Follow
Ricardo Corin
Ricardo Corin
FaMAF
Verified email at famaf.unc.edu.ar
Title
Cited by
Cited by
Year
Cryptographically verified implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zalinescu
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1572008
An improved constraint-based system for the verification of security protocols
R Corin, S Etalle
International Static Analysis Symposium, 326-341, 2002
1302002
Cryptographic protocol synthesis and verification for multiparty sessions
K Bhargavan, R Corin, PM Deniélou, C Fournet, JJ Leifer
2009 22nd IEEE Computer Security Foundations Symposium, 124-140, 2009
1282009
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6, 133-151, 2007
1252007
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu
Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005
1112005
Secure sessions for web services
K Bhargavan, R Corin, C Fournet, AD Gordon
ACM Transactions on Information and System Security (TISSEC) 10 (2), 8-es, 2007
1042007
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
872005
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
802005
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003
792003
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
752003
A logic for constraint-based security protocol analysis
R Corin, A Saptawijaya
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006
632006
Timed model checking of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
632004
A probabilistic Hoare-style logic for game-based cryptographic proofs
R Corin, J Den Hartog
International Colloquium on Automata, Languages, and Programming, 252-263, 2006
552006
Secure implementations for typed session abstractions
R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer
20th IEEE Computer Security Foundations Symposium (CSF'07), 170-186, 2007
542007
Guess what? Here is a new tool that finds some new guessing attacks
RJ Corin, S Malladi, J Alves-Foss, S Etalle
Workshop on Issues in the Theory of Security 2003, 62-71, 2003
542003
Verified cryptographic implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zălinescu
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-32, 2012
532012
Timed analysis of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Journal of Computer Security 15 (6), 619-645, 2007
472007
Sound computational interpretation of formal encryption with composed keys
P Laud, R Corin
International Conference on Information Security and Cryptology, 55-66, 2003
412003
A secure compiler for session abstractions
R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer
Journal of Computer Security 16 (5), 573-636, 2008
382008
Taint analysis of security code in the KLEE symbolic execution engine
R Corin, FA Manzano
Information and Communications Security: 14th International Conference …, 2012
332012
The system can't perform the operation now. Try again later.
Articles 1–20