Cryptographically verified implementations for TLS K Bhargavan, C Fournet, R Corin, E Zalinescu Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 157 | 2008 |
An improved constraint-based system for the verification of security protocols R Corin, S Etalle International Static Analysis Symposium, 326-341, 2002 | 130 | 2002 |
Cryptographic protocol synthesis and verification for multiparty sessions K Bhargavan, R Corin, PM Deniélou, C Fournet, JJ Leifer 2009 22nd IEEE Computer Security Foundations Symposium, 124-140, 2009 | 128 | 2009 |
Audit-based compliance control JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini International Journal of Information Security 6, 133-151, 2007 | 125 | 2007 |
A logic for auditing accountability in decentralized systems R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005 | 111 | 2005 |
Secure sessions for web services K Bhargavan, R Corin, C Fournet, AD Gordon ACM Transactions on Information and System Security (TISSEC) 10 (2), 8-es, 2007 | 104 | 2007 |
Analysing password protocol security against off-line dictionary attacks R Corin, J Doumen, S Etalle Electronic Notes in Theoretical Computer Science 121, 47-63, 2005 | 87 | 2005 |
An audit logic for accountability JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005 | 80 | 2005 |
A formally verified decentralized key management architecture for wireless sensor networks YW Law, R Corin, S Etalle, PH Hartel Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003 | 79 | 2003 |
LicenseScript: A novel digital rights language and its semantics CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003 | 75 | 2003 |
A logic for constraint-based security protocol analysis R Corin, A Saptawijaya 2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006 | 63 | 2006 |
Timed model checking of security protocols R Corin, S Etalle, PH Hartel, A Mader Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004 | 63 | 2004 |
A probabilistic Hoare-style logic for game-based cryptographic proofs R Corin, J Den Hartog International Colloquium on Automata, Languages, and Programming, 252-263, 2006 | 55 | 2006 |
Secure implementations for typed session abstractions R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer 20th IEEE Computer Security Foundations Symposium (CSF'07), 170-186, 2007 | 54 | 2007 |
Guess what? Here is a new tool that finds some new guessing attacks RJ Corin, S Malladi, J Alves-Foss, S Etalle Workshop on Issues in the Theory of Security 2003, 62-71, 2003 | 54 | 2003 |
Verified cryptographic implementations for TLS K Bhargavan, C Fournet, R Corin, E Zălinescu ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-32, 2012 | 53 | 2012 |
Timed analysis of security protocols R Corin, S Etalle, PH Hartel, A Mader Journal of Computer Security 15 (6), 619-645, 2007 | 47 | 2007 |
Sound computational interpretation of formal encryption with composed keys P Laud, R Corin International Conference on Information Security and Cryptology, 55-66, 2003 | 41 | 2003 |
A secure compiler for session abstractions R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer Journal of Computer Security 16 (5), 573-636, 2008 | 38 | 2008 |
Taint analysis of security code in the KLEE symbolic execution engine R Corin, FA Manzano Information and Communications Security: 14th International Conference …, 2012 | 33 | 2012 |