Caveat coercitor: Coercion-evidence in electronic voting GS Grewal, MD Ryan, S Bursuc, PYA Ryan 2013 IEEE Symposium on Security and Privacy, 367-381, 2013 | 67 | 2013 |
Privacy supporting cloud computing: Confichair, a case study M Arapinis, S Bursuc, M Ryan International Conference on Principles of Security and Trust, 89-108, 2012 | 42 | 2012 |
Trivitas: Voters directly verifying votes S Bursuc, GS Grewal, MD Ryan International Conference on E-Voting and Identity, 190-207, 2011 | 29 | 2011 |
Privacy-supporting cloud computing by in-browser key translation M Arapinis, S Bursuc, M Ryan Journal of Computer Security 21 (6), 847-880, 2013 | 19 | 2013 |
Associative-commutative deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Symposium on Theoretical Aspects of Computer Science, 634-645, 2007 | 17 | 2007 |
Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity M Arapinis, S Bursuc, MD Ryan International Conference on Principles of Security and Trust, 169-188, 2012 | 15 | 2012 |
Protocol security and algebraic properties: Decision results for a bounded number of sessions S Bursuc, H Comon-Lundh International Conference on Rewriting Techniques and Applications, 133-147, 2009 | 15 | 2009 |
Deducibility constraints, equational theory and electronic money S Bursuc, H Comon-Lundh, S Delaune Rewriting, Computation and Proof, 196-212, 2007 | 13 | 2007 |
Deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Asian Computing Science Conference, 24-38, 2009 | 7 | 2009 |
Securing the End-points of the Signal Protocol using Intel SGX based Containers K Severinsen, C Johansen, S Bursuc Security Principles and Trust Hotspot 2017, 1, 2017 | 6 | 2017 |
Private votes on untrusted platforms: models, attacks and provable scheme S Bursuc, CC Dragan, S Kremer 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 606-620, 2019 | 5 | 2019 |
Automated verification of dynamic root of trust protocols S Bursuc, C Johansen, S Xu International Conference on Principles of Security and Trust, 95-116, 2017 | 4 | 2017 |
Contingent payments on a public ledger: models and reductions for automated verification S Bursuc, S Kremer European Symposium on Research in Computer Security, 361-382, 2019 | 3 | 2019 |
Deducibility constraints and blind signatures S Bursuc, H Comon-Lundh, S Delaune Information and Computation 238, 106-127, 2014 | 2 | 2014 |
Unification and Matching in Separable Theories–technicalities S Bursuc, C Prisacariu Technical Report 398, Dept. Info., Univ. Oslo, 2010 | 2 | 2010 |
Contraintes de déductibilité dans une algèbre quotient: réduction de modèles et applications à la sécurité S Bursuc Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, 2009 | 2 | 2009 |
Secure two-party computation in applied pi-calculus: models and verification S Bursuc Trustworthy Global Computing, 1-15, 2015 | 1 | 2015 |
Unification and matching in separable theories S Bursuc, C Prisacariu 24th International Workshop on Unification (UNIF10), Edimburg, UK, 2010 | 1 | 2010 |
Contraintes de déductibilité modulo associativitécommutativité S Bursuc Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, 2006 | 1 | 2006 |
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios S Baloglu, S Bursuc, S Mauw, J Pang Cryptology ePrint Archive, 2020 | | 2020 |