Practical and provably secure distance-bounding I Boureanu, A Mitrokotsa, S Vaudenay Journal of Computer Security 23 (2), 229-257, 2015 | 91 | 2015 |
Security of distance-bounding: A survey G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ... ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018 | 87 | 2018 |
Towards secure distance bounding I Boureanu, A Mitrokotsa, S Vaudenay Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 68 | 2014 |
Secure and lightweight distance-bounding I Boureanu, A Mitrokotsa, S Vaudenay International workshop on lightweight cryptography for security and privacy …, 2013 | 61 | 2013 |
The bussard-bagga and other distance-bounding protocols under attacks A Bay, I Boureanu, A Mitrokotsa, I Spulber, S Vaudenay Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013 | 41 | 2013 |
Content delivery over TLS: a cryptographic analysis of keyless SSL K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017 | 37 | 2017 |
On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds! I Boureanu, A Mitrokotsa, S Vaudenay International Conference on Cryptology and Information Security in Latin …, 2012 | 37 | 2012 |
Weighted threshold secret sharing based on the Chinese remainder theorem S Iftene, IC Boureanu Scientific Annals of Cuza University 15, 161-172, 2005 | 37 | 2005 |
A formal treatment of accountable proxying over TLS K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete 2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018 | 32 | 2018 |
Automatic verification of temporal-epistemic properties of cryptographic protocols I Boureanu, M Cohen, A Lomuscio Journal of Applied Non-Classical Logics 19 (4), 463-487, 2009 | 32 | 2009 |
Optimal proximity proofs I Boureanu, S Vaudenay International Conference on Information Security and Cryptology, 170-190, 2014 | 31 | 2014 |
Challenges in distance bounding I Boureanu, S Vaudenay IEEE Security & Privacy 13 (1), 41-48, 2015 | 30 | 2015 |
Srdjan capkun, Gerhard Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux G Avoine, MA Bingöl, I Boureanu Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen …, 2018 | 29 | 2018 |
Verifying security properties in unbounded multiagent systems I Boureanu, P Kouvaros, A Lomuscio Proceedings of the 2016 international conference on autonomous agents …, 2016 | 21 | 2016 |
Automatic verification of epistemic specifications under convergent equational theories. I Boureanu, AV Jones, A Lomuscio AAMAS, 1141-1148, 2012 | 17 | 2012 |
Practical EMV relay protection AI Radu, T Chothia, CJP Newton, I Boureanu, L Chen 2022 IEEE Symposium on Security and Privacy (SP), 1737-1756, 2022 | 14 | 2022 |
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete FL Ţiplea, CV Bîrjoveanu, C Enea, I Boureanu Journal of Computer Security 16 (6), 689-712, 2008 | 14 | 2008 |
Security analysis and implementation of relay-resistant contactless payments I Boureanu, T Chothia, A Debant, S Delaune Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 13 | 2020 |
Extensive security verification of the LoRaWAN key-establishment: Insecurities & patches S Wesemeyer, I Boureanu, Z Smith, H Treharne 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 425-444, 2020 | 11 | 2020 |
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment O Blazy, I Boureanu, P Lafourcade, C Onete, L Robert 32nd USENIX Security Symposium (USENIX Security 23), 5917-5934, 2023 | 8 | 2023 |