Ioana Boureanu
Cited by
Cited by
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (2), 229-257, 2015
Towards secure distance bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
Secure and lightweight distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Lightweight Cryptography for Security and Privacy: Second International …, 2013
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
The Bussard-Bagga and other distance-bounding protocols under attacks
A Bay, I Boureanu, A Mitrokotsa, I Spulber, S Vaudenay
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!
I Boureanu, A Mitrokotsa, S Vaudenay
Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012
Weighted threshold secret sharing based on the Chinese remainder theorem
S Iftene, IC Boureanu
Scientific Annals of Cuza University 15 (ARTICLE), 161-172, 2005
Content delivery over TLS: a cryptographic analysis of keyless SSL
K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017
Automatic verification of temporal-epistemic properties of cryptographic protocols
I Boureanu, M Cohen, A Lomuscio
Journal of Applied Non-Classical Logics 19 (4), 463-487, 2009
Optimal proximity proofs
I Boureanu, S Vaudenay
Information Security and Cryptology: 10th International Conference, Inscrypt …, 2015
A formal treatment of accountable proxying over TLS
K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete
2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018
Challenges in distance bounding
I Boureanu, S Vaudenay
IEEE Security & Privacy 13 (1), 41-48, 2015
Srdjan capkun, Gerhard Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux
G Avoine, MA Bingöl, I Boureanu
Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen …, 2018
Verifying security properties in unbounded multiagent systems
I Boureanu, P Kouvaros, A Lomuscio
Proceedings of the 2016 international conference on autonomous agents …, 2016
Automatic verification of epistemic specifications under convergent equational theories.
I Boureanu, AV Jones, A Lomuscio
AAMAS, 1141-1148, 2012
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
FL Ţiplea, CV Bîrjoveanu, C Enea, I Boureanu
Journal of Computer Security 16 (6), 689-712, 2008
The limits of composable crypto with transferable setup devices
I Boureanu, M Ohkubo, S Vaudenay
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Practical & provably secure distance-bounding
S Vaudenay, I Boureanu, A Mitrokotsa
The 16th Information Security Conference 10, 978-3, 2013
Security analysis and implementation of relay-resistant contactless payments
I Boureanu, T Chothia, A Debant, S Delaune
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Applied cryptography and network security
I Boureanu, P Owesarski, S Vaudenay
Springer International Publishing, 2014
The system can't perform the operation now. Try again later.
Articles 1–20