Boureanu, Ioana
57  results:
Search for persons X
?
2

Formalising Application-Driven Authentication & Access-Cont..:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
Culnane, Chris ; Boureanu, Ioana ; Snyman, Jean.. - p. 884-898 , 2023
 
?
3

Formally Verifying the Security and Privacy of an Adopted S..:

, In: 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC),
Boureanu, Ioana - p. 1301-1306 , 2023
 
?
4

Program Semantics and Verification Technique for AI-Centred..:

, In: Formal Methods; Lecture Notes in Computer Science,
 
?
5

Systematic Improvement of Access-Stratum Security in Mobile..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
Miller, Rhys ; Boureanu, Ioana ; Wesemeyer, Stephan.. - p. 542-557 , 2023
 
?
6

The 5G Key-Establishment Stack : In-Depth Formal Verific..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
 
?
7

Practical EMV Relay Protection:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
 
?
8

From Relay Attacks to Distance-Bounding Protocols:

, In: Security of Ubiquitous Computing Systems,
Avoine, Gildas ; Boureanu, Ioana ; Gérault, David... - p. 113-130 , 2021
 
?
9

Mechanised Models and Proofs for Distance-Bounding:

, In: 2021 IEEE 34th Computer Security Foundations Symposium (CSF),
 
?
11

Extensive Security Verification of the LoRaWAN Key-Establis..:

, In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
12

Provable-Security Model for Strong Proximity-based Attacks:..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Boureanu, Ioana ; Chen, Liqun ; Ivey, Sam - p. 87-100 , 2020
 
?
13

LURK: Server-Controlled TLS Delegation:

, In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Boureanu, Ioana ; Migault, Daniel ; Preda, Stere... - p. 182-193 , 2020
 
?
14

Security Analysis and Implementation of Relay-Resistant Con..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
 
?
15

Verifying Strategic Abilities in Multi-agent Systems with P..:

, In: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems,
 
1-15