Caveat coercitor: Coercion-evidence in electronic voting GS Grewal, MD Ryan, S Bursuc, PYA Ryan 2013 IEEE Symposium on Security and Privacy, 367-381, 2013 | 85 | 2013 |
Privacy supporting cloud computing: Confichair, a case study M Arapinis, S Bursuc, M Ryan International Conference on Principles of Security and Trust, 89-108, 2012 | 46 | 2012 |
Trivitas: Voters directly verifying votes S Bursuc, GS Grewal, MD Ryan E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012 | 40 | 2012 |
Privacy-supporting cloud computing by in-browser key translation M Arapinis, S Bursuc, M Ryan Journal of Computer Security 21 (6), 847-880, 2013 | 29 | 2013 |
Associative-commutative deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Symposium on Theoretical Aspects of Computer Science, 634-645, 2007 | 19 | 2007 |
Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios S Baloglu, S Bursuc, S Mauw, J Pang 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-15, 2021 | 16 | 2021 |
Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity M Arapinis, S Bursuc, MD Ryan Principles of Security and Trust: First International Conference, POST 2012 …, 2012 | 16 | 2012 |
Protocol security and algebraic properties: Decision results for a bounded number of sessions S Bursuc, H Comon-Lundh Rewriting Techniques and Applications: 20th International Conference, RTA …, 2009 | 14 | 2009 |
Contingent payments on a public ledger: models and reductions for automated verification S Bursuc, S Kremer Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 13 | 2019 |
Deducibility constraints, equational theory and electronic money S Bursuc, H Comon-Lundh, S Delaune Rewriting, Computation and Proof: Essays Dedicated to Jean-Pierre Jouannaud …, 2007 | 13 | 2007 |
Provably improving election verifiability in Belenios S Baloglu, S Bursuc, S Mauw, J Pang International Joint Conference on Electronic Voting, 1-16, 2021 | 12 | 2021 |
Private votes on untrusted platforms: models, attacks and provable scheme S Bursuc, CC Dragan, S Kremer 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 606-620, 2019 | 8 | 2019 |
Securing the End-points of the Signal Protocol using Intel SGX based Containers K Severinsen, C Johansen, S Bursuc Security Principles and Trust Hotspot 2017, 1, 2017 | 8 | 2017 |
Deducibility constraints and blind signatures S Bursuc, H Comon-Lundh, S Delaune Information and Computation 238, 106-127, 2014 | 7 | 2014 |
Deducibility constraints S Bursuc, H Comon-Lundh, S Delaune Annual Asian Computing Science Conference, 24-38, 2009 | 7 | 2009 |
Contingent payments from two-party signing and verification for abelian groups S Bursuc, S Mauw 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 195-210, 2022 | 5 | 2022 |
Automated verification of dynamic root of trust protocols S Bursuc, C Johansen, S Xu Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017 | 5 | 2017 |
Election verifiability in receipt-free voting protocols S Baloglu, S Bursuc, S Mauw, J Pang 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 59-74, 2023 | 3 | 2023 |
Software-Based Memory Erasure with relaxed isolation requirements S Bursuc, R Gil-Pons, S Mauw, R Trujillo-Rasua 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 01-16, 2024 | 2 | 2024 |
Secure two-party computation in applied pi-calculus: models and verification S Bursuc Trustworthy Global Computing: 10th International Symposium, TGC 2015 Madrid …, 2016 | 2 | 2016 |