Caveat coercitor: Coercion-evidence in electronic voting GS Grewal, MD Ryan, S Bursuc, PYA Ryan 2013 IEEE Symposium on Security and Privacy, 367-381, 2013 | 74 | 2013 |
Privacy supporting cloud computing: Confichair, a case study M Arapinis, S Bursuc, M Ryan International Conference on Principles of Security and Trust, 89-108, 2012 | 43 | 2012 |
Trivitas: Voters directly verifying votes S Bursuc, GS Grewal, MD Ryan International Conference on E-Voting and Identity, 190-207, 2011 | 33 | 2011 |
Privacy-supporting cloud computing by in-browser key translation M Arapinis, S Bursuc, M Ryan Journal of Computer Security 21 (6), 847-880, 2013 | 21 | 2013 |
Associative-commutative deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Symposium on Theoretical Aspects of Computer Science, 634-645, 2007 | 19 | 2007 |
Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity M Arapinis, S Bursuc, MD Ryan International Conference on Principles of Security and Trust, 169-188, 2012 | 16 | 2012 |
Protocol security and algebraic properties: Decision results for a bounded number of sessions S Bursuc, H Comon-Lundh International Conference on Rewriting Techniques and Applications, 133-147, 2009 | 14 | 2009 |
Deducibility constraints, equational theory and electronic money S Bursuc, H Comon-Lundh, S Delaune Rewriting, Computation and Proof, 196-212, 2007 | 13 | 2007 |
Contingent payments on a public ledger: models and reductions for automated verification S Bursuc, S Kremer European Symposium on Research in Computer Security, 361-382, 2019 | 8 | 2019 |
Deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Asian Computing Science Conference, 24-38, 2009 | 7 | 2009 |
Private votes on untrusted platforms: models, attacks and provable scheme S Bursuc, CC Dragan, S Kremer 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 606-620, 2019 | 6 | 2019 |
Securing the End-points of the Signal Protocol using Intel SGX based Containers K Severinsen, C Johansen, S Bursuc Security Principles and Trust Hotspot 2017, 1, 2017 | 6 | 2017 |
Automated verification of dynamic root of trust protocols S Bursuc, C Johansen, S Xu International Conference on Principles of Security and Trust, 95-116, 2017 | 4 | 2017 |
Deducibility constraints and blind signatures S Bursuc, H Comon-Lundh, S Delaune Information and Computation 238, 106-127, 2014 | 3 | 2014 |
Contraintes de déductibilité dans une algèbre quotient: réduction de modèles et applications à la sécurité S Bursuc Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, 2009 | 3 | 2009 |
Provably improving election verifiability in Belenios S Baloglu, S Bursuc, S Mauw, J Pang International Joint Conference on Electronic Voting, 1-16, 2021 | 2 | 2021 |
Election verifiability revisited: automated security proofs and attacks on Helios and Belenios S Baloglu, S Bursuc, S Mauw, J Pang 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-15, 2021 | 2 | 2021 |
Unification and Matching in Separable Theories–technicalities S Bursuc, C Prisacariu Technical Report 398, Dept. Info., Univ. Oslo, 2010 | 2 | 2010 |
Secure two-party computation in applied pi-calculus: models and verification S Bursuc Trustworthy Global Computing, 1-15, 2015 | 1 | 2015 |
Unification and matching in separable theories S Bursuc, C Prisacariu 24th International Workshop on Unification (UNIF10), Edimburg, UK, 2010 | 1 | 2010 |