Decidability and complexity results for security protocols FL Tiplea, C Enea, CV Bîrjoveanu VISSAS 1, 185-211, 2005 | 45 | 2005 |
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete FL Ţiplea, CV Bîrjoveanu, C Enea, I Boureanu Journal of Computer Security 16 (6), 689-712, 2008 | 14 | 2008 |
Anonymity and fair-exchange in e-commerce protocol for physical products delivery CV Bîrjoveanu 2015 12th International Joint Conference on e-Business and …, 2015 | 8 | 2015 |
An optimistic fair exchange e-Commerce protocol for complex transactions CV Bırjoveanu, M Bırjoveanu 15th International Joint Conference on e-Business and Telecommunications …, 2018 | 5 | 2018 |
Secrecy for Security Protocols. CV Bîrjoveanu Sci. Ann. Cuza Univ. 16, 5-38, 2006 | 5 | 2006 |
Fair exchange E-commerce protocol for multi-chained complex transactions CV Bırjoveanu, M Bırjoveanu 17th International Joint Conference on e-Business and Telecommunications 2 …, 2020 | 4 | 2020 |
Formal verification of multi-party fair exchange E-commerce protocols CV Bîrjoveanu, M Bîrjoveanu Secure multi-party E-commerce protocols, 81-106, 2022 | 3 | 2022 |
Automated verification of e-commerce protocols for complex transactions CV Bîrjoveanu, M Bîrjoveanu E-Business and Telecommunications: 15th International Joint Conference …, 2019 | 3 | 2019 |
Preserving Anonymity in Fair Exchange Complex Transactions E-Commerce Protocol for B2C/B2B Applications. CV Bîrjoveanu, M Bîrjoveanu ICETE (1), 265-276, 2018 | 3 | 2018 |
Chained transaction protocol automated verification using Cl-AtSe CV Bîrjoveanu, M Bîrjoveanu E-Business and Telecommunications: 17th International Conference on E …, 2021 | 2 | 2021 |
Multi-party E-commerce protocol for B2C/B2B applications CV Bırjoveanu, M Bırjoveanu 16th International Joint Conference on e-Business and Telecommunications …, 2019 | 2 | 2019 |
Anonymity in complex transactions for e-Business CV Bîrjoveanu, M Bîrjoveanu E-Business and Telecommunications: 15th International Joint Conference …, 2019 | 2 | 2019 |
Secrecy for Bounded Security Protocols: disequality tests and an intruder with existentials lead to undecidability CV Birjoveanu 2009 Fourth Balkan Conference in Informatics, 22-27, 2009 | 2 | 2009 |
Secure Multi-Party E-Commerce Protocols CV Bîrjoveanu, M Bîrjoveanu Springer, 2022 | 1 | 2022 |
Two-Party E-Commerce Protocols CV Bîrjoveanu, M Bîrjoveanu Secure Multi-Party E-Commerce Protocols, 15-42, 2022 | 1 | 2022 |
Secrecy for Bounded Security Protocols without Freshness Check CV Birjoveanu 2009 Third International Conference on Emerging Security Information …, 2009 | 1 | 2009 |
Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries CV Bırjoveanu, M Bırjoveanu | | 2023 |
Multi-party E-Commerce Protocols for Complex Transactions CV Bîrjoveanu, M Bîrjoveanu Secure Multi-Party E-Commerce Protocols, 43-63, 2022 | | 2022 |
E-Commerce Protocols for Multi-chained Complex Transactions CV Bîrjoveanu, M Bîrjoveanu Secure Multi-Party E-Commerce Protocols, 65-80, 2022 | | 2022 |
Secrecy for Bounded Security Protocols under Composed Keys and Disequality Tests CV Birjoveanu 2008 10th International Symposium on Symbolic and Numeric Algorithms for …, 2008 | | 2008 |