Catalin V. Bîrjoveanu

According to our database1, Catalin V. Bîrjoveanu authored at least 14 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Secure Multi-Party E-Commerce Protocols
Springer Briefs in Computer Science, Springer, ISBN: 978-3-030-99350-4, 2022

2020
Chained Transaction Protocol Automated Verification Using Cl-AtSe.
Proceedings of the E-Business and Telecommunications, 2020

Fair Exchange E-Commerce Protocol for Multi-Chained Complex Transactions.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Multi-party E-Commerce Protocol for B2C/B2B Applications.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
An Optimistic Fair Exchange E-commerce Protocol for Complex Transactions.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Preserving Anonymity in Fair Exchange Complex Transactions E-Commerce Protocol for B2C/B2B Applications.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2015
Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery.
Proceedings of the SECRYPT 2015, 2015

2009
Secrecy for Bounded Security Protocols without Freshness Check.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Secrecy for Bounded Security Protocols: Disequality Tests and an Intruder with Existentials Lead to Undecidability.
Proceedings of the 2009 Fourth Balkan Conference in Informatics, 2009

2008
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete.
J. Comput. Secur., 2008

Secrecy for Bounded Security Protocols under Composed Keys and Disequality Tests.
Proceedings of the SYNASC 2008, 2008

2006
Secrecy for Security Protocols.
Sci. Ann. Cuza Univ., 2006

2005
Decidability and Complexity Results for Security Protocols.
Proceedings of the Verification of Infinite-State Systems with Applications to Security, 2005


  Loading...