Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... International Conference on Applied Cryptography and Network Security, 87-104, 2010 | 133 | 2010 |
A formal approach to distance-bounding RFID protocols U Dürholz, M Fischlin, M Kasper, C Onete International Conference on Information Security, 47-62, 2011 | 83 | 2011 |
Terrorism in distance bounding: modeling terrorist-fraud resistance M Fischlin, C Onete International conference on applied cryptography and network security, 414-431, 2013 | 58 | 2013 |
Efficient, secure, private distance bounding without key updates J Hermans, R Peeters, C Onete Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 45 | 2013 |
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 42 | 2017 |
Achieving better privacy for the 3GPP AKA protocol PA Fouque, C Onete, B Richard Cryptology ePrint Archive, 2016 | 42 | 2016 |
Prover anonymous and deniable distance-bounding authentication S Gambs, C Onete, JM Robert Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 42 | 2014 |
A Cryptographic Analysis of UMTS/LTE AKA S Alt, PA Fouque, G Macario-Rat, C Onete, B Richard International Conference on Applied Cryptography and Network Security, 18-35, 2016 | 33 | 2016 |
Content delivery over TLS: a cryptographic analysis of keyless SSL K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017 | 31 | 2017 |
Mafia fraud attack against the rč distance-bounding protocol A Mitrokotsa, C Onete, S Vaudenay 2012 IEEE International Conference on RFID-Technologies and Applications …, 2012 | 30 | 2012 |
(De-) Constructing TLS M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi Cryptology ePrint Archive, 2014 | 28 | 2014 |
The privacy of the TLS 1.3 protocol G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete Cryptology ePrint Archive, 2019 | 27 | 2019 |
Subtle kinks in distance-bounding: an analysis of prominent protocols M Fischlin, C Onete Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 27 | 2013 |
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 26 | 2016 |
Pattern matching on encrypted streams N Desmoulins, PA Fouque, C Onete, O Sanders International Conference on the Theory and Application of Cryptology and …, 2018 | 25 | 2018 |
(De-) constructing TLS 1.3 M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi International Conference on Cryptology in India, 85-102, 2015 | 24 | 2015 |
A formal treatment of accountable proxying over TLS K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete 2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018 | 23 | 2018 |
Location leakage in distance bounding: Why location privacy does not work A Mitrokotsa, C Onete, S Vaudenay Computers & Security 45, 199-209, 2014 | 20 | 2014 |
Anonymity-preserving public-key encryption: A constructive approach M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi International Symposium on Privacy Enhancing Technologies Symposium, 19-39, 2013 | 18 | 2013 |
A cryptographic analysis of OPACITY Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete European Symposium on Research in Computer Security, 345-362, 2013 | 17 | 2013 |