Ioana Boureanu
Ioana Boureanu
Senior Lecturer (Associate Professor), University of Surrey
Geverifieerd e-mailadres voor surrey.ac.uk - Homepage
TitelGeciteerd doorJaar
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (2), 229-257, 2015
652015
Secure and lightweight distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
International Workshop on Lightweight Cryptography for Security and Privacy …, 2013
532013
Towards secure distance bounding
I Boureanu, A Mitrokotsa, S Vaudenay
International Workshop on Fast Software Encryption, 55-67, 2013
502013
On the pseudorandom function assumption in (secure) distance-bounding protocols
I Boureanu, A Mitrokotsa, S Vaudenay
International Conference on Cryptology and Information Security in Latin …, 2012
292012
Weighted threshold secret sharing based on the Chinese remainder theorem
S Iftene, IC Boureanu
Scientific Annals of Cuza University 15 (ARTICLE), 161-172, 2005
292005
Automatic verification of temporal-epistemic properties of cryptographic protocols
I Boureanu, M Cohen, A Lomuscio
Journal of Applied Non-Classical Logics 19 (4), 463-487, 2009
282009
The bussard-bagga and other distance-bounding protocols under attacks
A Bay, I Boureanu, A Mitrokotsa, I Spulber, S Vaudenay
International Conference on Information Security and Cryptology, 371-391, 2012
272012
Optimal proximity proofs
I Boureanu, S Vaudenay
International Conference on Information Security and Cryptology, 170-190, 2014
222014
Content delivery over TLS: a cryptographic analysis of keyless SSL
K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017
172017
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
162018
Challenges in distance bounding
I Boureanu, S Vaudenay
IEEE Security & Privacy 13 (1), 41-48, 2015
162015
Automatic verification of epistemic specifications under convergent equational theories.
I Boureanu, AV Jones, A Lomuscio
AAMAS, 1141-1148, 2012
122012
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
FL Ţiplea, CV Bîrjoveanu, C Enea, I Boureanu
Journal of Computer Security 16 (6), 689-712, 2008
122008
Verifying security properties in unbounded multiagent systems
I Boureanu, P Kouvaros, A Lomuscio
Proceedings of the 2016 international conference on autonomous agents …, 2016
112016
The limits of composable crypto with transferable setup devices
I Boureanu, M Ohkubo, S Vaudenay
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
82015
A formal treatment of accountable proxying over TLS
K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete
2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018
72018
Practical & provably secure distance-bounding
S Vaudenay, I Boureanu, A Mitrokotsa
The 16th Information Security Conference 10, 978-3, 2013
72013
On the need for secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Early Symmetric Crypto (ESC) seminar, 2013
72013
Applied cryptography and network security
I Boureanu, P Owesarski, S Vaudenay
Cham: Springer International Publishing, 2014
62014
Nearby Threats: Reversing, Analyzing, and Attacking Google’s' Nearby Connections' on Android
D Antonioli, NO Tippenhauer, K Rasmussen
52019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20