Caveat coercitor: Coercion-evidence in electronic voting GS Grewal, MD Ryan, S Bursuc, PYA Ryan 2013 IEEE Symposium on Security and Privacy, 367-381, 2013 | 80 | 2013 |
Privacy supporting cloud computing: Confichair, a case study M Arapinis, S Bursuc, M Ryan Principles of Security and Trust: First International Conference, POST 2012 …, 2012 | 46 | 2012 |
Trivitas: Voters directly verifying votes S Bursuc, GS Grewal, MD Ryan E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012 | 39 | 2012 |
Privacy-supporting cloud computing by in-browser key translation M Arapinis, S Bursuc, M Ryan Journal of Computer Security 21 (6), 847-880, 2013 | 28 | 2013 |
Associative-commutative deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Symposium on Theoretical Aspects of Computer Science, 634-645, 2007 | 18 | 2007 |
Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity M Arapinis, S Bursuc, MD Ryan Principles of Security and Trust: First International Conference, POST 2012 …, 2012 | 16 | 2012 |
Protocol security and algebraic properties: Decision results for a bounded number of sessions S Bursuc, H Comon-Lundh Rewriting Techniques and Applications: 20th International Conference, RTA …, 2009 | 14 | 2009 |
Deducibility constraints, equational theory and electronic money S Bursuc, H Comon-Lundh, S Delaune Rewriting, Computation and Proof: Essays Dedicated to Jean-Pierre Jouannaud …, 2007 | 14 | 2007 |
Contingent payments on a public ledger: models and reductions for automated verification S Bursuc, S Kremer Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 11 | 2019 |
Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios S Baloglu, S Bursuc, S Mauw, J Pang 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-15, 2021 | 10 | 2021 |
Provably improving election verifiability in Belenios S Baloglu, S Bursuc, S Mauw, J Pang International Joint Conference on Electronic Voting, 1-16, 2021 | 9 | 2021 |
Private votes on untrusted platforms: models, attacks and provable scheme S Bursuc, CC Dragan, S Kremer 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 606-620, 2019 | 7 | 2019 |
Deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Asian Computing Science Conference, 24-38, 2009 | 7 | 2009 |
Securing the End-points of the Signal Protocol using Intel SGX based Containers K Severinsen, C Johansen, S Bursuc Security Principles and Trust Hotspot 2017, 1, 2017 | 6 | 2017 |
Automated verification of dynamic root of trust protocols S Bursuc, C Johansen, S Xu Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017 | 5 | 2017 |
Deducibility constraints and blind signatures S Bursuc, H Comon-Lundh, S Delaune Information and Computation 238, 106-127, 2014 | 4 | 2014 |
Election verifiability in receipt-free voting protocols S Baloglu, S Bursuc, S Mauw, J Pang 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 59-74, 2023 | 2 | 2023 |
Contingent payments from two-party signing and verification for abelian groups S Bursuc, S Mauw 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 195-210, 2022 | 2 | 2022 |
Unification and Matching in Separable Theories–technicalities S Bursuc, C Prisacariu Technical Report 398, Dept. Info., Univ. Oslo, 2010 | 2 | 2010 |
Contraintes de déductibilité dans une algèbre quotient: réduction de modèles et applications à la sécurité S Bursuc Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, 2009 | 2 | 2009 |