|
Search the dblp DataBase
Ricardo Corin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Martín Abadi, Ricardo Corin, Cédric Fournet
Computational Secrecy by Typing for the Pi Calculus. [Citation Graph (0, 0)][DBLP] APLAS, 2006, pp:253-269 [Conf]
- Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
Timed model checking of security protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:23-32 [Conf]
- Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso
A Formal Security Analysis of an OSA/Parlay Authentication Interface. [Citation Graph (0, 0)][DBLP] FMOODS, 2005, pp:131-146 [Conf]
- Ricardo Corin, Jerry den Hartog
A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:252-263 [Conf]
- J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:27-39 [Conf]
- Peeter Laud, Ricardo Corin
Sound Computational Interpretation of Formal Encryption with Composed Keys. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:55-66 [Conf]
- Ricardo Corin, Ari Saptawijaya, Sandro Etalle
PS-LTL for Constraint-Based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] ICLP, 2005, pp:439-440 [Conf]
- Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu
A Logic for Auditing Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:187-201 [Conf]
- Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] PWC, 2003, pp:27-39 [Conf]
- Ricardo Corin, David Galindo, Jaap-Henk Hoepman
Securing Data Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:626-635 [Conf]
- J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
An Audit Logic for Accountability. [Citation Graph (0, 0)][DBLP] POLICY, 2005, pp:34-43 [Conf]
- Ricardo Corin, Sandro Etalle
An Improved Constraint-Based System for the Verification of Security Protocols. [Citation Graph (0, 0)][DBLP] SAS, 2002, pp:326-341 [Conf]
- Ricardo Corin, Sandro Etalle, Ari Saptawijaya
A Logic for Constraint-based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:155-168 [Conf]
- Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
License Protection with a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP] WISA, 2004, pp:223-237 [Conf]
- Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff
LicenseScript: a logical language for digital rights management. [Citation Graph (0, 0)][DBLP] Annales des Télécommunications, 2006, v:61, n:3-4, pp:284-331 [Journal]
- Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel
A Trace Logic for Local Security Properties [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Ricardo Corin, Jeroen Doumen, Sandro Etalle
Analysing Password Protocol Security Against Off-line Dictionary Attacks. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:47-63 [Journal]
- Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante
A Trace Logic for Local Security Properties. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:129-143 [Journal]
- J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
An Audit Logic for Accountability [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
- Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
Timed Analysis of Security Protocols [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
- J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini
Audit-based compliance control. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:133-151 [Journal]
- Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon
Secure sessions for Web services. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]
Cryptographically verified implementations for TLS. [Citation Graph (, )][DBLP]
Secure Enforcement for Global Process Specifications. [Citation Graph (, )][DBLP]
Secure Implementations for Typed Session Abstractions. [Citation Graph (, )][DBLP]
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. [Citation Graph (, )][DBLP]
A Protocol Compiler for Secure Sessions in ML. [Citation Graph (, )][DBLP]
Secure sessions for web services. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.303secs
|