Follow
Ricardo Corin
Ricardo Corin
FaMAF
Verified email at famaf.unc.edu.ar
Title
Cited by
Cited by
Year
Cryptographically verified implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zalinescu
Proceedings of the 15th ACM conference on computer and Communications …, 2008
1472008
Cryptographic protocol synthesis and verification for multiparty sessions
K Bhargavan, R Corin, PM Deniélou, C Fournet, JJ Leifer
2009 22nd IEEE Computer Security Foundations Symposium, 124-140, 2009
1262009
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6, 133-151, 2007
1222007
An improved constraint-based system for the verification of security protocols
R Corin, S Etalle
Static Analysis: 9th International Symposium, SAS 2002 Madrid, Spain …, 2002
1222002
A Logic for Auditing Accountability in Decentralized Systems.
R Corin, S Etalle, JI Den Hartog, G Lenzini, I Staicu
Formal Aspects in Security and Trust, 187-201, 2004
1092004
Secure sessions for web services
K Bhargavan, R Corin, C Fournet, AD Gordon
ACM transactions on information and system security (TISSEC) 10 (2), 8-es, 2007
1002007
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
842005
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
802005
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003
792003
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
742003
A logic for constraint-based security protocol analysis
R Corin, A Saptawijaya
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006
632006
Timed model checking of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
602004
Secure implementations for typed session abstractions
R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer
20th IEEE Computer Security Foundations Symposium (CSF'07), 170-186, 2007
562007
A probabilistic Hoare-style logic for game-based cryptographic proofs
R Corin, J den Hartog
ICALP (2) 4052, 252-263, 2006
562006
Guess what? Here is a new tool that finds some new guessing attacks
R Corin, S Malladi, J Alves-Foss, S Etalle
TWENTE UNIV ENSCHEDE (NETHERLANDS) DEPT OF COMPUTER SCIENCE, 2003
542003
Timed analysis of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Journal of Computer Security 15 (6), 619-645, 2007
472007
Verified cryptographic implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zălinescu
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-32, 2012
452012
Sound computational interpretation of formal encryption with composed keys
P Laud, R Corin
Lecture notes in computer science, 55-66, 2004
402004
A secure compiler for session abstractions
R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer
Journal of Computer Security 16 (5), 573-636, 2008
382008
Taint analysis of security code in the KLEE symbolic execution engine
R Corin, FA Manzano
Information and Communications Security: 14th International Conference …, 2012
302012
The system can't perform the operation now. Try again later.
Articles 1–20