Sergiu Bursuc

Orcid: 0000-0002-0409-5735

According to our database1, Sergiu Bursuc authored at least 25 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Software-Based Memory Erasure with relaxed isolation requirements: Extended Version.
CoRR, 2024

Software-Based Memory Erasure with Relaxed Isolation Requirements.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Formal Verification and Solutions for Estonian E-Voting.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Election Verifiability in Receipt-Free Voting Protocols.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Provably Unlinkable Smart Card-based Payments.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Contingent payments from two-party signing and verification for abelian groups.
IACR Cryptol. ePrint Arch., 2022

2021
Provably Improving Election Verifiability in Belenios.
IACR Cryptol. ePrint Arch., 2021

2020
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios.
IACR Cryptol. ePrint Arch., 2020

2019
Contingent payments on a public ledger: models and reductions for automated verification.
IACR Cryptol. ePrint Arch., 2019

Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2017
Automated verification of dynamic root of trust protocols (long version).
CoRR, 2017

Automated Verification of Dynamic Root of Trust Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

2015
Secure two-party computation in applied pi-calculus: models and verification.
IACR Cryptol. ePrint Arch., 2015

2014
Deducibility constraints and blind signatures.
Inf. Comput., 2014

2013
Privacy-supporting cloud computing by in-browser key translation.
J. Comput. Secur., 2013

New abstractions in applied pi-calculus and automated verification of protected executions.
IACR Cryptol. ePrint Arch., 2013

Safe enclosures: towards cryptographic techniques for server protection.
IACR Cryptol. ePrint Arch., 2013

Caveat Coercitor: Coercion-Evidence in Electronic Voting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Privacy Supporting Cloud Computing: ConfiChair, a Case Study.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

2011
Trivitas: Voters Directly Verifying Votes.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

2009
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions.
Proceedings of the Rewriting Techniques and Applications, 20th International Conference, 2009

Deducibility Constraints.
Proceedings of the Advances in Computer Science, 2009

2007
Associative-Commutative Deducibility Constraints.
Proceedings of the STACS 2007, 2007

Deducibility Constraints, Equational Theory and Electronic Money.
Proceedings of the Rewriting, 2007


  Loading...