Dr Steve Wesemeyer


Teaching Fellow, Secure Systems
+44 (0)1483 682259
05 BB 02

Academic and research departments

Department of Computer Science.

Biography

My publications

Publications

Alfraih AS, Briffa JA, Wesemeyer S (2015)Cloning localization approach using k-means clustering and support vector machine, In: JOURNAL OF ELECTRONIC IMAGING24(4)ARTN 04301 IS&T & SPIE
Briffa JA, Schaathun HG, Wesemeyer S (2010)An Improved Decoding Algorithm for the Davey-MacKay Construction, In: Proc. IEEE Intern. Conf. on Commun.pp. 1-5
Han Jinguang, Chen Liqun, Schneider Steve, Treharne Helen, Wesemeyer Steve Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials, In: IEEE Transactions on Dependable and Secure Computingpp. 1-1 IEEE
Wesemeyer S (1998)On the automorphism group of various Goppa codes, In: IEEE TRANSACTIONS ON INFORMATION THEORY44(2)pp. 630-643 IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Han Jinguang, Chen Liqun, Schneider Steve, Treharne Helen, Wesemeyer Stephan, Wilson Nick (2020)Anonymous Single Sign-On With Proxy Re-Verification, In: IEEE Transactions on Information Forensics and Security15(1)pp. 223-236 Institute of Electrical and Electronics Engineers (IEEE)
Alfraih AS, Briffa JA, Wesemeyer S (2015)Cloning Localization Based on Feature Extraction and K-means Clustering, In: Shi YQ, Kim HJ, PerezGonzalez F, Yang CN, (eds.), DIGITAL-FORENSICS AND WATERMARKING, IWDW 20149023pp. 410-419
Schneider Steve, Treharne Helen, Wesemeyer Stephan, Han Jinguang, Chen Liqun (2018)Anonymous Single-Sign-On for n designated services with traceability, In: Lopez Javier, Zhou Jianying, Soriano Miguel (eds.), Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I (Lecture Notes in Computer Science Book 11098)11098 Springer
Wesemeyer Steve, Newton Christopher, Treharne Helen, Chen Liqun, Sasse Ralf, Whitefield Jordan (2020)Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme, In: 15th ACM ASIA Conference on Computer and Communications Security
Alfraih AA, Briffa JA, Wesemeyer S (2013)Forgery Localization Based on Image Chroma Feature Extraction, In: Intern. Conf. on Imaging for Crime Detection and Prevention (ICDP)
Diakos TP, Briffa JA, Brown TWC, Wesemeyer S (2013)Eavesdropping Near Field Contactless Payments: A Quantitative Analysis, In: IET Journal of Engineering
Whitefield Jorden, Chen Liqun, Kargl F, Paverd A, Schneider Steven, Treharne Helen, Wesemeyer Stephan (2017)Formal Analysis of V2X Revocation Protocols., In: Proceedings of STM’17. Lecture Notes in Computer Science.10547pp. 147-163 Springer
Wesemeyer S, Sweeney P (1998)Suboptimal soft-decision decoding for some RS-codes, In: ELECTRONICS LETTERS34(10)pp. 983-984 IEE-INST ELEC ENG
Sweeney P, Wesemeyer S (2000)Iterative soft-decision decoding of linear block codes, In: IEE PROCEEDINGS-COMMUNICATIONS147(3)pp. 133-136 IEE-INST ELEC ENG
Wesemeyer S, Sweeney P, Burgess DRB (1999)Some soft-decision decoding algorithms for Reed-Solomon codes, In: Walker M, (eds.), CRYPTOGRAPHY AND CODING1746pp. 290-299
Whitefield Jorden, Chen Liqun, Sasse Ralf, Schneider Steve, Treharne Helen, Wesemeyer Stephan (2019)A Symbolic Analysis of ECC-based Direct Anonymous Attestation, In: Proceedings of the 4th IEEE European Symposium on Security and Privacy Institute of Electrical and Electronics Engineers (IEEE)