Follow
Ioana Boureanu
Title
Cited by
Cited by
Year
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (2), 229-257, 2015
912015
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
872018
Towards secure distance bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
682014
Secure and lightweight distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
International workshop on lightweight cryptography for security and privacy …, 2013
622013
The bussard-bagga and other distance-bounding protocols under attacks
A Bay, I Boureanu, A Mitrokotsa, I Spulber, S Vaudenay
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
412013
Weighted threshold secret sharing based on the Chinese remainder theorem
S Iftene, IC Boureanu
Scientific Annals of Cuza University 15, 161-172, 2005
382005
Content delivery over TLS: a cryptographic analysis of keyless SSL
K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017
372017
On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!
I Boureanu, A Mitrokotsa, S Vaudenay
International Conference on Cryptology and Information Security in Latin …, 2012
372012
A formal treatment of accountable proxying over TLS
K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete
2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018
332018
Automatic verification of temporal-epistemic properties of cryptographic protocols
I Boureanu, M Cohen, A Lomuscio
Journal of Applied Non-Classical Logics 19 (4), 463-487, 2009
322009
Optimal proximity proofs
I Boureanu, S Vaudenay
International Conference on Information Security and Cryptology, 170-190, 2014
312014
Challenges in distance bounding
I Boureanu, S Vaudenay
IEEE Security & Privacy 13 (1), 41-48, 2015
302015
Srdjan capkun, Gerhard Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux
G Avoine, MA Bingöl, I Boureanu
Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen …, 2018
292018
Verifying security properties in unbounded multiagent systems
I Boureanu, P Kouvaros, A Lomuscio
Proceedings of the 2016 international conference on autonomous agents …, 2016
202016
Automatic verification of epistemic specifications under convergent equational theories.
I Boureanu, AV Jones, A Lomuscio
AAMAS, 1141-1148, 2012
172012
Practical EMV relay protection
AI Radu, T Chothia, CJP Newton, I Boureanu, L Chen
2022 IEEE Symposium on Security and Privacy (SP), 1737-1756, 2022
142022
Security analysis and implementation of relay-resistant contactless payments
I Boureanu, T Chothia, A Debant, S Delaune
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
142020
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
FL Ţiplea, CV Bîrjoveanu, C Enea, I Boureanu
Journal of Computer Security 16 (6), 689-712, 2008
142008
Extensive security verification of the LoRaWAN key-establishment: Insecurities & patches
S Wesemeyer, I Boureanu, Z Smith, H Treharne
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020
112020
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
O Blazy, I Boureanu, P Lafourcade, C Onete, L Robert
32nd USENIX Security Symposium (USENIX Security 23), 5917-5934, 2023
82023
The system can't perform the operation now. Try again later.
Articles 1–20