dblp.uni-trier.dewww.uni-trier.de

Ricardo Corin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
28EEKarthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu: Cryptographically verified implementations for TLS. ACM Conference on Computer and Communications Security 2008: 459-468
27EERicardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer: A secure compiler for session abstractions. Journal of Computer Security 16(5): 573-636 (2008)
2007
26EERicardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer: Secure Implementations for Typed Session Abstractions. CSF 2007: 170-186
25EERicardo Corin, Pierre-Malo Deniélou: A Protocol Compiler for Secure Sessions in ML. TGC 2007: 276-293
24EEKarthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon: Secure sessions for Web services. ACM Trans. Inf. Syst. Secur. 10(2): (2007)
23EEJ. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini: Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007)
22EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader: Timed analysis of security protocols. Journal of Computer Security 15(6): 619-645 (2007)
2006
21EEMartín Abadi, Ricardo Corin, Cédric Fournet: Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269
20EERicardo Corin, Jerry den Hartog: A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. ICALP (2) 2006: 252-263
19EERicardo Corin, Sandro Etalle, Ari Saptawijaya: A Logic for Constraint-based Security Protocol Analysis. IEEE Symposium on Security and Privacy 2006: 155-168
18EERicardo Corin, David Galindo, Jaap-Henk Hoepman: Securing Data Accountability in Decentralized Systems. OTM Workshops (1) 2006: 626-635
17 Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff: LicenseScript: a logical language for digital rights management. Annales des Télécommunications 61(3-4): 284-331 (2006)
2005
16EERicardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso: A Formal Security Analysis of an OSA/Parlay Authentication Interface. FMOODS 2005: 131-146
15EEJ. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti: On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. ICICS 2005: 27-39
14EERicardo Corin, Ari Saptawijaya, Sandro Etalle: PS-LTL for Constraint-Based Security Protocol Analysis. ICLP 2005: 439-440
13EEJ. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog: An Audit Logic for Accountability. POLICY 2005: 34-43
12EEJ. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog: An Audit Logic for Accountability CoRR abs/cs/0502091: (2005)
11EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader: Timed Analysis of Security Protocols CoRR abs/cs/0503036: (2005)
10EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante: A Trace Logic for Local Security Properties. Electr. Notes Theor. Comput. Sci. 118: 129-143 (2005)
9EERicardo Corin, Jeroen Doumen, Sandro Etalle: Analysing Password Protocol Security Against Off-line Dictionary Attacks. Electr. Notes Theor. Comput. Sci. 121: 47-63 (2005)
2004
8EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader: Timed model checking of security protocols. FMSE 2004: 23-32
7EERicardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu: A Logic for Auditing Accountability in Decentralized Systems. Formal Aspects in Security and Trust 2004: 187-201
6EEKarthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon: Secure sessions for web services. SWS 2004: 56-66
5EECheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin: License Protection with a Tamper-Resistant Token. WISA 2004: 223-237
4EERicardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel: A Trace Logic for Local Security Properties CoRR cs.CR/0411010: (2004)
2003
3EEPeeter Laud, Ricardo Corin: Sound Computational Interpretation of Formal Encryption with Composed Keys. ICISC 2003: 55-66
2EEYee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel: A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. PWC 2003: 27-39
2002
1EERicardo Corin, Sandro Etalle: An Improved Constraint-Based System for the Verification of Security Protocols. SAS 2002: 326-341

Coauthor Index

1Martín Abadi [21]
2Karthikeyan Bhargavan [6] [24] [26] [27] [28]
3Gaetano Di Caprio [16]
4J. G. Cederquist (Jan Cederquist) [12] [13] [15] [23]
5Cheun Ngen Chong [5] [17]
6Muhammad Torabi Dashti [15]
7M. A. C. Dekker [12] [13] [23]
8Pierre-Malo Deniélou [25] [26] [27]
9Jeroen Doumen [5] [9] [17]
10Antonio Durante [4] [10]
11Sandro Etalle [1] [2] [4] [5] [7] [8] [9] [10] [11] [12] [13] [14] [16] [17] [19] [22] [23]
12Cédric Fournet [6] [21] [24] [26] [27] [28]
13David Galindo [18]
14Stefania Gnesi [16]
15Andrew D. Gordon (Andy Gordon) [6] [24]
16Pieter H. Hartel [2] [4] [5] [8] [10] [11] [17] [22]
17Jerry den Hartog (J. I. den Hartog) [7] [12] [13] [20] [23]
18Jaap-Henk Hoepman [18]
19Peeter Laud [3]
20Yee Wei Law [2] [17]
21James J. Leifer [26] [27]
22Gabriele Lenzini [7] [16] [23]
23Angelika Mader [8] [11] [22]
24Corrado Moiso [16]
25Bin Ren [5]
26Ari Saptawijaya [14] [19]
27I. Staicu [7]
28Andrew Tokmakoff [17]
29Eugen Zalinescu [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)