Ricardo Corin

According to our database1, Ricardo Corin authored at least 31 papers between 2002 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Verified Cryptographic Implementations for TLS.
ACM Trans. Inf. Syst. Secur., 2012

Taint Analysis of Security Code in the KLEE Symbolic Execution Engine.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

2009
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Secure Enforcement for Global Process Specifications.
Proceedings of the CONCUR 2009 - Concurrency Theory, 20th International Conference, 2009

2008
A secure compiler for session abstractions.
J. Comput. Secur., 2008

Cryptographically verified implementations for TLS.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Secure sessions for Web services.
ACM Trans. Inf. Syst. Secur., 2007

Timed analysis of security protocols.
J. Comput. Secur., 2007

Audit-based compliance control.
Int. J. Inf. Sec., 2007

A Protocol Compiler for Secure Sessions in ML.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Secure Implementations for Typed Session Abstractions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
LicenseScript: a logical language for digital rights management.
Ann. des Télécommunications, 2006

A Logic for Constraint-based Security Protocol Analysis.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Securing Data Accountability in Decentralized Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Computational Secrecy by Typing for the Pi Calculus.
Proceedings of the Programming Languages and Systems, 4th Asian Symposium, 2006

2005
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version).
IACR Cryptol. ePrint Arch., 2005

An Audit Logic for Accountability.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

PS-LTL for Constraint-Based Security Protocol Analysis.
Proceedings of the Logic Programming, 21st International Conference, 2005

On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

A Formal Security Analysis of an OSA/Parlay Authentication Interface.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005

2004
Analysing Password Protocol Security Against Off-line Dictionary Attacks.
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004

License Protection with a Tamper-Resistant Token.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Logic for Auditing Accountability in Decentralized Systems.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Timed model checking of security protocols.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

2003
A Trace Logic for Local Security Properties.
Proceedings of the International Workshop on Software Verification and Validation, 2003

LicenseScript: a novel digital rights language and its semantics.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

Sound Computational Interpretation of Formal Encryption with Composed Keys.
Proceedings of the Information Security and Cryptology, 2003

2002
An Improved Constraint-Based System for the Verification of Security Protocols.
Proceedings of the Static Analysis, 9th International Symposium, 2002


  Loading...