographers’ Track at the RSA Conference, 55-71, 2016
482016
A zero trust hybrid security and safety risk analysis method
N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran
Journal of Computing and Information Science in Engineering 21 (5), 050907, 2021
462021
The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter
C Cremers, B Hale, K Kohbrok
30th USENIX Security Symposium (USENIX Security 21), 1847-1864, 2021
332021
Strengthening SDN security: Protocol dialecting and downgrade attacks
M Sjoholmsierchio, B Hale, D Lukaszewski, G Xie
2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021
302021
A zero-trust methodology for security of complex systems with machine learning components
B Hale, DL Van Bossuyt, N Papakonstantinou, B O’Halloran
International design engineering technical conferences and computers and …, 2021
252021
Secure messaging authentication against active man-in-the-middle attacks
B Dowling, B Hale
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 54-70, 2021
212021
Simple security definitions for and constructions of 0-RTT key exchange
B Hale, T Jager, S Lauer, J Schwenk
Applied Cryptography and Network Security: 15th International Conference …, 2017
192017
Efficient post-compromise security beyond one group
C Cremers, B Hale, K Kohbrok
172019
The Bluetooth cyborg: Analysis of the full human-machine passkey entry AKE protocol
M Troncoso, B Hale
Cryptology ePrint Archive, 2021
162021
System analysis of counter-unmanned aerial systems kill chain in an operational environment
CS Tan, DL Van Bossuyt, B Hale
Systems 9 (4), 79, 2021
142021
There can be no compromise: The necessity of ratcheted authentication in secure messaging
B Dowling, B Hale
Cryptology ePrint Archive, 2020
132020
On end-to-end encryption
B Hale, C Komlo
Cryptology ePrint Archive, 2022
122022
Towards a zero trust hybrid security and safety risk analysis method
N Papakonstantinou, DL Van Bossuyt, J Linnosmaa, B Hale, B O’Halloran
International design engineering technical conferences and computers and …, 2020
102020
A note on hybrid signature schemes
N Bindel, B Hale
Cryptology ePrint Archive, 2023
92023
A systems analysis of energy usage and effectiveness of a counter-unmanned aerial system using a cyber-attack approach
CH Lee, C Thiessen, DL Van Bossuyt, B Hale
Drones 6 (8), 198, 2022
82022
Zero-trust for the system design lifecycle
DL Van Bossuyt, B Hale, R Arlitt, N Papakonstantinou
Journal of Computing and Information Science in Engineering 23 (6), 2023
72023
Revisiting Post-Compromise Security Guarantees in Group Messaging.
C Cremers, B Hale, K Kohbrok
CISPA, 2019
72019
Multi-mission engineering with zero trust: A modeling methodology and application to contested offshore wind farms
DL Van Bossuyt, B Hale, RM Arlitt, N Papakonstantinou
International Design Engineering Technical Conferences and Computers and …, 2022
62022
Model based resilience engineering for design and assessment of mission critical systems containing artificial intelligence components
DL Van Bossuyt, N Papakonstantinou, B Hale, J Salonen, B O’Halloran
Artificial intelligence and cybersecurity: theory and applications, 47-66, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20