Follow
Sergiu Bursuc
Title
Cited by
Cited by
Year
Caveat coercitor: Coercion-evidence in electronic voting
GS Grewal, MD Ryan, S Bursuc, PYA Ryan
2013 IEEE Symposium on Security and Privacy, 367-381, 2013
842013
Privacy supporting cloud computing: Confichair, a case study
M Arapinis, S Bursuc, M Ryan
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
462012
Trivitas: Voters directly verifying votes
S Bursuc, GS Grewal, MD Ryan
E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012
392012
Privacy-supporting cloud computing by in-browser key translation
M Arapinis, S Bursuc, M Ryan
Journal of Computer Security 21 (6), 847-880, 2013
282013
Associative-commutative deducibility constraints
S Bursuc, H Comon-Lundh, S Delaune
Annual Symposium on Theoretical Aspects of Computer Science, 634-645, 2007
192007
Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity
M Arapinis, S Bursuc, MD Ryan
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
162012
Protocol security and algebraic properties: Decision results for a bounded number of sessions
S Bursuc, H Comon-Lundh
Rewriting Techniques and Applications: 20th International Conference, RTA …, 2009
142009
Deducibility constraints, equational theory and electronic money
S Bursuc, H Comon-Lundh, S Delaune
Rewriting, Computation and Proof: Essays Dedicated to Jean-Pierre Jouannaud …, 2007
132007
Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios
S Baloglu, S Bursuc, S Mauw, J Pang
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-15, 2021
112021
Contingent payments on a public ledger: models and reductions for automated verification
S Bursuc, S Kremer
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
112019
Provably improving election verifiability in Belenios
S Baloglu, S Bursuc, S Mauw, J Pang
International Joint Conference on Electronic Voting, 1-16, 2021
92021
Private votes on untrusted platforms: models, attacks and provable scheme
S Bursuc, CC Dragan, S Kremer
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 606-620, 2019
72019
Securing the End-points of the Signal Protocol using Intel SGX based Containers
K Severinsen, C Johansen, S Bursuc
Security Principles and Trust Hotspot 2017, 1, 2017
72017
Deducibility constraints
S Bursuc, H Comon-Lundh, S Delaune
Annual Asian Computing Science Conference, 24-38, 2009
72009
Deducibility constraints and blind signatures
S Bursuc, H Comon-Lundh, S Delaune
Information and Computation 238, 106-127, 2014
62014
Automated verification of dynamic root of trust protocols
S Bursuc, C Johansen, S Xu
Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017
52017
Contingent payments from two-party signing and verification for abelian groups
S Bursuc, S Mauw
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 195-210, 2022
32022
Election verifiability in receipt-free voting protocols
S Baloglu, S Bursuc, S Mauw, J Pang
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 59-74, 2023
22023
Secure two-party computation in applied pi-calculus: models and verification
S Bursuc
Trustworthy Global Computing: 10th International Symposium, TGC 2015 Madrid …, 2016
22016
Unification and Matching in Separable Theories–technicalities
S Bursuc, C Prisacariu
Technical Report 398, Dept. Info., Univ. Oslo, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20