Formal Security Analysis of the AMD SEV-SNP Software Interface
Toward Automated Formal Security Analysis of SAML V2.0 Web Browser SSO Standard—The POST/Artifact Use Case
Threat model for IEC 61850 based substation automation system
Threat model for IEC 61850 based substation automation system
Flexible Remote Attestation of Pre-SNP SEV VMs Using SGX Enclaves
Conditional Observational Equivalence and Off-Line Guessing Attacks in Multiset Rewriting
Automatically generating models of IT systems
A Survey on Applications of Formal Methods in Analysis of SCADA Systems
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets
Mechanized Formal Model of Bitcoin’s Blockchain Validation Procedures
C3PO: cipher construction with cartesian genetic programming
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens
Inductive trace properties for computational security
Protocol Composition Logic (PCL)
Secrecy Analysis in Protocol Composition Logic
Compositional analysis of contract-signing protocols
Games and the Impossibility of Realizable Ideal Functionality
Computationally Sound Compositional Logic for Key Exchange Protocols
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
A modular correctness proof of IEEE 802.11i and TLS
A derivation system and compositional logic for security protocols
Abstraction and refinement in protocol derivation
A derivation system for security protocols and its logical formalization
Secure protocol composition
Teaching
University undergraduate
- Competitive Programming (Lecturer in charge, Lecturer in charge)
- Competitive skills in cybersecurity (Lecturer in charge, Lecturer in charge)
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Introduction to Theoretical Computer Science (Lecturer in charge)
- Introduction to Theoretical Computer Science (Lecturer in charge)
- Programming Language Translation (Lecturer in charge)
- Programming Language Translation (Lecturer in charge)
- BSc Thesis (Lecturers)
- BSc Thesis (Lecturers)
- Final BSc Thesis (Lecturers)
- Project C (Lecturers)
- Software Design Project (Lecturers)
- Software Design Project (Lecturers)
University graduate
- Cryptography and Cryptoanalysis (Lecturer in charge)
- Distributed Ledgers and Cryptocurrencies (Lecturer in charge)
- Distributed Ledgers and Cryptocurrencies (Lecturer in charge)
- Mathematical Logic and Computability (Lecturer in charge)
- Graduation Thesis (Lecturers)
- Master Project (Lecturers)
- Mentorship Seminar (Lecturers)
- Presentation Seminar (Lecturers)
- Project (Lecturers)
- Laboratory of Computer Science 2 (Laboratory exercises)
Postgraduate doctoral study programme
- Reliability and Fault-tolerance of Computer Systems (Lecturer in charge)
- Sigurnost operacijskih sustava i aplikacija (Lecturer in charge)
Postgraduate spec. study
- Applied cryptography (Lecturer in charge)
- Distributed ledgers and cryptocurrencies (Lecturer in charge)
- Information security (Lecturer in charge)
Competences
-
Computers and information processing
Computer security Formal verification -
Industry applications
Cryptography
Pristupačnost