Ricardo Corin
Ricardo Corin
FaMAF
Verified email at famaf.unc.edu.ar
TitleCited byYear
Cryptographically verified implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zalinescu
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1312008
Cryptographic protocol synthesis and verification for multiparty sessions
K Bhargavan, R Corin, PM Deniélou, C Fournet, JJ Leifer
2009 22nd IEEE Computer Security Foundations Symposium, 124-140, 2009
1232009
An improved constraint-based system for the verification of security protocols
R Corin, S Etalle
International Static Analysis Symposium, 326-341, 2002
1182002
A logic for auditing accountability in decentralized systems
R Corin, S Etalle, J den Hartog, G Lenzini, I Staicu
IFIP World Computer Congress, TC 1, 187-201, 2004
1052004
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6 (2-3), 133-151, 2007
1022007
Secure sessions for web services
K Bhargavan, R Corin, C Fournet, AD Gordon
ACM Transactions on Information and System Security (TISSEC) 10 (2), 8, 2007
962007
Analysing password protocol security against off-line dictionary attacks
R Corin, J Doumen, S Etalle
Electronic Notes in Theoretical Computer Science 121, 47-63, 2005
792005
An audit logic for accountability
JG Cederquist, R Conn, MAC Dekker, S Etalle, JI Den Hartog
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
732005
LicenseScript: A novel digital rights language and its semantics
CN Chong, R Corin, S Etalle, P Hartel, W Jonker, YW Law
Proceedings Third International Conference on WEB Delivering of Music, 122-129, 2003
682003
A formally verified decentralized key management architecture for wireless sensor networks
YW Law, R Corin, S Etalle, PH Hartel
IFIP International Conference on Personal Wireless Communications, 27-39, 2003
632003
A logic for constraint-based security protocol analysis
R Corin, A Saptawijaya
2006 IEEE Symposium on Security and Privacy (S&P'06), 14 pp.-168, 2006
592006
A probabilistic Hoare-style logic for game-based cryptographic proofs
R Corin, J Den Hartog
International Colloquium on Automata, Languages, and Programming, 252-263, 2006
542006
Timed model checking of security protocols
RJ Corin, S Etalle, PH Hartel, AH Mader
2nd ACM Workshop on Formal Methods in Security Engineering: From …, 2004
492004
Guess what? Here is a new tool that finds some new guessing attacks
R Corin, S Malladi, J Alves-Foss, S Etalle
TWENTE UNIV ENSCHEDE (NETHERLANDS) DEPT OF COMPUTER SCIENCE, 2003
492003
Secure implementations for typed session abstractions
R Corin, PM Denielou, C Fournet, K Bhargavan, J Leifer
20th IEEE Computer Security Foundations Symposium (CSF'07), 170-186, 2007
482007
Sound computational interpretation of formal encryption with composed keys
P Laud, R Corin
International Conference on Information Security and Cryptology, 55-66, 2003
392003
Verified cryptographic implementations for TLS
K Bhargavan, C Fournet, R Corin, E Zălinescu
ACM Transactions on Information and System Security (TISSEC) 15 (1), 3, 2012
352012
A secure compiler for session abstractions
R Corin, PM Deniélou, C Fournet, K Bhargavan, J Leifer
Journal of Computer Security 16 (5), 573-636, 2008
352008
Timed analysis of security protocols
R Corin, S Etalle, PH Hartel, A Mader
Journal of Computer Security 15 (6), 619-645, 2007
342007
On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
J Cederquist, R Corin, MT Dashti
International Conference on Information and Communications Security, 27-39, 2005
272005
The system can't perform the operation now. Try again later.
Articles 1–20