[go: up one dir, main page]

Follow
Cristina Onete
Cristina Onete
XLIM/CNRS 7252/Université de Limoges
Verified email at unilim.fr - Homepage
Title
Cited by
Cited by
Year
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1562010
A formal approach to distance-bounding RFID protocols
U Dürholz, M Fischlin, M Kasper, C Onete
International Conference on Information Security, 47-62, 2011
892011
The privacy of the TLS 1.3 protocol
G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete
Cryptology ePrint Archive, 2019
712019
Achieving better privacy for the 3GPP AKA protocol
PA Fouque, C Onete, B Richard
Cryptology ePrint Archive, 2016
682016
Terrorism in distance bounding: modeling terrorist-fraud resistance
M Fischlin, C Onete
International conference on applied cryptography and network security, 414-431, 2013
622013
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
542017
A cryptographic analysis of umts/lte aka
S Alt, PA Fouque, G Macario-Rat, C Onete, B Richard
International Conference on Applied Cryptography and Network Security, 18-35, 2016
482016
Efficient, secure, private distance bounding without key updates
J Hermans, R Peeters, C Onete
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
482013
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
462014
Pattern matching on encrypted streams
N Desmoulins, PA Fouque, C Onete, O Sanders
International Conference on the Theory and Application of Cryptology and …, 2018
432018
Content delivery over TLS: a cryptographic analysis of keyless SSL
K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017
432017
A formal treatment of accountable proxying over TLS
K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete
2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018
422018
Mafia fraud attack against the rč distance-bounding protocol
A Mitrokotsa, C Onete, S Vaudenay
2012 IEEE International Conference on RFID-Technologies and Applications …, 2012
362012
(De-) constructing TLS 1.3
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
International Conference on Cryptology in India, 85-102, 2015
302015
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
282016
(De-) Constructing TLS
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Cryptology ePrint Archive, 2014
282014
Designing reverse firewalls for the real world
A Bossuat, X Bultel, PA Fouque, C Onete, T van Der Merwe
European Symposium on Research in Computer Security, 193-213, 2020
262020
A cryptographic analysis of OPACITY
Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete
European Symposium on Research in Computer Security, 345-362, 2013
262013
Anonymity-preserving public-key encryption: A constructive approach
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
International Symposium on Privacy Enhancing Technologies Symposium, 19-39, 2013
262013
Subtle kinks in distance-bounding: an analysis of prominent protocols
M Fischlin, C Onete
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
252013
The system can't perform the operation now. Try again later.
Articles 1–20