default search action
Ricardo Corin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j6]Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:
Verified Cryptographic Implementations for TLS. ACM Trans. Inf. Syst. Secur. 15(1): 3:1-3:32 (2012) - [c25]Ricardo Corin, Felipe Andrés Manzano:
Taint Analysis of Security Code in the KLEE Symbolic Execution Engine. ICICS 2012: 264-275 - 2011
- [c24]Ricardo Corin, Felipe Andrés Manzano:
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations. ESSoS 2011: 58-72
2000 – 2009
- 2009
- [c23]Jérémy Planul, Ricardo Corin, Cédric Fournet:
Secure Enforcement for Global Process Specifications. CONCUR 2009: 511-526 - [c22]Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, James J. Leifer:
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. CSF 2009: 124-140 - 2008
- [j5]Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:
A secure compiler for session abstractions. J. Comput. Secur. 16(5): 573-636 (2008) - [c21]Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:
Cryptographically verified implementations for TLS. CCS 2008: 459-468 - 2007
- [j4]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007) - [j3]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed analysis of security protocols. J. Comput. Secur. 15(6): 619-645 (2007) - [j2]Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon:
Secure sessions for Web services. ACM Trans. Inf. Syst. Secur. 10(2): 8 (2007) - [c20]Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, Karthikeyan Bhargavan, James J. Leifer:
Secure Implementations for Typed Session Abstractions. CSF 2007: 170-186 - [c19]Ricardo Corin, Pierre-Malo Deniélou:
A Protocol Compiler for Secure Sessions in ML. TGC 2007: 276-293 - 2006
- [j1]Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management. Ann. des Télécommunications 61(3-4): 284-331 (2006) - [c18]Martín Abadi, Ricardo Corin, Cédric Fournet:
Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269 - [c17]Ricardo Corin, Jerry den Hartog:
A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. ICALP (2) 2006: 252-263 - [c16]Ricardo Corin, David Galindo, Jaap-Henk Hoepman:
Securing Data Accountability in Decentralized Systems. OTM Workshops (1) 2006: 626-635 - [c15]Ricardo Corin, Sandro Etalle, Ari Saptawijaya:
A Logic for Constraint-based Security Protocol Analysis. S&P 2006: 155-168 - 2005
- [c14]Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso:
A Formal Security Analysis of an OSA/Parlay Authentication Interface. FMOODS 2005: 131-146 - [c13]J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti:
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. ICICS 2005: 27-39 - [c12]Ricardo Corin, Ari Saptawijaya, Sandro Etalle:
PS-LTL for Constraint-Based Security Protocol Analysis. ICLP 2005: 439-440 - [c11]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. POLICY 2005: 34-43 - [i4]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. CoRR abs/cs/0502091 (2005) - [i3]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed Analysis of Security Protocols. CoRR abs/cs/0503036 (2005) - [i2]Ricardo Corin, Jerry den Hartog:
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version). IACR Cryptol. ePrint Arch. 2005: 467 (2005) - 2004
- [c10]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed model checking of security protocols. FMSE 2004: 23-32 - [c9]Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu:
A Logic for Auditing Accountability in Decentralized Systems. Formal Aspects in Security and Trust 2004: 187-201 - [c8]Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, Andrew D. Gordon:
Secure sessions for web services. SWS 2004: 56-66 - [c7]Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin:
License Protection with a Tamper-Resistant Token. WISA 2004: 223-237 - [c6]Ricardo Corin, Jeroen Doumen, Sandro Etalle:
Analysing Password Protocol Security Against Off-line Dictionary Attacks. WISP@ICATPN 2004: 47-63 - [i1]Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel:
A Trace Logic for Local Security Properties. CoRR cs.CR/0411010 (2004) - 2003
- [c5]Peeter Laud, Ricardo Corin:
Sound Computational Interpretation of Formal Encryption with Composed Keys. ICISC 2003: 55-66 - [c4]Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel:
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. PWC 2003: 27-39 - [c3]Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Willem Jonker, Yee Wei Law:
LicenseScript: a novel digital rights language and its semantics. WEDELMUSIC 2003: 122-129 - [c2]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante:
A Trace Logic for Local Security Properties. SVV@ICLP 2003: 129-143 - 2002
- [c1]Ricardo Corin, Sandro Etalle:
An Improved Constraint-Based System for the Verification of Security Protocols. SAS 2002: 326-341
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint