Volgen
Cristina Onete
Cristina Onete
XLIM/CNRS 7252/Université de Limoges
Geverifieerd e-mailadres voor unilim.fr - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1332010
A formal approach to distance-bounding RFID protocols
U Dürholz, M Fischlin, M Kasper, C Onete
International Conference on Information Security, 47-62, 2011
842011
Terrorism in distance bounding: modeling terrorist-fraud resistance
M Fischlin, C Onete
International conference on applied cryptography and network security, 414-431, 2013
582013
Efficient, secure, private distance bounding without key updates
J Hermans, R Peeters, C Onete
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
452013
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
422017
Achieving better privacy for the 3GPP AKA protocol
PA Fouque, C Onete, B Richard
Cryptology ePrint Archive, 2016
422016
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
422014
A Cryptographic Analysis of UMTS/LTE AKA
S Alt, PA Fouque, G Macario-Rat, C Onete, B Richard
International Conference on Applied Cryptography and Network Security, 18-35, 2016
332016
Content delivery over TLS: a cryptographic analysis of keyless SSL
K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017
312017
Mafia fraud attack against the rč distance-bounding protocol
A Mitrokotsa, C Onete, S Vaudenay
2012 IEEE International Conference on RFID-Technologies and Applications …, 2012
302012
(De-) Constructing TLS
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Cryptology ePrint Archive, 2014
292014
The privacy of the TLS 1.3 protocol
G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete
Cryptology ePrint Archive, 2019
272019
Subtle kinks in distance-bounding: an analysis of prominent protocols
M Fischlin, C Onete
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
272013
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
262016
Pattern matching on encrypted streams
N Desmoulins, PA Fouque, C Onete, O Sanders
International Conference on the Theory and Application of Cryptology and …, 2018
252018
(De-) constructing TLS 1.3
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
International Conference on Cryptology in India, 85-102, 2015
242015
A formal treatment of accountable proxying over TLS
K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete
2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018
232018
Location leakage in distance bounding: Why location privacy does not work
A Mitrokotsa, C Onete, S Vaudenay
Computers & Security 45, 199-209, 2014
202014
Anonymity-preserving public-key encryption: A constructive approach
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
International Symposium on Privacy Enhancing Technologies Symposium, 19-39, 2013
182013
A cryptographic analysis of OPACITY
Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete
European Symposium on Research in Computer Security, 345-362, 2013
172013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20