My Google Scholar Profile

My LinkedIn Profile

Committees and Boards

General and Program Co-chair
-- ACNS 2014

Associate Editor
-- the Information Security Journal

PC Member
  • -- 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS2017), 2017
  • -- the 25th International Joint Conference on Artificial Intelligence (IJCAI-16), 2016
  • -- the 14th International Conference on Privacy, Security and Trust (PST), 2016
  • -- the International Workshop on AI for Privacy and Security (PrAISe) 2016
  • -- the 12th International Conference on Information Security and Cryptology (Inscrypt), 2016
  • -- the 11th International Conference on Information Security and Cryptology (Inscrypt), 2015
  • -- the 13th International Conference on Privacy, Security and Trust (PST), 2015
  • -- the ACySe 2015: the 2nd International Workshop on Agents and CyberSecurity, affiliated to AAMAS2015
  • -- the 3rd International Conference - Romanian Cryptology Days (RCD), Bucharest, Romania, 2015
  • -- the 2nd International Conference on Mathematics and Computing, India, 2015
  • -- the 10th International Conference on Information Security and Cryptology (Inscrypt), 2014
  • -- the 1st International Workshop on Agents and CyberSecurity (ACySe), 2014
  • -- the 1st international conference on cryptography and information security in Balkans (BalkanCryptSec), 2014
  • -- the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014
  • -- the 19th Australasian Conference on Information Security and Privacy (ACISP), Australia, 2014
  • -- the 12th International Conference on Privacy, Security and Trust (PST), 2014
  • -- the 7th International Conference on Provable Security (ProvSec), Melaka, Malaysia, 2013
  • -- the 12th International Conference on Cryptology and Network Security (CANS), 2013
  • -- the 11th International Conference on Privacy, Security and Trust (PST), 2013
  • -- the 14th International Conference on Cryptology in India (Indocrypt), 2013
  • -- the 15th International Conference on Information and Communications Security (ICICS), 2013
  • -- the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013
  • -- the 2nd International Conference, Romanian Cryptology Days (RCD), 2013
  • -- the 6th International Conference on Cryptology in Africa (Africacrypt), 2013
  • -- CT-RSA 2013
  • -- Yet Another Conference on Cryptography (YACC), 2012
  • -- the 15th International Conference on Principles and Practice of Multi-Agent Systems (PRIMA), 2012

Grant Reviewing
  • -- CHIST-ERA ERA-NET 2016, remote reviewer.

Here's a list, not always complete, of my publications:

2017

  • Karthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque, Cristina Onete and Benjamin Richard, "Content delivery over TLS: a cryptographic analysis of Keyless SSL", at the 2nd IEEE European Symposium on Security and Privacy (Euro S & P), 2017, to appear

2016

  • I. Boureanu, P. Kouvaros , A. Lomuscio, "Verifying Security Properties in Unbounded Multiagent Systems", 15th International Conference on Autonomous Agents and Multi-Agent systems (AAMAS), May, 2016, Singapore

2015

  • I. Boureanu, M. Ohkubo, S. Vaudenay, "The Limits of Composable Crypto with Transferrable Setup Devices", the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS'15), April 14-17, 2015, Singapore
  • I. Boureanu, A. Mitrokotsa, S. Vaudenay, "Practical & Provably Secure Distance-Bounding", Journal of Computer Security, volume 23, pages 229 --257, 2015
  • I. Boureanu, S. Vaudenay, "Challenges in Distance-Bounding", IEEE Security & Privacy, volume 13, pages 41 -- 48, 2015

2014

  • I. Boureanu, S. Vaudenay, "Optimal Proximity Proofs", the 10th International Conference on Information Security and Cryptology (INSCRYPT 2014), December 13 - 15, pp. 170-190, 2014, Beijing, China
  • I. Boureanu, S. Vaudenay, "Compact and Efficient UC Commitments under Atomic-Exchanges", the 17th Annual International Conference on Information Security and Cryptology (ICISC 2014), December 3 - 5, 2014, Seoul, South Korea
  • I. Boureanu, P. Owesarski, S.Vaudenay, "Applied Cryptography and Network Security - 12th International Conference", Proceedings. Lecture Notes in Computer Science 8479, Springer 2014

2013

  • I. Boureanu, A. Mitrokotsa, S. Vaudenay, "Practical & Provably Secure Distance-Boundings", at the 16th Information Security Conference (ISC), November 13 -- November 15, 2013, Dallas, US
  • I. Boureanu, S. Vaudenay, "Input-Aware Equivocable Commitments and UC-secure Commitments With Atomic Exchanges", at the 7th International Conference on Provable Security (ProvSec), October 23 - 25, 2013, Melaka, Malaysia
  • S. Bogos, I. Boureanu, S. Vaudenay, "Primeless Factoring-Based Cryptography : Solving the Complexity Bottleneck of Public-Key Generation", at the 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), June 25 - 28, 2013, Banff, Canada
  • I. Boureanu, S. Vaudenay, "UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence", Scientific Annals of Cuza University, vol. 23 (2), pp. 23, 2013
  • I. Boureanu, A Mitrokotsa, S Vaudenay, "Towards Secure Distance Bounding", the 20th anniversary annual Fast Software Encryption (FSE), March 10 - 13, 2013, Singapore
  • I. Boureanu, A. Mitrokotsa, S. Vaudenay, "Secure & Lightweight Distance-Bounding", the 2nd International Workshop on Lightweight Cryptography for Security & Privacy (LightSec), May 6 - 7, 2013 Gebze, Turkey
  • I. Boureanu, A. Mitrokotsa, S. Vaudenay, "Practical and Provably Secure Distance-Bounding", IACR Cryptology ePrint Archive: 465, 2013

2012

  • I. Boureanu, A. Mitrokotsa, S. Vaudenay, "On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols", at the Second International Conference on Cryptology and Information Security in Latin America (LATINCRYPT), October 7 - 10, 2012, Santiago, Chile
  • S. Bogos, I. Boureanu, S. Vaudenay, "Primeless Modular Cryptography", at Yet Another Conference on Cryptography (YACC), September 24 - 28, 2012, Porquerolles Island, France
  • I. Boureanu, S. Vaudenay, "Several weak bit-commitments using seal-once tamper-evident devices", at the 6th International Conference on Provable Security (ProvSec), September 26 - 28, 2012, Chengdu, China
  • A. Bay, I. Boureanu, K. Mitrokotsa, I. Spulber, S. Vaudenay, "The Bussard-Bagga and Other Distance Bounding Protocols under Attack", at the 8th International Conference on Information Security and Cryptology (Inscrypt), November 28 - December 1, 2012, Beijing, China
  • I. Boureanu, A. Jones, A. Lomuscio, "Automatic Verification of Temporal-Epistemic Logic under Convergent Equational Theories", in Proceedings of the 11th International Conference on Autonomous Agents and Multi- Agent systems (AAMAS), June 4 - 8, 2012, Valencia, Spain
  • I. Boureanu, S. Vaudenay, "Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices", IACR Cryptology ePrint Archive: 380, 2012

2010

  • I. Boureanu, A. Lomuscio, M. Cohen, "Model Checking Detectability of Attacks in Multiagent Systems", Proceedings of the 9th International Conference on Autonomous Agents and Multi-Agent systems (AAMAS), May 10 - 14, 2010, Toronto, Canada

2009

  • I. Boureanu, M. Cohen, A. Lomuscio, "Automatic Verification of Temporal-Epistemic Properties of Cryptographic Protocols", Journal of Applied Non-Classical Logics, vol 19/4, pp. 463 - 487, 2009
  • I. Boureanu, M. Cohen, A. Lomuscio, "A Compilation Method for the Verification of Temporal-Epistemic Properties of Cryptographic Protocols", in the Informal Proceedings of the International Workshop on Automated Reasoning for Security Protocols Analysis and Issues in the Theory of Security (ARSPA-WITS), March 28 - 29, 2009, York, UK

2008

  • F. Tiplea, C. Barjoveanu, C. Enea, I. Boureanu, "Secrecy for Bounded Protocols With Freshness Check is NEXPTIME-complete", Journal of Computer Security, vol.16/6, pp. 689-712, 2008

2005

  • S. Iftene, I. Boureanu, "Weighted Threshold Secret Sharing Based on the Chinese Remainder Theorem", Scientific Annals of Cuza University, vol. 15, pp. 161-172, 2005