Obserwuj
Ioana Boureanu
Tytuł
Cytowane przez
Cytowane przez
Rok
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
992018
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (2), 229-257, 2015
972015
Towards secure distance bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
692014
Secure and lightweight distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
International workshop on lightweight cryptography for security and privacy …, 2013
632013
The bussard-bagga and other distance-bounding protocols under attacks
A Bay, I Boureanu, A Mitrokotsa, I Spulber, S Vaudenay
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
422013
Content delivery over TLS: a cryptographic analysis of keyless SSL
K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017
402017
On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!
I Boureanu, A Mitrokotsa, S Vaudenay
International Conference on Cryptology and Information Security in Latin …, 2012
402012
Weighted threshold secret sharing based on the Chinese remainder theorem
S Iftene, IC Boureanu
Scientific Annals of Cuza University 15, 161-172, 2005
382005
A formal treatment of accountable proxying over TLS
K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete
2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018
372018
Optimal proximity proofs
I Boureanu, S Vaudenay
International Conference on Information Security and Cryptology, 170-190, 2014
332014
Automatic verification of temporal-epistemic properties of cryptographic protocols
I Boureanu, M Cohen, A Lomuscio
Journal of Applied Non-Classical Logics 19 (4), 463-487, 2009
332009
Srdjan capkun, Gerhard Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux
G Avoine, MA Bingöl, I Boureanu
Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen …, 2018
312018
Challenges in distance bounding
I Boureanu, S Vaudenay
IEEE Security & Privacy 13 (1), 41-48, 2015
312015
Practical EMV relay protection
AI Radu, T Chothia, CJP Newton, I Boureanu, L Chen
2022 IEEE Symposium on Security and Privacy (SP), 1737-1756, 2022
222022
Verifying security properties in unbounded multiagent systems
I Boureanu, P Kouvaros, A Lomuscio
Proceedings of the 2016 international conference on autonomous agents …, 2016
212016
Automatic verification of epistemic specifications under convergent equational theories.
I Boureanu, AV Jones, A Lomuscio
AAMAS, 1141-1148, 2012
192012
Security analysis and implementation of relay-resistant contactless payments
I Boureanu, T Chothia, A Debant, S Delaune
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
142020
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
FL Ţiplea, CV Bîrjoveanu, C Enea, I Boureanu
Journal of Computer Security 16 (6), 689-712, 2008
142008
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
O Blazy, I Boureanu, P Lafourcade, C Onete, L Robert
32nd USENIX Security Symposium (USENIX Security 23), 5917-5934, 2023
122023
Extensive security verification of the LoRaWAN key-establishment: Insecurities & patches
S Wesemeyer, I Boureanu, Z Smith, H Treharne
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020
122020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20