Sergiu Bursuc
Sergiu Bursuc
postdoctoral researcher, University of Luxembourg
Dirección de correo verificada de - Página principal
Citado por
Citado por
Caveat coercitor: Coercion-evidence in electronic voting
GS Grewal, MD Ryan, S Bursuc, PYA Ryan
2013 IEEE Symposium on Security and Privacy, 367-381, 2013
Privacy supporting cloud computing: Confichair, a case study
M Arapinis, S Bursuc, M Ryan
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
Trivitas: Voters directly verifying votes
S Bursuc, GS Grewal, MD Ryan
E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012
Privacy-supporting cloud computing by in-browser key translation
M Arapinis, S Bursuc, M Ryan
Journal of Computer Security 21 (6), 847-880, 2013
Associative-commutative deducibility constraints
S Bursuc, H Comon-Lundh, S Delaune
Annual Symposium on Theoretical Aspects of Computer Science, 634-645, 2007
Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity
M Arapinis, S Bursuc, MD Ryan
Principles of Security and Trust: First International Conference, POST 2012 …, 2012
Protocol security and algebraic properties: Decision results for a bounded number of sessions
S Bursuc, H Comon-Lundh
Rewriting Techniques and Applications: 20th International Conference, RTA …, 2009
Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios
S Baloglu, S Bursuc, S Mauw, J Pang
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-15, 2021
Contingent payments on a public ledger: models and reductions for automated verification
S Bursuc, S Kremer
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
Deducibility constraints, equational theory and electronic money
S Bursuc, H Comon-Lundh, S Delaune
Rewriting, Computation and Proof: Essays Dedicated to Jean-Pierre Jouannaud …, 2007
Provably improving election verifiability in Belenios
S Baloglu, S Bursuc, S Mauw, J Pang
International Joint Conference on Electronic Voting, 1-16, 2021
Private votes on untrusted platforms: models, attacks and provable scheme
S Bursuc, CC Dragan, S Kremer
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 606-620, 2019
Securing the End-points of the Signal Protocol using Intel SGX based Containers
K Severinsen, C Johansen, S Bursuc
Security Principles and Trust Hotspot 2017, 1, 2017
Deducibility constraints
S Bursuc, H Comon-Lundh, S Delaune
Annual Asian Computing Science Conference, 24-38, 2009
Deducibility constraints and blind signatures
S Bursuc, H Comon-Lundh, S Delaune
Information and Computation 238, 106-127, 2014
Contingent payments from two-party signing and verification for abelian groups
S Bursuc, S Mauw
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 195-210, 2022
Automated verification of dynamic root of trust protocols
S Bursuc, C Johansen, S Xu
Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017
Election verifiability in receipt-free voting protocols
S Baloglu, S Bursuc, S Mauw, J Pang
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 59-74, 2023
Secure two-party computation in applied pi-calculus: models and verification
S Bursuc
Trustworthy Global Computing: 10th International Symposium, TGC 2015 Madrid …, 2016
Unification and Matching in Separable Theories–technicalities
S Bursuc, C Prisacariu
Technical Report 398, Dept. Info., Univ. Oslo, 2010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20