Jonathan Hoyland
Jonathan Hoyland
Verified email at
Cited by
Cited by
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Oblivious dns over https (odoh): A practical privacy enhancement to dns
S Singanamalla, S Chunhapanya, M Vavruša, T Verma, P Wu, M Fayed, ...
arXiv preprint arXiv:2011.10121, 2020
A tale of two models: Formal verification of KEMTLS via Tamarin
S Celi, J Hoyland, D Stebila, T Wiggers
European Symposium on Research in Computer Security, 63-83, 2022
Respect the ORIGIN! a best-case evaluation of connection coalescing in the wild
S Singanamalla, MT Paracha, S Ahmad, J Hoyland, L Valenta, Y Safronov, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 664-678, 2022
An analysis of TLS 1.3 and its use in composite protocols.
J Hoyland
Royal Holloway, University of London, 2018
RFC 9257: Guidance for External Pre-Shared Key (PSK) Usage in TLS
R Housley, J Hoyland, M Sethi, CA Wood
RFC Editor, 2022
Generating Concurrency Checks Automatically
J Hoyland, M Hague
Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs …, 2016
Analysing The OAuth Protocol
J Hoyland
BA Thesis, University of Oxford, 2012
The system can't perform the operation now. Try again later.
Articles 1–8