Professor Tom Coffey


Position:
Professor of Electronic and Computer Engineering
Department of Electronic and Computer Engineering,
University of Limerick,
Limerick, Ireland

Academic Degrees:
D.Phil. University of Ulster, Ireland
M.Sc. City University London, UK
e-mail: tom.coffey@ul.ie Tel: +353-61-202268 Fax: +353-61-338176

Prof. Tom Coffey is a chartered engineer, he holds an M.Sc from City University, London and a D.Phil from the University of Ulster, Ireland. He has held his current position of Professor of Electronic and Computer Engineering at the University of Limerick, Ireland, since 1998. He is also the founder and director of the Data Communication Security Laboratory at the University of Limerick. Previous to this, he was a telecommunications design engineer and manager at Standard Telephones and Cables, London, UK (1974-1980) and research and development manager at Telectron Ltd., Dublin (1980). He has also occupied the positions of senior lecturer (1986), Westinghouse Research Professor (1987-1998) and Head of the Department of Electronic and Computer Engineering (2000-2003) at the University of Limerick.

Professor Coffey’s research work encompasses: verifiably secure cryptographic protocols for open hostile environments, formal verification of security protocols using logic-based and state space-based techniques, generation of modal-logics of knowledge and belief, automated proving systems for security protocol verification, watermarking and information hiding for multimedia document protection, multi-layer security architectures for virtual networks, biometrics and robust media access control protocols optimised for use in power-line modems and power-line LAN systems.

Professor Coffey has published over 100 scientific publications in internationally accredited journals and conferences and he has supervised over 40 PhD/Masters students to completion. Since the late 1980s, he has undertaken over 20 collaborative research projects as principal investigator. His work has been funded by twelve multi-national companies, Irish (such as: Irish Research Council for Science Engineering and Technology, Enterprise Ireland, Forbairt, Eolas and National Board for Science and Technology) and European development agencies.

Professor Coffey currently acts as external examiner for postgraduate research programmes and undergraduate programmes at Universities in Ireland, UK and Europe. He also acts as a referee for a range of scientific journals, an industrial consultant and expert reviewer for research development agencies such as Research Council of Norway and Shannon Development. He is also actively involved with many professional conferences, such as: (Conference chair), ISPLC’01 (International advisory board), ISPLC’02 (International advisory board), ISSC’03 (Programme committee), ISPLC’03 (International advisory board), ACM ISICT’03 (Programme committee and session organiser), IEEE INES2004 (Session chair), WSEAS E-ACTIVITIES’04 (Programme committee and session organiser), EMES’05 (Programme committee), IASTED CNIS’05 (Programme committee). He was editor of ISPLC2000 Proceedings, Joint editor of ACM ISICT’03 Proceedings and Guest editor (joint) of WSEAS Transactions on Information Science and Applications - Nov 2004.


Publications

Recent Refereed Publications:

  • Dojen, R., Coffey, T., “The Concept of Layered Proving Trees and Its Application to the Automation of Security Protocol Verification”, in: ACM Transactions on Information and System Security (TISSEC), Vol.8., No. 3,  pp. 287 – 31, August 2005.
  • Ventuneac M., Dojen, C., Coffey, T.,  “Automated Verification of  Wireless Security Protocols using Layered Proving Trees”,  WSEAS Transactions on Communications,  In Press, Dec. 2005. ISSN 1109-2742.

  • Tian, L. T., Dojen, R., Coffey, T., “Extending Formal Security Protocol Specification Languages for use with New Verification Techniques”, Transactions Information Science and Applications, In Press, Dec. 2005. ISSN 1790-0832.

  • O’Sullivan, S., Dojen, T., Coffey, T.,  “Protecting Virtual Networks With A Distributed Cooperative Multi-layer Security Architecture”, WSEAS Transactions on Computers,  In Press, Dec. 2005. ISSN  1109-2750.

  • Dojen R. and Coffey, T., “A Case Study on Automation of Verification Logics”, Proceedings of Proceedings of IEEE International Conference on Intelligent Engineering Systems (INES2005), pp.139-145, Greece, 2005

  • Ventuneac, M., Coffey, T., “Techniques for Analyzing Security Protocols: A Case Study on Non-repudiation”, Proceedings of EMES’05, Oradea, Romania, 2005.

  • Tian, L., Dojen, R., Coffey, T., “Extending CAPSL for Logic-Based Verifications”, International Conference on Information Security, Communications and Computers (ISCOCO’05), Tenerife, Canary Island, Spain, 2005.

  • Ventuneac M., Dojen, C., Coffey, T.,  An Empirical Analysis of Automated Verification of  Wireless Security Protocols, International Conference on Information Security, Communications and Computers (ISCOCO’05), Tenerife, Canary Island, Spain, Dec 2005.

  • Morrison, J., Coffey, T., “An Experimental Analysis of Geometric Attacks on DCT-Based Watermarks”, in: Transactions on Information Science and Applications, Issue 6, Volume 1, pp 1656-1661, 2004. ISSN 1790-0832.

  • Dojen, R .,  Coffey, T., A Novel Approach to the Automation of Logic-Based Security Protocol Verification,  in: Transactions on Information Science and Applications, Issue 5, Volume 1, pp 1243-1247, 2004. ISSN 1790-0832.

  • Ventuneac, M., Coffey, T., Newe, T., “Reasoning on Properties of Non-Repudiation Security Protocols”, in: Transactions on Information Science and Applications, Issue 5, Volume 1, pp 1262-1267,  2004. ISSN 1790-0832.

  • Healy, K., Coffey, T., Dojen, R., “A Comparative Analysis of State-Space Tools and Techniques for Security Protocol Verification”, in: Transactions on Information Science and Applications, Issue 5, Volume 1, pp 1256-1261, 2004. ISSN 1790-0832.

  • Dojen, R. and Coffey, T., "Applying Conditional Linear Cryptanalysis to Ciphers with Key-Dependant Operations", in: Transactions  on COMPUTERS, Issue 5, Volume 3, pp. 1425-1430, 2004. ISSN 1109-2750.

  • Mastorakis, N. (Editor), Antonidakis, M., Coffey, T. et. al (Guest Editors), WSEAS Transactions on Information Science and Applications, Issue 5, Vol.1, Nov. 2004. ISSN 1790-0832

  • Picovici, D., Levy, D., Mahdi, A.E., Coffey, T., "The cascade induction machine: a reliable and controllable motor or generator", in: Electric Power Systems Research (Elsevier Science), 68, 2004, pp.193–207, ISSN: 0378-7796.

  • Tierney, E., Newe, T., Coffey, T., "Cox's Algorithm: strengths and weaknesses with varying composition digital images: Extended", WSEAS Transactions on Communications, Issue 1, Volume 3, 2004,  pp 10-15. ISSN 1109-2742.

  • Ventuneac, M., Coffey, T., Newe, T., “Reasoning on Properties of Non-Repudiation Security Protocols”, in Proceedings of WSEAS International Conference on E-ACTIVITIES, Crete, Oct. 2004. ISBN: 960-8457-04-1.

  • Tierney, E., Newe, T., Coffey, T., 2004. "Cox's Algorithm: strengths and weaknesses with varying composition digital images", 6th WSEAS International Conference on Telecommunications and   Informatics  (TELE-INFO '04), Cancun, Mexico, May 12-15, 2004,  ISBN 960-8052-98-X.

  • Dojen, R. and Coffey, T., "Applying Conditional Linear Cryptanalysis to Ciphers with Key-Dependant Operations", Invited paper, in: Proceedings of 4th WSEAS International Conference on Information Science and Applications (ISA'04), Miami, USA, April 2004. ISBN: 960-8052-1.

  • Alesky, M., Coffey, T., et.al (Editors), “Proceedings of International Symposium on Information and Communication Technologies (ISICT03) -  A Volume in the ACM International Conference Proceedings Series”. 2003. ISBN 0-9544145-2-7.

  • Morrison, J., Coffey, T., “An Experimental Analysis of Geometric Attacks on DCT Based Watermarks”, Proceedings of  WSEAS International Conference on E-ACTIVITIES, Crete, Oct. 2004. ISBN: 960-8457-04-1.

  • Coffey, T.,  Ventuneac, M., Newe, T., Salomie, S., “On investigating the security and fairness of a fair exchange protocol  using logic-based verification”, in:  Proceedings of IEEE International Conference on Intelligent Engineering Systems (INES2004), Cluj-Napoca, Romania,  pp 325-330, U.T.Pres 2004, ISBN: 973-662-120-0.

  • Coffey T., Dojen R., Flanagan T., “Formal verification: an imperative step in the design of security protocols”, in:  Computer Networks: The International Journal of Computer and Telecommunications Networking , Vol. 43, No. 5, Dec 2003, pp 601-618. ISSN: 1389-1286.

  • Newe, T., Coffey, T., “Formal Verification logic for hybrid security protocols”, in: International Journal of Computer Systems Science & Engineering, Vol.18 no 1, Jan 2003, pp 17-25, ISSN 0267 6192 .

  • Newe, T., Coffey, T., “Minimum-Knowledge Schemes for low-power, low-memory Devices”, Transactions on Circuits and Systems, Issue 2, Volume 2, April 2003. pp 460-465. ISSN 1109-2734.

  • Newe T., Coffey T., “On the Logical Verification of Key Exchange Protocols for Mobile Communications”. Chapter in:  Recent Advances in Communications and Computer Science (WSEAS Press), pp 76-81, 2003. ISBN:960-8052-86-6.

  • Newe, T., Coffey, T., “Security protocols for 2G and 3G wireless communications”, in: ACM International Conference Proceeding Series  - International Proceedings of Symposium on Information and Communication Technologies (ISICT03), Trinity College, Dublin, 2003, pp. 348-353. ISBN 0-9544145-2-7.

  • Newe, T., Coffey, T., “Minimum-Knowledge Schemes for low-power, low-memory Devices”, Invited Paper: in : 3rd WSEAS Int. Conf. on Applied Informatics  and  Communications (AIC'03), Rhodes Island, Greece, Nov 15-17, 2003. ISBN 960-8052-90-4.

  • Ventuneac, M., Coffey, T., Salomie, I.,  “A policy-based security framework for web-enabled applications”, in: Proceedings of International Symposium on Information and Communication Technologies (ISICT03), Trinity College, Dublin, 2003, pp. 505-510. ISBN 0-9544145-2-7.

  • Coffey, T., Dojen, R., Flanagan, T., “On the formal verification of security protocols”, in: Proceedings of the WSEAS International Conference on Communications; Corfu, Greece, 2003, ISBN: 960 8052 82 3.

  • Newe, T., Coffey, T., “On the logical verification of key exchange protocols for mobile communications”, in: Proceedings of the WSEAS International Conference on Communications (CSCC2003), Corfu, Greece, 2003, ISBN: 960 8052 82 3.

  • Coffey, T., Dojen, R., Flanagan,  T., “On different approaches to establish the security of cryptographic protocols”, in: Proceedings of International Conference on Security and Management (SAM03) Vol. II, Las Vegas, USA. 2003, pp 637-643, ISBN 1-932415-18- 1.

  • Coffey, T., Saidha,  P., Burrows, P., “Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt”, in: ACM International Conference Proceeding Series - Proceedings of International Symposium on Information and Communication Technologies (ISICT03), Trinity College, Dublin, 2003, pp. 370-376. ISBN 0-9544145-2-7.

  • Coffey, T., Dojen, R., Flanagan, T.,  “On the automated implementation of modal logics used to verify security protocols”, in: ACM International Conference Proceeding Series - Proceedings of International Symposium on Information and Communication Technologies (ISICT03), Trinity College, Dublin, 2003, pp. 342-347. ISBN 0-9544145-2-7.

  • Coffey, T., Dojen, R., Analysis of a mobile communication security protocol, in: ACM International Conference Proceeding Series - Proceedings of International Symposium on Information and Communication Technologies (ISICT03), Trinity College, Dublin, 2003, pp. 329-335. ISBN 0-9544145-2-7.

  • Ventuneac, M., Coffey, T., Dragomiroiu, M., Salomie, I., "A policy-based security framework for virtual learning environments", in: Proceedings of 14th International Conference on Control Systems and Computer Science.  Bucharest,  2003, ISBN: 973-8449-18-9.

  • Gyorodi, C., Gyorodi, R. Coffey, T., Holban, S., “Mining association rules using dynamic FP-trees”, in: Proceedings of Irish Signal and Systems Conference (ISSC03), Limerick, 2003,  ISBN 0 954 2973 1 8.

  • Ventuneac, M., Coffey, T., Dragomiroiu, M., Salomie, I., "Security policies for customizable access control in virtual learning environments", in: Proceedings of International Conference on Engineering of Modern Electrical Systems (EMES03) Oradea - Felix Spa, Romania, 2003, ISSN - 1223-2106.

  • Morrison, J., Coffey, T., “Attacks and Counter Measures in Spread Spectrum Watermarking Systems”, in: Proceedings of  IT&T Conference 2003, Letterkenny, Ireland, Oct 2003, ISSN 1649-1246.

  • Dragomiroiu, M., Gyorodi, R., Ventuneac, M., Salomie, I., Coffey, T.,  "Web-applications, an enterprise frameworks-based approach", in: Proceedings of International Conference on Engineering of Modern Electrical Systems (EMES03) Oradea- Felix Spa, Romania, 2003, pp. 36-42. ISSN - 1223-2106 

  • Dinsoreanu, M., Godja, C., Anghel, C., Salomie, I., Coffey, T., “Mobile agent solutions for student assessment in virtual learning environments”, in: Proceedings of  IAWTIC 2003 Conference, Viena, Austria. 2003. ISBN 1740880692.

  • Dragomiroiu, M., Ventuneac, M., Salomie, I., Coffey, T., "On developing enterprise frameworks for web-applications", in: Proceedings of 14th International Conference on Control Systems and Computer Science, Bucharest,  2003.  ISBN: 973-8449-18-9.

  • Dragomiroiu, M.,  Ventuneac, M., Salomie, I., Coffey, T.,“Application framework development for virtual learning environments”, Proceedings of 25th Intl. Conf. Information Technology Interfaces (ITI2003), Cavtat, Croatia,  2003.

  • Dinsoreanu, M., Godja, C., Anghel, C., Salomie,I., Coffey, T., “Mobile agent based solutions for knowledge assessment in eLearning environments”, in: Proceedings of EUROMEDIA’2003, Plymouth University, UK, 2003, ISSN 1649-1246.

  • Newe, T., Coffey, T., “Hybrid Mobile Security Protocol: Formal verification using a new modal logic”, in: Proceedings of ICAI-2002, Puerto De La Cruz,  Spain, Dec.2002.

  • Gyorodi, R.S., Holban, S., Coffey, T., Gyorodi, C.A., "Identity confirmation system based on CTAG and HMM", in: Proceedings of CONTI 2002 (5th International Conference on Technical Informatics), October 2002, Timisoara, Romania.

  • Picovici, D., Mahdi, A.E., Coffey, T., "An Internet-based indoor air quality measurement system" Proceedings of the 6th International Conference on Development and Applications Systems, pp:249-254, May 2002. Suceava, Romania. ISBN 973-98670-9-X

  • Dadarlat, V., Ivan, C., Coffey, T., "A Middleware Based Approach for Designing Routing Protocols", IEEE CCEDCE02 Proceedings, Vol. 1 pp 1436 -1441. May 2002, Manitoba, Canada. ISBN 0-7803 7514 9.

  • Gyorodi, R.S., Holban, S., Coffey, T., Gyorodi, C.A., "Identity confirmation system based on CTAG and HMM", Transactions on Automatic Control and Computer Science (Scientific Bulletin of "Poliethnica" University of Timisoara), Vol 47(61) No. 2, 2002, pp 35-41. ISSN 1224-600X.

  • Dadarlat,V., Coffey, T., Ivan, C., " A Personalized Approach for Teaching Web-based Curriculum in Communications ans Computer Networks" IEEE CCECE02 Proceedings, Vol. 1 pp 732-737. May 2002, Manitoba, Canada..  ISBN 0-7803 7514 9.

  • Toal, D.J.F., Flanagan, C., Coffey, T., "Simulation in the Development of Mobile Robot Controllers, Tread Warily”, The 5th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2001, July, 2001, Orlando, Florida, USA.

  • Flanagan, C., Toal, D., Leyden, M., Coffey, T.,  "Fuzzy Logic for Command Arbitration in Navigation System for a Mobile Robot", in: Proceedings of 16th International Conference on Production Research, 29 July 2001, Prague.

  • Morrison, J. and Coffey, T.,  "The Transition from GSM to the 3rd Generation: A Security Perspective", Proceedings of Information Technology & Telecommunications in the Institute of Technology and Industry Sectors (e-generation 2001), Ireland, 2001. ISSN 16491246.

  • Flanagan, T., Coffey, T., Dojen, R., "Radio Access Link Security for Universal Mobile Telecommunication Systems", Proceedings of EMES’01 (Engineering of Modern Electric Systems), Oradea-Felix Spa, Romania, May 2001. ISSN-1223-2106.

  • Dojen, R. and Coffey T., "On the Cryptographic Strength of Symmetric Ciphers Suitable for Power-Line Communications" Proceedings of 2001 International Symposium on Powerline Communications and its Applications, Malmo, Sweden, 2001. ISBN: 91-7167-021-1.

  • Coffey T., McGrath, S., (Editors) Proceedings of 2000 International Symposium on Power-line Communications and its Applications (ISPLC2000), ISBN 1-87-4653-60-7.

  • Newe,  T. and Coffey, T., " Verifying a Minimum-Knowledge Authentication Protocol for use in Power-Line Networks" Proceedings of ISPLC2000 (2000 International Symposium on Power-line Communications 2000, Limerick, Ireland, April, pp 109-116. ISBN 1-87-4653-60-7.

  • Gallagher, B., Moore, B., Coffey, T., "A Transport Protocol Independent Driver for a Power-Line LAN", in:  Proceedings  of  International Symposium on Power-line Communications 2000 (ISPLC2000), Limerick, Ireland, April, pp 233-240. ISBN 1-87-4653-60-7.


 

Selected Pre-2000 Publications:

  • Coffey, T. and  Newe, T., “Realisation of a minimum-knowledge identification and signature scheme”,  in: Computers and Security J., Vol 17, No.3, pp 253-264, 1998.

  • Coffey, T., Griffin, J., and Moore, B., “A Media Access Control Protocol for a Power Line Local Area Network”, Invited Paper in: Proceedings of 1998 International Symposium on Power Line Communications and Its Applications, pp179-193,  Soka University, Tokyo, Japan, 1998. ISBN 90-74249-18-3.

  • Coffey, T., Saidha, P., “Logic for verifying public-key cryptographic protocols”, in:  IEE Proc.- Computers and Digital Techniques, Vol.144, Issue 1, pp 28-32, Jan 1997.

  • Griffin, J., Moore, B., Coffey, T, “A method for operating a modem in a network and a modem for use in the network”, PCT Patent Application number PCT/IE/96/00066, Patent No. S96 0709, Granted February 1997.

  • Coffey, T., Saidha, P., “Non-Repudiation with Mandatory Proof of Receipt”, in:  ACM Computer Communication Review; Vol. 26, No. 1, pp6-17, Jan 1996. ISSN:0146-4833.

  • Coffey, T., O'Shaughnessy, A.,“Writing a LINUX Hardware Device Driver”; in: UNIX World Online, McGrath-Hill, 1995

  • Wang, W., Coffey, T., “Network Security: Design of a Global Secure Link”, in: ACM  IFIP Transactions:  A (Computer Science and Technology),  vA-15, 1992, p101-11.

  • Coffey, T.; “Implementation of Public Key and Secret Key Cryptography on a Local Area Network”, in: Proceedings of the Sixth European Conference on Mathematics in Industry, ECMI Vol. 8, PP 115-120, B.G. Teubner, Stuttgart; 1992.

  • Coffey, T., Samways, P., “A New Algorithm For Fast Time-Domain Auto-Correlation”, in:  Proceedings (Vol. 2) of the 22nd  International Symposium on Automotive Technology & Automation, Florence, Italy;  May 1990, ISBN 0-9477-1936-96.

  • Coffey, T., Samways, P., Rasmussen, B., “A Hybrid Time Domain Convolution Algorithm”, in:  Proceedings of International Conference on Data Communications Technology Proceedings, Ireland; 1988, p509-19, ISBN 0-9503-4275-0.

  • Treacy, D., Coffey, T.,  Owen-Jones, J., “A Review of the DES algorithm and the RSA algorithm for Applications in Commercial Cryptography, in: Proceedings of International Conference on Data Communications Technology  Proceedings, Ireland, 1988, p47-62, ISBN 0-9503-4275-0.

  • Burton, D.P., Coffey, T., “Research Co-operatives - Experiences with a Small Scale Approach”, in:  Science, Measurement and Technology, IEE Proceedings A, Volume: 135, Issue: 8, November. 1988. Pages: 539 – 540. ISSN: 0143-702X