Volgen
Ricardo Corin
Ricardo Corin
FaMAF
Geverifieerd e-mailadres voor famaf.unc.edu.ar
Titel
Geciteerd door
Geciteerd door
Jaar
Cryptographically verified implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zalinescu
Proceedings of the 15th ACM conference on computer and Communications …, 2008
1452008
Cryptographic protocol synthesis and verification for multiparty sessions
K Bhargavan, R Corin, PM Deniélou, C Fournet, JJ Leifer
2009 22nd IEEE Computer Security Foundations Symposium, 124-140, 2009
1272009
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6 (2), 133-151, 2007
1212007
An improved constraint-based system for the verification of security protocols
R Corin, S Etalle
International Static Analysis Symposium, 326-341, 2002
1182002
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J Hartog, G Lenzini, I Staicu
IFIP World Computer Congress, TC 1, 187-201, 2004
1072004
Secure sessions for web services
K Bhargavan, R Corin, C Fournet, AD Gordon
ACM transactions on information and system security (TISSEC) 10 (2), 8-es, 2007
1002007
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
872005
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
802005
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
IFIP International Conference on Personal Wireless Communications, 27-39, 2003
802003
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
742003
A logic for constraint-based security protocol analysis
R Corin, A Saptawijaya
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006
612006
Timed model checking of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
602004
Secure implementations for typed session abstractions
R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer
20th IEEE Computer Security Foundations Symposium (CSF'07), 170-186, 2007
542007
A probabilistic Hoare-style logic for game-based cryptographic proofs
R Corin, J Hartog
International Colloquium on Automata, Languages, and Programming, 252-263, 2006
542006
Guess what? Here is a new tool that finds some new guessing attacks
R Corin, S Malladi, J Alves-Foss, S Etalle
TWENTE UNIV ENSCHEDE (NETHERLANDS) DEPT OF COMPUTER SCIENCE, 2003
522003
Timed analysis of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Journal of Computer Security 15 (6), 619-645, 2007
452007
Verified cryptographic implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zălinescu
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-32, 2012
432012
A secure compiler for session abstractions
R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer
Journal of Computer Security 16 (5), 573-636, 2008
412008
Sound computational interpretation of formal encryption with composed keys
P Laud, R Corin
International Conference on Information Security and Cryptology, 55-66, 2003
392003
Taint analysis of security code in the KLEE symbolic execution engine
R Corin, FA Manzano
International Conference on Information and Communications Security, 264-275, 2012
292012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20