default search action
Ioana Boureanu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Behnam Shobiri, Sajjad Pourali, Daniel Migault, Ioana Boureanu, Stere Preda, Mohammad Mannan, Amr M. Youssef:
LURK-T: Limited Use of Remote Keys With Added Trust in TLS 1.3. IEEE Trans. Netw. Sci. Eng. 11(6): 6313-6327 (2024) - [c37]Fortunat Rajaona, Ioana Boureanu, R. Ramanujam, Stephan Wesemeyer:
Epistemic Model Checking for Privacy. CSF 2024: 1-16 - 2023
- [c36]Francesco Belardinelli, Ioana Boureanu, Vadim Malvone, Fortunat Rajaona:
Automatically Verifying Expressive Epistemic Properties of Programs. AAAI 2023: 6245-6252 - [c35]Chris Culnane, Ioana Boureanu, Jean Snyman, Stephan Wesemeyer, Helen Treharne:
Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices. AsiaCCS 2023: 884-898 - [c34]Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Zhili Sun, Hemant Zope:
Systematic Improvement of Access-Stratum Security in Mobile Networks. EuroS&P 2023: 542-557 - [c33]Solofomampionona Fortunat Rajaona, Ioana Boureanu, Vadim Malvone, Francesco Belardinelli:
Program Semantics and Verification Technique for AI-Centred Programs. FM 2023: 473-491 - [c32]Ksenia Budykho, Ioana Boureanu, Stephan Wesemeyer, Daniel Romero, Matt Lewis, Yogaratnam Rahulan, Fortunat Rajaona, Steve Schneider:
Fine-Grained Trackability in Protocol Executions. NDSS 2023 - [c31]Ioana Boureanu:
Formally Verifying the Security and Privacy of an Adopted Standard for Software-Update in Cars: Verifying Uptane 2.0. SMC 2023: 1301-1306 - [c30]Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert:
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. USENIX Security Symposium 2023: 5917-5934 - [e3]Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023. ACM 2023, ISBN 978-1-4503-9859-6 [contents] - 2022
- [c29]Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Christopher J. P. Newton:
The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation. AsiaCCS 2022: 237-251 - [c28]Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton, Ioana Boureanu, Liqun Chen:
Practical EMV Relay Protection. SP 2022: 1737-1756 - [i12]Francesco Belardinelli, Ioana Boureanu, Catalin Dima, Vadim Malvone:
Model Checking Strategic Abilities in Information-sharing Systems. CoRR abs/2204.08896 (2022) - [i11]Francesco Belardinelli, Ioana Boureanu, Vadim Malvone, Solofomampionona Fortunat Rajaona:
Program Semantics and a Verification Technique for Knowledge-Based Multi-Agent Systems. CoRR abs/2206.13841 (2022) - [i10]Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert:
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. IACR Cryptol. ePrint Arch. 2022: 1090 (2022) - 2021
- [c27]Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gérault, Pascal Lafourcade:
Mechanised Models and Proofs for Distance-Bounding. CSF 2021: 1-16 - [p1]Gildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete:
From Relay Attacks to Distance-Bounding Protocols. Security of Ubiquitous Computing Systems 2021: 113-130 - 2020
- [c26]Ioana Boureanu, Liqun Chen, Sam Ivey:
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments. AsiaCCS 2020: 87-100 - [c25]Ioana Boureanu, Tom Chothia, Alexandre Debant, Stéphanie Delaune:
Security Analysis and Implementation of Relay-Resistant Contactless Payments. CCS 2020: 879-898 - [c24]Stephan Wesemeyer, Ioana Boureanu, Zach Smith, Helen Treharne:
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches. EuroS&P 2020: 425-444 - [c23]Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. TrustCom 2020: 182-193 - [e2]Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, M. Angela Sasse:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [i9]Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gérault, Pascal Lafourcade:
Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments. IACR Cryptol. ePrint Arch. 2020: 1000 (2020) - [i8]Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. IACR Cryptol. ePrint Arch. 2020: 1366 (2020)
2010 – 2019
- 2019
- [j7]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [c22]Francesco Belardinelli, Ioana Boureanu, Catalin Dima, Vadim Malvone:
Verifying Strategic Abilities in Multi-agent Systems with Private Data-Sharing. AAMAS 2019: 1820-1822 - [c21]Tom Chothia, Ioana Boureanu, Liqun Chen:
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. Financial Cryptography 2019: 222-233 - [c20]Ioana Boureanu, David Gérault, James Lewis:
Here and There at Once, with my Mobile Phone! ICETE (2) 2019: 478-484 - [c19]David Gérault, Ioana Boureanu:
Distance bounding under different assumptions: opinion. WiSec 2019: 245-248 - [i7]Francesco Belardinelli, Catalin Dima, Ioana Boureanu, Vadim Malvone:
Model Checking ATL* on vCGS. CoRR abs/1903.04350 (2019) - 2018
- [c18]Karthikeyan Bhargavan, Ioana Boureanu, Antoine Delignat-Lavaud, Pierre-Alain Fouque, Cristina Onete:
A Formal Treatment of Accountable Proxying Over TLS. IEEE Symposium on Security and Privacy 2018: 799-816 - [i6]Ioana Boureanu, Anda Anda:
Another Look at Relay and Distance-based Attacks in Contactless Payments. IACR Cryptol. ePrint Arch. 2018: 402 (2018) - 2017
- [c17]Karthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Content delivery over TLS: a cryptographic analysis of keyless SSL. EuroS&P 2017: 1-6 - [c16]Nikos Gorogiannis, Franco Raimondi, Ioana Boureanu:
A Novel Symbolic Approach to Verifying Epistemic Properties of Programs. IJCAI 2017: 206-212 - [c15]Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and fixing the HB+DB protocol. WISEC 2017: 241-246 - [i5]Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and Fixing the HB+DB protocol. IACR Cryptol. ePrint Arch. 2017: 416 (2017) - 2016
- [c14]Ioana Boureanu, Panagiotis Kouvaros, Alessio Lomuscio:
Verifying Security Properties in Unbounded Multiagent Systems. AAMAS 2016: 1209-1217 - 2015
- [j6]Ioana Boureanu, Serge Vaudenay:
Challenges in Distance Bounding. IEEE Secur. Priv. 13(1): 41-48 (2015) - [j5]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical and provably secure distance-bounding. J. Comput. Secur. 23(2): 229-257 (2015) - [c13]Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay:
The Limits of Composable Crypto with Transferable Setup Devices. AsiaCCS 2015: 381-392 - [i4]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. IACR Cryptol. ePrint Arch. 2015: 208 (2015) - 2014
- [c12]Ioana Boureanu, Serge Vaudenay:
Optimal Proximity Proofs. Inscrypt 2014: 170-190 - [c11]Ioana Boureanu, Serge Vaudenay:
Compact and Efficient UC Commitments Under Atomic-Exchanges. ICISC 2014: 381-401 - [e1]Ioana Boureanu, Philippe Owesarski, Serge Vaudenay:
Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings. Lecture Notes in Computer Science 8479, Springer 2014, ISBN 978-3-319-07535-8 [contents] - [i3]Ioana Boureanu, Serge Vaudenay:
Optimal Proximity Proofs. IACR Cryptol. ePrint Arch. 2014: 693 (2014) - 2013
- [j4]Ioana Boureanu, Serge Vaudenay:
UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence. Sci. Ann. Comput. Sci. 23(2): 191-228 (2013) - [c10]Sonia Bogos, Ioana Boureanu, Serge Vaudenay:
Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-. ACNS 2013: 552-569 - [c9]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. FSE 2013: 55-67 - [c8]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical and Provably Secure Distance-Bounding. ISC 2013: 248-258 - [c7]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Secure and Lightweight Distance-Bounding. LightSec 2013: 97-113 - [c6]Ioana Boureanu, Serge Vaudenay:
Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges. ProvSec 2013: 121-138 - [i2]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical & Provably Secure Distance-Bounding. IACR Cryptol. ePrint Arch. 2013: 465 (2013) - 2012
- [c5]Ioana Boureanu, Andrew V. Jones, Alessio Lomuscio:
Automatic verification of epistemic specifications under convergent equational theories. AAMAS 2012: 1141-1148 - [c4]Aslí Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay:
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. Inscrypt 2012: 371-391 - [c3]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds! LATINCRYPT 2012: 100-120 - [c2]Ioana Boureanu, Serge Vaudenay:
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. ProvSec 2012: 70-87 - [i1]Ioana Boureanu, Serge Vaudenay:
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. IACR Cryptol. ePrint Arch. 2012: 380 (2012) - 2010
- [c1]Ioana Boureanu, Mika Cohen, Alessio Lomuscio:
Model checking detectability of attacks in multiagent systems. AAMAS 2010: 691-698
2000 – 2009
- 2009
- [j3]Ioana Boureanu, Mika Cohen, Alessio Lomuscio:
Automatic verification of temporal-epistemic properties of cryptographic protocols. J. Appl. Non Class. Logics 19(4): 463-487 (2009) - 2008
- [j2]Ferucio Laurentiu Tiplea, Catalin V. Bîrjoveanu, Constantin Enea, Ioana Boureanu:
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete. J. Comput. Secur. 16(6): 689-712 (2008) - 2005
- [j1]Sorin Iftene, Ioana Boureanu:
Weighted Threshold Secret Sharing Based on the Chinese Remainder Theorem. Sci. Ann. Cuza Univ. 15: 161-172 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint