List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Secure two-party computation in applied pi-calculus: models and verification Trustworthy Global Computing | 2021-04-07 | Paper |
| Automated Verification of Dynamic Root of Trust Protocols Lecture Notes in Computer Science | 2020-08-03 | Paper |
| Deducibility constraints and blind signatures Information and Computation | 2014-10-20 | Paper |
| Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity Lecture Notes in Computer Science | 2012-06-29 | Paper |
| Deducibility constraints Advances in Computer Science - ASIAN 2009. Information Security and Privacy | 2010-01-14 | Paper |
| Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions Rewriting Techniques and Applications | 2009-06-30 | Paper |
| Deducibility Constraints, Equational Theory and Electronic Money Rewriting, Computation and Proof | 2009-03-06 | Paper |
| Associative-Commutative Deducibility Constraints STACS 2007 | 2007-09-03 | Paper |
Research outcomes over time
This page was built for person: Sergiu Bursuc