The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ricardo Corin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Martín Abadi, Ricardo Corin, Cédric Fournet
    Computational Secrecy by Typing for the Pi Calculus. [Citation Graph (0, 0)][DBLP]
    APLAS, 2006, pp:253-269 [Conf]
  2. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
    Timed model checking of security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:23-32 [Conf]
  3. Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso
    A Formal Security Analysis of an OSA/Parlay Authentication Interface. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2005, pp:131-146 [Conf]
  4. Ricardo Corin, Jerry den Hartog
    A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:252-263 [Conf]
  5. J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti
    On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:27-39 [Conf]
  6. Peeter Laud, Ricardo Corin
    Sound Computational Interpretation of Formal Encryption with Composed Keys. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:55-66 [Conf]
  7. Ricardo Corin, Ari Saptawijaya, Sandro Etalle
    PS-LTL for Constraint-Based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ICLP, 2005, pp:439-440 [Conf]
  8. Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu
    A Logic for Auditing Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:187-201 [Conf]
  9. Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel
    A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:27-39 [Conf]
  10. Ricardo Corin, David Galindo, Jaap-Henk Hoepman
    Securing Data Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:626-635 [Conf]
  11. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
    An Audit Logic for Accountability. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:34-43 [Conf]
  12. Ricardo Corin, Sandro Etalle
    An Improved Constraint-Based System for the Verification of Security Protocols. [Citation Graph (0, 0)][DBLP]
    SAS, 2002, pp:326-341 [Conf]
  13. Ricardo Corin, Sandro Etalle, Ari Saptawijaya
    A Logic for Constraint-based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:155-168 [Conf]
  14. Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
    License Protection with a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:223-237 [Conf]
  15. Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff
    LicenseScript: a logical language for digital rights management. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:284-331 [Journal]
  16. Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel
    A Trace Logic for Local Security Properties [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  17. Ricardo Corin, Jeroen Doumen, Sandro Etalle
    Analysing Password Protocol Security Against Off-line Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:47-63 [Journal]
  18. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante
    A Trace Logic for Local Security Properties. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:129-143 [Journal]
  19. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
    An Audit Logic for Accountability [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  20. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
    Timed Analysis of Security Protocols [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  21. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini
    Audit-based compliance control. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:133-151 [Journal]
  22. Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon
    Secure sessions for Web services. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]

  23. Cryptographically verified implementations for TLS. [Citation Graph (, )][DBLP]


  24. Secure Enforcement for Global Process Specifications. [Citation Graph (, )][DBLP]


  25. Secure Implementations for Typed Session Abstractions. [Citation Graph (, )][DBLP]


  26. Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. [Citation Graph (, )][DBLP]


  27. A Protocol Compiler for Secure Sessions in ML. [Citation Graph (, )][DBLP]


  28. Secure sessions for web services. [Citation Graph (, )][DBLP]


Search in 0.126secs, Finished in 0.127secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002